Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exploit Citrix NetScaler ADC and Gateway through CVE-2023-4966 #212

Merged
merged 3 commits into from
May 24, 2024

Conversation

aleff-github
Copy link
Contributor

This payload sends an HTTP request to a remote server using the curl command. If the request succeeds, it means the exploit was successful. Conversely, if the request fails, it indicates that the target has resisted the attack.

This payload sends an HTTP request to a remote server using the `curl` command. If the request succeeds, it means the exploit was successful. Conversely, if the request fails, it indicates that the target has resisted the attack.
@kalanihelekunihi
Copy link
Collaborator

Keystroke Reflection (CapsLock toggle for data exfiltration) is not presently supported on O.MG Devices.

This is on our roadmap, but at present this payload will not operate as written.

There is HIDX Exfiltration on O.MG Devices, which allows for several KB / second of exfiltration, as well as capture via C2.
If you wanted to modify your payload to use HIDX, it would run and be suitable for this repo at present.

I would like to ask that you please test your payloads prior to submission to verify they will run.

@kalanihelekunihi kalanihelekunihi merged commit 3740a98 into hak5:master May 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants