View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006904 | Kali Linux | [All Projects] Queued Tool Addition | public | 2020-12-06 05:18 | 2023-02-20 08:59 |
Reporter | g0tmi1k | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | acknowledged | Resolution | open | ||
Product Version | |||||
Target Version | Fixed in Version | ||||
Summary | 0006904: slipstream - Remotely access any TCP/UDP services bound (GoLang) | ||||
Description | [Name] - slipstream [Version] - N/A [Homepage] - https://github.com/jrozner/slipstream [Download] - N/A [Author] - Joe Rozner [License] - MIT ~ https://github.com/jrozner/slipstream/blob/master/LICENSE [Description] - After spending many hours attempting to get the original code working with no success I was left at a point of not knowing if my router was simply not vulnerable, I had misconfigured the code, the code was broken, or there were other implementation details stopping it from working. Eventually I was shown another implementation of the attack that skipped over the web based delivery instead focusing just on exploitation of the ALGs. This code is heavily based on that implementation though provides an end to end client and server to make testing simpler and avoids using an HTTP client to send the request due to issues discovered. | ||||
|
@kali-team, please could this be packaged up. |
|
Estoy ansioso por trabajar con cada uno de los programas me gusta la tecologia |
Date Modified | Username | Field | Change |
---|---|---|---|
2020-12-06 05:18 | g0tmi1k | New Issue | |
2020-12-06 05:18 | g0tmi1k | Relationship added | related to 0006813 |
2021-01-08 13:35 | g0tmi1k | Note Added: 0014059 | |
2021-01-08 13:35 | g0tmi1k | Status | new => acknowledged |
2021-01-08 13:35 | g0tmi1k | Category | New Tool Requests => Queued Tool Addition |
2023-02-20 08:59 | Kenneths28 | Note Added: 0017534 |