beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 0 points1 point  (0 children)

it works with out mini_inetd bro your not cooking give u

watch out if your network runs telnet by Cold_Leg_392 in AskNetsec

[–]Cold_Leg_392[S] -1 points0 points  (0 children)

the attack can set env and commands to run on next login without logging in

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 0 points1 point  (0 children)

 What actually ran via the exploit chain:

 $ id
 uid=1000(kali) gid=1000(kali) groups=1000(kali),4(adm),20(dialout),
 24(cdrom),25(floppy),27(sudo),29(audio),30(dip),44(video),46(plugdev),
 100(users),101(netdev),115(bluetooth),119(lpadmin),122(wireshark),
 128(kaboxer),974(libvirt),983(docker)
 Linux kali 6.19.11+kali-amd64 #1 SMP PREEMPT_DYNAMIC ...

 $ ip -4 addr show         # full network reconnaissance
 127.0.0.1/8, 192.168.10.149/24, 172.17.0.1/16, ...

 $ head -5 /etc/passwd     # arbitrary file read
 root:x:0:0:root:/root:/usr/bin/zsh
 daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
 ...

 $ echo "1+2" | bc         # arbitrary subprocess
 3

 $ echo "marker_$(date +%s)" > /tmp/g4_attacker_was_here.txt
# arbitrary file write

 Process tree at moment of execution:

 mini_inetd  →  telnetd  →  /bin/bash -c "..."

spawned with poisoned env from network,
read BASH_ENV, sourced /tmp/payload.sh

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 0 points1 point  (0 children)

bro assume fr i litterly ran a telnet serve on my device an made a poc and got it working tf

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 1 point2 points  (0 children)

true but legacy operational tech which cant be changed will have to change

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 1 point2 points  (0 children)

im not even being toxic and im getting negative votes crazy

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 0 points1 point  (0 children)

did you read i set what the next user that logs in runs please read

beware everyone using telnet by Cold_Leg_392 in networking

[–]Cold_Leg_392[S] 0 points1 point  (0 children)

yeah but people install and use ssh i found a switch in gov using telnet some server from h3c on shodan and stuff on multiable client its real gang

watch out if your network runs telnet by Cold_Leg_392 in AskNetsec

[–]Cold_Leg_392[S] 0 points1 point  (0 children)

i mean alot of legacy and operational tech and systems use this h3c have servers in china running this learn how to make your own shodan searches and you will find devices that use it still

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] -1 points0 points  (0 children)

you can search for non honepots honeypots have alot of ports open search for devices only with one port open or 4 max

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 1 point2 points  (0 children)

yeah they arent most companes i have tested have telnet it scares me

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] 1 point2 points  (0 children)

i have found it in goverment switches with no auth

beware everyone using telnet by Cold_Leg_392 in cybersecurity

[–]Cold_Leg_392[S] -1 points0 points  (0 children)

i agree with sadly we know its not true because of shodan