this post was submitted on 04 Jun 2024
14 points (85.0% liked)

TechSploits

389 readers
3 users here now

All things relating to breaking tech, tech breaking, OSS, or hacking together software to perform something completely out of the ordinary, on purpose or by accident.

founded 1 year ago
MODERATORS
 

Unbelievable...

top 3 comments
sorted by: hot top controversial new old
[–] [email protected] 3 points 5 months ago

I've generally been under the impression that my modern wasn't worth worrying about, since it's impossible to access via IP. Guess I have another thing to keep me awake at night.

One of the things I'll never understand was why the attacker was replaying my traffic? They were clearly in my network and could access everything without being detected, why replay all the HTTP requests? So odd.

Was hoping to get an answer to this.

[–] [email protected] 1 points 5 months ago

My Wifi AP is a Huawei EchoLife piece of shit that came with the apartment and I've been too lazy to get a better one because it sort of works (I have to reboot it at least once a day if I want my bandwidth to be over ~1MiB/s…), and I'm fairly sure it's easily hackable and that there's a nontrivial chance that it's been owned already. This article reminded me that I'll probably want to get to buying a better one sooner rather than later, but I honestly don't even know which ones are good nowadays. I'd love something that runs an open firmware like OpenWRT or Tomato or whatever

[–] [email protected] 1 points 5 months ago

To fuzz this, I simply used Burp’s intruder to enumerate from %00 to %FF at the end of the URL.

I like to think about what normal people would think when they read something like this. It sounds like a line from a cyberpunk wizard.

We had confirmed that we could bypass authorization for the API endpoints by simply replaying the HTTP request multiple times

Not really replaying, since his initial request worked. Feels like it's going through a load balancer and one from that group of servers didn't have authentication enabled (accidentally included a test/dev server, maybe).