Skip to content

Hack computer in the form of RAR files from all types of clients, even Linux

Notifications You must be signed in to change notification settings

M4nifest0-Black-Hat-Hacking/Vulnerabilities-RAR

 
 

Repository files navigation

Locations

Program Features

Introduction

  • In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive, and puts over 500 million users at risk.

  • One of the crashes produced by the fuzzer led us to an old, dated dynamic link library (dll) that was compiled back in 2006 without a protection mechanism (like ASLR, DEP, etc.) and is used by WinRAR.

  • We turned our focus and fuzzer to this “low hanging fruit” dll, and looked for a memory corruption bug that would hopefully lead to Remote Code Execution.

  • However, the fuzzer produced a test case with “weird” behavior. After researching this behavior, we found a logical bug: Absolute Path Traversal. From this point on it was simple to leverage this vulnerability to a remote code execution.

  • Perhaps it’s also worth mentioning that a substantial amount of money in various bug bounty programs is offered for these types of vulnerabilities.

See how it work


  • 🤡

Visit the following channels and sites for more training and tools:



                   

About

Hack computer in the form of RAR files from all types of clients, even Linux

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%