Skip to main content
  1. Bug Bounty Writeups/

How I RCE'd the Largest RU Company

·281 words·2 mins
Sicksec
Author
Sicksec
Finding bugs in production. Breaking APIs for fun. Passionate about Web Security, API Testing, GraphQL, and REST APIs.

Hello Security Researchers

In this writeup I will explain how I was able to find RCE in Mail.ru which is considered the world largest internet company, Before starting to hack I was wondering on how I should approach the target and what most people would miss in the program, they have a huge scope which means it should be something out there sitting for me to find

I started looking with the Favicon using this script Where I replace the link with the Mail.ru favicon, once generate I go to shodan.io and search for it

img1

Now we search this hash on shodan.io with the http.favicon.hash syntax

img2

Now I went to see page by page and look for something suspicious with an unusual port number so I kept going till I found a host with port 8080 That has a Welcome to Nginx page

Once found I wanted to dig further on what’s going on, so I started to FUZZ directories and I found /static/shards/html Publicly accessible and it looked Juicy

From here I guessed that most of these hosts are Internal host and it will be difficult to reach them and I decided to Nmap all of them Found one that has a JDWP stands for (Java Debug Wire Protocol)

nmap

So I started my research about this service / port and it turns out that it may be vulnerable to RCE by reading this article

With the help of this jdwp-shellifier I was able to show the RCE and the team triaged and paid $$$ since the server belongs to their infrastructure not the main assets

bounty

Hope you enjoyed reading this and catch you in the next adventure

Stay curious ❤

Related

How I Scored 1K Bounty Using Waybackurls

·274 words·2 mins
Hello Security Researchers In this write-up, I want to share with you a finding that I discovered in a public bug bounty program that ended up paying me 1K just using a single command on the terminal I won’t be able to disclose the name of the program since the leak was huge and they are still merging all the previous algorithm they used before to a new one and the deprecated API is still reachable

Tale of XSS in Angular

·74 words·1 min
Hello Security Researchers and Hackers In this writeup I explain how I found 2 rXSS vulnerabilities in Angular using automation. Tools Used # Findomain for subdomain monitoring Wappalyzer for technology detection Discovery Process # Received Telegram alert for new subdomains