Quantcast
Channel: Files from Nir Ohfeld ≈ Packet Storm
Browsing all 2 articles
Browse latest View live

Microsoft OMI Management Interface Authentication Bypass

By removing the authentication header, an attacker can issue an HTTP request to the OMI management endpoint that will cause it to execute an operating system command as the root user. This...

View Article



Microsoft OMI Management Interface Authentication Bypass

This Metasploit module demonstrates that by removing the authentication exchange, an attacker can issue requests to the local OMI management socket that will cause it to execute an operating system...

View Article
Browsing all 2 articles
Browse latest View live




Latest Images