You can now find Cyber Kendra on Google News | Telegram

Hack Corporate Networks with Single JPEG File

Hacking Networks by Single Image, hack corporate networks, exploit windows server, Hack Corporate Networks with Single JPGE File, hacking via image file, vulnerable system, information security experts, pentest, web application security, Web application development, Security researcher, infosec news, Penetration Testing tools,
haking computers, pentesting tools, web application development
Security researcher and Pentester, Marcus Murray have found a new way to exploit windows servers just via a JPGE image file. A single malicious JPGE file gives attackers complete control of the compromised network.

Last week, In a live hack for the RSA conference in San Francisco, the hacker used a malicious JPEG to violate the system at an unnamed US Government agency that ran a vulnerable website that allows photo upload. This single photo upload of a vulnerable website leads to the compromise of the whole network.

Murray injected active content into the attributes of a JPEG picture, once compromised the target he elevated its privileges and compromise the domain controller into the network. If an attacker successfully hacks the domain controller he will gain complete control over the network. He said the attack is quite simple to run -
“I’m going to try to compromise the web server, then go for back end resources, and ultimately compromise a domain controller,” - he added.
He further explains his way to exploit the target system via exploiting the technique to upload a remote access trojan (RAT) created using the popular Metasploit Penetration Testing Software. For the successful exploitation, he used a couple of tools and compilers which were running on the Windows server.

The attack technique relies on the lack of input validation on the client side. vulnerable uploading portals which allow attackers to upload malicious content because it carries .jpge extension. This vulnerable uploading option validated the images submitted by the users, but not the file extension types, this means that once uploaded and previewed, the files display as the text that has been inserted into active content fields rather than the expected image.

Below you can find the PoC video demonstration from RSA Conference showing how a single image (jpg file) can hack your organization's network. 

So you can imagine that a simple input validation flaw in the system leads to the compromise of the whole network. I remembered a quote that I had read earlier is - "99.9% Security is 100% Vulnerable". 

8 comments

  1. Nice tutorial on android technology hats-off to your effort.
    Your article explained the potential of android technology in coming years.
    Android Course
    in Chennai
  2. Your article cleared up the cutoff of Hadoop Training in Chennai android movement in nearing years.Lovely excercise on android progression complete off to your effort.Oracle Training in Chennai
  3. Exquisite excercise on Oracle Training in Chennai android progression complete Oracle Training in Chennai off to your exertion.Thanks a considerable measure..
  4. Thanks a lot..Shocking excercise on android development complete off to your effort.Besant Technologies Reviews
  5. Your blog is really useful for me. Thanks for sharing this useful blog..Suppose if anyone interested to learn Android Course in Chennai please visit fita academy which offers best Android Training in Chennai at reasonable cost.
  6. Home Mart is a site about Home Improvement, Furniture, Home Appliances and many more.
    Check out the best
    bookshelves
    balance bike
  7. Such A nice post... thanks For Sharing !!Great information for new guy like Happy New year 2020
  8. Such A nice post... thanks For Sharing !!Great information for new guy like showbox for android
Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.