POC for CVE-2024-6387 Remote Code Execution | Bug bounty poc

Поділитися
Вставка
  • Опубліковано 23 сер 2024
  • // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing & bug hunting so that we can protect ourselves against the real hackers..
    //LINKS: t.me/mr0rh
    ⚠The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated RCE as root on glibc-based Linux systems; that presents a significant security risk.
    📊62.1M+ Services are found on hunter.how
    music:
    credit by @𝙇𝙤𝙨𝙩𝙨𝙚𝙘
    POC for CVE-2024-6387 ssh Remote Code Execution | Bug bounty poc

КОМЕНТАРІ • 27

  • @davidtancredi5658
    @davidtancredi5658 Місяць тому +6

    Next time you use a template from another researcher (me..), at least have the decency to give credit where it is due. Funny you did not even bother changing the template name but straight out copied "cve-2024-6387-new.yaml" without knowing that the "new" tag I added was because I messed up the regex during testing. Sad.

    • @flowback6481
      @flowback6481 Місяць тому

      活捉大佬 your video is so cool , I am your Fans~ 😀

  • @hometrailer4865
    @hometrailer4865 Місяць тому +9

    Wtf where is the POC skid

    • @Warning_Zone
      @Warning_Zone Місяць тому

      If you got them also tell me

  • @3jee387
    @3jee387 Місяць тому +5

    this only scans... show an actual rce next time

  • @darkmix4192
    @darkmix4192 Місяць тому

    Brother this is only scanning process...next do manual, do you know manual test? I know and I reported lot in openssh server but doesn't respond that organisation. Now I leave the cve.

    • @rajibhassen3
      @rajibhassen3  Місяць тому

      bro, i cna give the complete process on youtube if i want. due to some youtube rules and regulations I can't show as an expert. you can google it if you wnat

    • @Warning_Zone
      @Warning_Zone Місяць тому

      ​@@rajibhassen3please provide any link or make any cheap course on it

  • @kemeliaafrinkethi6606
    @kemeliaafrinkethi6606 Місяць тому +1

    This template is open source

  • @heyiamuday
    @heyiamuday Місяць тому +2

    Bro I didn't find nuclei template

    • @rajibhassen3
      @rajibhassen3  Місяць тому

      This is private template bro

    • @kemeliaafrinkethi6606
      @kemeliaafrinkethi6606 Місяць тому +1

      ​@@rajibhassen3 no it is open source

    • @davidtancredi5658
      @davidtancredi5658 Місяць тому

      As a matter of fact, my private template, which is in fact open source and available in my git repo 😂​@@kemeliaafrinkethi6606

    • @davidtancredi5658
      @davidtancredi5658 Місяць тому

      Enjoy

  • @tempermail5735
    @tempermail5735 Місяць тому

    script kiddie

  • @shingareom
    @shingareom Місяць тому

    Bro give the full credit to the song owner.

  • @100SHEMKUMARP
    @100SHEMKUMARP Місяць тому

    how exploit that server

  • @abhinabshrestha5175
    @abhinabshrestha5175 Місяць тому

    Lostsec fanboy

  • @JoshTWO-ml5mo
    @JoshTWO-ml5mo Місяць тому

    How to Exploit?

    • @rajibhassen3
      @rajibhassen3  Місяць тому

      Given in my Telegram channel

    • @valentinodentesano4182
      @valentinodentesano4182 Місяць тому

      @@rajibhassen3 you didnt

    • @RonaldoPiedade-zl1gv
      @RonaldoPiedade-zl1gv Місяць тому

      ​@@rajibhassen3what is ur telegram channel bro?

    • @darkmix4192
      @darkmix4192 Місяць тому

      Hi brother I'm intermidiat researcher and coffinxp student, I know this concept cve​....next process try ssh command to exploit then some commands to monitoring the race condition attack. Then you'll take rce attack.@@valentinodentesano4182