Back to directory
WRITEUP #101

Living off the VPN — Exploring VPN Post-Exploitation Techniques

OtherHardcoded secretsCredentials sent over unencrypted channel
by@oridavid123(Ori David)
Program
Ivanti (Connect Secure)Fortinet (Fortigate VPN)
Published
Aug 7, 2024
Added to HackDex
Sep 18, 2024
Read Full Writeuphttps://www.akamai.com/blog/security-research/2024-august-vpn-post-exploitation-techniques-black-hat
RELATED WRITEUPS
Data Theft in Salesforce: Manipulating Public Links
OtherSOQL injection
When Certificates Fail: A Story of Bypassed MFA in Remote Access
Other2FA / MFA bypass
SSTI in Bug Bounty Program: The Time I Played with Handlebars and Broke Stuff
OtherSSTI
Ghost In The Ppl Part 1: Byovdll
OtherUse-After-Free
Part 2: From Byovdll To Arbitrary Code Execution In Lsass
OtherUse-After-Free

Built with ❤️ by Shubham Rawat