kokobob.com

# Unveiling Cybersecurity Vulnerabilities: A Personal Journey in Hacking

Written on

Chapter 1: A Journey Begins

In the realm of cybersecurity, the landscape is often smaller than it appears at first glance.

To contextualize, let’s revisit the first episode where I emphasized the importance of networking in securing your initial role as a Cybersecurity Consultant. Today, I will delve into my experience with Opinium and Tesla, detailing how I uncovered four Remote Code Execution (RCE) vulnerabilities, including two that granted root access. These discoveries were made just two weeks ago, highlighting a zero-day exploit in custom software known as BFLA, along with Insecure Direct Object References (IDORs).

Fictitious Names Used for Privacy:

  • Opinium: A staffing agency
  • Tesla: A prominent electricity provider in Western Europe, amidst several others.

The Background Story

While searching for a job, I initially interacted with staffing agencies rather than direct clients. This detail significantly influenced my chances of landing a position. These agencies would present candidates to clients for cybersecurity roles, but the ultimate decision rested with their business partners.

I can't recall how it all began, but during my engagement with Opinium, I felt optimistic after receiving a signed offer letter. However, confusion arose when I was told to interview with Tesla, Opinium’s business partner, despite having completed four rounds of interviews with Opinium.

On the day of the Microsoft Teams meeting with Tesla, I naively thought I had secured the position, only to discover that it was a mere evaluation of my skills by Opinium to determine Tesla's interest. Unfortunately, Tesla decided I wasn't a good fit, leading Opinium to retract their offer.

A Twist of Fate

After a frustrating period, I received a far better job offer, which I accepted immediately. Shortly after starting at my new company, a leading consulting firm, I was tasked with uncovering vulnerabilities. To my astonishment, I identified a zero-day and two root RCEs within Tesla’s systems.

As I read through the subsequent emails, I noticed the names Opinium, Tesla, and Frank—the representative from Tesla who had evaluated me. I realized I had compromised the very organization that had once deemed me unqualified because, in their words, "I had much to learn about CS and needed certifications." This moment motivated me like never before to excel in my hacking endeavors.

Technical Deep Dive: Log4Shell Vulnerability

My exploration began with testing various web applications for Tesla, where I discovered an information disclosure vulnerability. During this process, I noticed Java frameworks in use. I promptly suggested to my manager that we could leverage this for an RCE attack, though he was skeptical about Tesla being vulnerable to Log4Shell, given the company's reputation.

The next day, while examining another application, I encountered a familiar pattern. This time, I bypassed discussions and directly initiated an RCE exploit. By meticulously inspecting various endpoints and monitoring traffic via a proxy, I successfully injected a payload, achieving one of the two root RCEs.

Phases of the Log4Shell Attack

While many might consider stopping there, my curiosity drove me to dig deeper. I meticulously documented my findings, preparing comprehensive reports with screenshots for the client. My next objective was to achieve an XSS exploit through a different endpoint.

However, I faced application crashes and shifted my focus to SQL Injection (SQLi). Confirming my suspicions, I discovered the application was indeed vulnerable. Utilizing SQLmap, I accessed extensive data, uncovering a zero-day exploit in a third-party software widely used for document management.

BFLA: A Vulnerability Worth Noting

One of the most intriguing vulnerabilities I found was related to application headers, often overlooked by administrators. After analyzing user level definitions, I used a POST request to modify the request body, effectively exploiting this weakness.

Transitioning to Vertical Privilege Escalation

With my access limited, I explored further and discovered a way to exploit a PUT request, which allowed me to manipulate the system. Upon logging back in, I was astonished to find that I had been promoted to an administrator role.

Exploiting APIs for RCE

Recently, I uncovered two RCEs within Tesla’s API, identified just two weeks ago. These vulnerabilities were particularly satisfying because, unlike standard web applications where documentation is provided, I received only an API key and secret. Testing APIs is inherently more challenging, but I eventually discovered the missing YAML file, which unlocked the API's capabilities.

In just ten minutes, I achieved RCE by sending a payload requesting the system's Java version.

Non-Authenticated RCE

Despite achieving RCE quickly, I sought a more elegant solution. By exploiting a different channel, I found I could obtain RCE simply by knowing the API link—no keys or secrets required. This approach took longer, as I had to wait several minutes for responses, but ultimately led to another successful RCE.

Conclusion

Throughout my journey, I encountered multiple significant vulnerabilities in Tesla, such as Administrator Login bypass and API token weaknesses. These findings reflect broader issues prevalent in major corporations.

What sets Tesla and Opinium apart is their failure to recognize a valuable opportunity. The individual they once deemed unfit is now in a position to guide them in strengthening their security measures, all while being compensated significantly more than they had intended. I trust they have gleaned valuable insights from this experience.

Share the page:

Twitter Facebook Reddit LinkIn

-----------------------

Recent Post:

The Fascinating Relationship Between Prime Numbers and Nature

Explore the intriguing connection between prime numbers and their role in nature, particularly within cicada life cycles.

10 Essential Life Guidelines for Personal Growth

Explore important unwritten rules for personal development and fostering healthy relationships in life.

Unlocking the Power of Encapsulation and Abstraction in Python

Discover how encapsulation and abstraction can enhance your Python programming by organizing code and simplifying complex implementations.

How Timeboxing Can Help You Combat Burnout Effectively

Discover how timeboxing can effectively prevent burnout by allowing you to manage your time and energy better.

Essential Elements to Showcase in Your Programming Portfolio

Discover the key aspects to include in your programming portfolio to effectively showcase your skills and experience.

Embracing the Writer's Journey: Overcoming Challenges and Doubts

Discover insights on overcoming common writing hurdles and finding your path in the writing world.

Exploring the Area of a Rhombus: A Fun Geometry Challenge

Dive into an engaging geometry puzzle that challenges you to find the area of a rhombus inside another rhombus.

# Unveiling My Identity: A Journey of Self-Discovery and Growth

Reflecting on my life journey, from family struggles to career evolution, as I explore who I am and what I've learned along the way.