Sergey Belov
•

Pentester in Digital Security / ERPScan;

•

Writer (habrahabr.ru, “Xakep”);

•

CTF Player;

•

Bug bounty member (Google, Yandex);

•

bugscollector.com creator.
•

Very easy

•

0$

•

Not mentioned in the wild
NGinx – reverse proxy
php-fpm
Client

Nginx
Apache
attacker.com

Client

php-fpm

Nginx
Apache
vuln.com

??? http server
Step 1
location / {
proxy_pass
http://vuln.com;
proxy_set_header X-Real-IP $remote_addr;
}
}
Step 2





proxy_set_header Host “vuln.com";
sub_filter ‘vuln.com' ‘attacker.com';
sub_filter_once off;
Phishing
NGinx – tool for MitM/phishing?






+ Identical design
+ Fully functional working
+ Logging all data (POST/GET)
+ Add custom JS/HTML
- Another domain (DNS poising / router
hacking, malware, evil apn config e.t.c.)
Pentest
 Random exploit’s?
 Change response data (rights of social
networks apps)
 Change apps swf -> java (exploit)
 ???
DNS rebinding
• -Another domain
• - Very unstable
• + Can attack internal resources
Internal, not external!
C:UsersBeLove>ping www.ya.ru
Обмен пакетами с ya.ru [87.250.250.203] с 32 байтами данных
Remove it from:
• Pentester’s reports
• Most famous security scanners
Thanks!
demo:
http://zn.sergeybelove.ru
http://twitter.com/sergeybelove

Nginx warhead