Networking
331

UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy






  02-Jun-2022 00:32:33



UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy

How it works

The tool will send an SSDP discover message to the target host to discover its UPnP services. Target host with flawed UPnP implementation will respond with a URI pointing to a document describing its services.

The tool will then download the document, figure if the target is offering either WANPPPConnection or WANIPConnection service, and if so, start controlling the service to inject routes.

A device may not respond to UDP discover message even though it is exploitable. For those cases, UPnProxyChain will try to guess popular UPnP ports and URIs of service description documents and go from there.

Some devices are vulnerable but are not exploitable because they have a firewall blocking usage of any additional ports.

 


Read more : https://shufflingbytes.com/posts/upnproxychain-a-tool-to-exploit-devices-vulnerable-to-upnproxy/

*Beware click the link!


DISCUSSION
Nothing comment here :(
Login for report, comment and join discussion
Login Here
Sponsored

Popular Posts
Gps Tracker Seccodeid Free Too...
General
21355
204
Top


Djie sam soe Djie sam soe
Complete Basic Course in Kali...
Linux
14374
4
Top


Djie sam soe Djie sam soe
Komintod (Ministry of Communic...
Data Leak
6511
94
Top


Murtad methamphetamine Murtad methamphetamine
Free Proxy List
Networking
3625
3
Top


Sandidi Sandidi
Mass Reverse IP Unlimited
Tools Hacking
3397
15
Top


ImamWawe ImamWawe

Related Post

Youtube Video

Subscribe