Home Keeper Report
Post
Cancel

Keeper Report

Information gathering



Scope: 10.10.11.227/32 (Linux)

TCP Nmap scan: 65,535 ports

Vulnerability assessment



Exploitation



  • Valid SSH credential (Reuse Credentials) (lnorgaard:Welcome2023!)
    • Prevention
      • Inform the employer about good practices in the exposure and use of passwords

Post-exploitation



  • lnorgaard Enumeration
  • Use Puttygen tool to convert .ppk to .pem (open ssh id_rsa)
    • Prevention
      • Upload the latest version
    • Upcoming Keepass Security Preventions (July 2023)
      1. Perform direct API calls for getting/setting the text of the text box, avoiding the creation of managed strings in memory that can leak secrets.
      2. Create dummy fragments containing random characters in the process memory that will have approximately the same length as the user’s master password, obfuscating the real key.

Lateral movement



Proof of concept



  • CVE-2023-32784
    • Windows env (deploy windows virtual machine)
    • Linux env
  • Keepass password db access
This post is licensed under CC BY 4.0 by the author.