Sept. 2, 2023, 3 p.m. | IppSec

IppSec www.youtube.com

00:00 - Intro
01:02 - Start of nmap
01:50 - Discovering Cacti version and finding a vulnerability
03:50 - Sending the payload from the description, discovering we need to set the X-FORWARDED-FOR
05:00 - Incrementing Host_ID and Local_Data_Ids and discovering different output
06:15 - Discovering with local_data_ids set to 6 and host_id set to 1, we can get code execution
06:50 - Showing the python exploit and showing it blindly spray, looking at the Metasploit module for some more info …

cacti hackthebox nmap payload start version vulnerability

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote