Networking
117

UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy






  02-Jun-2022 00:32:33



UPnProxyChain: a Tool to Exploit Devices Vulnerable to UPnProxy

How it works

The tool will send an SSDP discover message to the target host to discover its UPnP services. Target host with flawed UPnP implementation will respond with a URI pointing to a document describing its services.

The tool will then download the document, figure if the target is offering either WANPPPConnection or WANIPConnection service, and if so, start controlling the service to inject routes.

A device may not respond to UDP discover message even though it is exploitable. For those cases, UPnProxyChain will try to guess popular UPnP ports and URIs of service description documents and go from there.

Some devices are vulnerable but are not exploitable because they have a firewall blocking usage of any additional ports.

 


Read more : https://shufflingbytes.com/posts/upnproxychain-a-tool-to-exploit-devices-vulnerable-to-upnproxy/


DISCUSSION
Nothing comment here :(
Login for comment and discussion.
Login Here
Sponsored

Oppss... No sponsors yet

Popular Posts
Complete Basic Course in Kali...
Djie sam soe Djie sam soe
Linux
10195
2
Top

Gps Tracker Seccodeid Free Too...
Djie sam soe Djie sam soe
General
7248
167
Top

Free Proxy List
Sandidi Sandidi
Networking
3064
3
Top

Mass Reverse IP Unlimited
ImamWawe ImamWawe
Tools Hacking
2360
12
Top

Report McAfee Antivirus Hurrri...
Indrasp Indrasp
Windows
1702
93
Top

Related Post

Youtube Video

Subscribe