Types of Target Exploitation

Types of Target Exploitation

We have learned some of the well-known vulnerabilities that we can exploit to gain access to a target system, such as Bash Shellshock, EternalBlue, and so on. Based on the communication method of the exploitation, those vulnerabilities are classified as remote exploitation. Below is the detailed explanation.



Image source: https://www.wallarm.com/what/what-is-exploit

 

1. Remote Exploitation

Remote exploitation is a type of exploitation, where the attacker tries to gain access to a system over a network. They do not need to have prior physical access to the vulnerable system. This type of exploitation usually targets services that can be accessed through the network, such as SQL, web services, and so on. Examples:

-        EternalBlue: exploit the vulnerability in Microsoft Windows SMBv1.  

-        Log4Shell: remote code execution vulnerability in Apache Log4j 2.

-        Bash Shellshock: exploitation of vulnerability in the Bash shell.

-        Heartbleed: vulnerability in OpenSSL that allows remote attackers to read memory contents including passwords from the server.

-        Apache Struts RCE: exploitation of a bug in how Struts handled file uploads to execute malicious code.


2. Local Exploitation

Local exploitation is a type of exploitation that is done by the attacker when they already gain prior access or physical access to the vulnerable system, typically as a normal user. Local exploitation is usually done to elevate the privilege of the attacker in the target system. Local exploitation will try to exploit the vulnerabilities and misconfiguration in the system, so that the attacker can access the system as the highest privilege user (root) or some sensitive files that cannot be accessed as a normal user. Examples:

-        Dirty COW: exploit the Linux copy-on-write memory bug to escalate the privilege to root.

-        Baron Samedit: exploit heap-overflow vulnerability in the sudo binary while parsing command line arguments to escalate their privilege to root.

-        Spectre & Meltdown: exploit CPU speculative execution to read sensitive kernel memory.

-        Windows LPE (Win32k): exploit bug in Win32k.sys kernel driver, so that the attacker can escalate to SYSTEM user.

-        Polkit pkexec: exploit memory corruption in pkexec for privilege escalation in Linux.

 

Therefore, when we conduct a penetration testing, we usually do remote execution first if we do not have any access to the server. After we gain access to the server, at least as a normal user, then we need to escalate our privilege to be root using local exploitation, so that we can access sensitive information in the target system.

Hence, when doing vulnerability mapping, we should not only focus on vulnerabilities that allow us to gain access to the system, but also trying to escalate our privilege to be the highest privilege user in the system, so that we can gather more sensitive information from the target.  

Comments

Popular Posts