Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Digital NAS

zeroday

0day

exploit

vulnerability

pwn2own

westerndigital

nas

hacking

PR4100

Автор: Flashback Team

Загружено: 25 февр. 2021 г.

Просмотров: 45 368 просмотров

Описание:

Learn tricks and techniques like these, with us, in our amazing training courses!
https://flashback.sh/training

In this video we show you how we found, exploited and patched a chain of zero day vulnerabilities in a Western Digital (WD) Network Attached Storage (NAS) device. This chain allows an unauthenticated attacker to execute code as root and install a permanent backdoor on the NAS.

0:00 Intro
0:41 Why Drop A Zero Day?
2:51 Overview Of WD PR4100 NAS
4:01 OS3 vs OS5
5:18 Recon And Password Cracking
7:02 API Introduction
8:45 Accessing Auth API (Vulnerability #1)
10:07 Firmware Update (Vulnerability #2)
15:48 Exploit Walkthrough
18:32 Exploit Execution
19:56 Patching Vulnerability #2
22:41 Downgrading OS5 To OS3
24:07 One Week Update

The vulnerabilities affect most of the WD NAS line-up and their OS3 firmware versions and are unpatched as of 2021/02/25. The new OS5 firmware is not vulnerable. OS3 is in a limbo, it's not clear whether it is supported or not by WD, but WD's official response to a security advisory in November 2020 seems to indicate that it's out of support.

Please keep safe - do not expose your NAS to the Internet. If your device supports OS5, upgrade to that, otherwise you can use our patch to fix it, which needs to be done at every reboot.

Our patch can be found at:
https://github.com/pedrib/PoC/blob/ma...
https://github.com/rdomanski/Exploits...

The full advisory detailing the vulnerabilities can be found here: https://www.flashback.sh/blog/weekend...

CVE-2021-36224: Hard-coded User Credentials
CVE-2021-36225: Firmware Upgrade Can be Initiated by Low Privilege User
CVE-2021-36226: No Cryptographic Verification of Firmware Upgrades

Did you enjoy this video? Then follow us on Twitter, and subscribe to our channel for more awesome hacking videos.

~ Flashback Team
https://flashback.sh
  / flashbackpwn  

Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Digital NAS

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Rooting an Arlo Q Plus Camera (SSH 🔙🚪?!)

Rooting an Arlo Q Plus Camera (SSH 🔙🚪?!)

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own

Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠

Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠

Hacker's Guide to UART Root Shells

Hacker's Guide to UART Root Shells

you need to learn Docker RIGHT NOW!! // Docker Containers 101

you need to learn Docker RIGHT NOW!! // Docker Containers 101

I built a computer that CAN'T break - Proxmox Clustering

I built a computer that CAN'T break - Proxmox Clustering

How are Images Compressed?  [46MB ↘↘ 4.07MB] JPEG In Depth

How are Images Compressed? [46MB ↘↘ 4.07MB] JPEG In Depth

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

Mood Feelings🎼🎼Billie Eilish🎧Carla Morrison🎧Cigarettes After S.ex🎧Emma Peters🎧Edmofo🎧OMER BALIK🎧Zubi

Mood Feelings🎼🎼Billie Eilish🎧Carla Morrison🎧Cigarettes After S.ex🎧Emma Peters🎧Edmofo🎧OMER BALIK🎧Zubi

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]