If you have any questions, contact us:
Telegram:maintex


Go Back   Cyber Security Forum > Cybercrime Forum > Hacking » Programming > News

Reply
 
Thread Tools Search this Thread
  #1 Old 12-30-2024, 08:31 PM
Cartographer
 
Cartographer's Avatar
 
Join Date: Aug 2013
Posts: 567
Cartographer is on a distinguished road
Post SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia

Welcome back, aspiring cyberwarriors.




As the war rages on, Russia's gas exports have taken on heightened significance. This resource is literally and figuratively fueling Putin's war efforts, which only underscores the need for attacks on this sector's infrastructure.




In this article, in collaboration with a student from Cyber Cossacks School - Citadel--we’ll show one vulnerability of Russian gas stations.










Background




There is an accounting software used by gas stations in Russia. If we successfully disrupt the server we can significantly impact overall performance of the facility. Most of these servers are located in Russia, and we estimate around 30-40 are exploitable.




To find these servers onShodan, simply search: Mmadm country:"ru"







Most of these servers have port 50000 open.







When accessed via a browser, you'll typically see an authorization form, likely generated by an .htaccess*file. The default credentials are typically admin:admin.




After logging in, you'll notice it's a reporting management system.




In the reporting section, you'll find the establishment's name—in this case, Tatneft Gas Station 2093.







After a second search on Google, we found his address - Moscow region, Ramensky district, Mikhnevo, 30153.







The vulnerability lies in the web system's insecurity, allowing you to configure which processes are displayed. This is where you can plant a reverse shell.




Here's a breakdown of its components:




-l: Listen mode, used for inbound connections.

-v: Verbose mode, provides more detailed output.

-n: Do not perform DNS lookups on names of hosts.

-p 443: Specify the port number to listen on (443 in this case).










Next, for privilege escalation, we can exploit the pkexec vulnerability (CVE-2021-4034) to gain a root shell.







Summary




The war on Ukraine has highlighted the complex interplay of energy resources, economic power, and military capabilities in modern geopolitics. As hackers, we wield a force that can tip the scales in favor of the underdog. Through digital means, we bypass traditional power structures, striking vulnerabilities that larger forces overlook, and exposing weaknesses in seemingly mundane systems. In the age of cyber warfare, influence isn't confined to war rooms or battlefields. A group of dedicated resistance fighters can disrupt the mechanisms of control, challenge entrenched powers and redefine the modern battleground.
__________________
Advertising Policies
Cartographer is offline   Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Hacking Service hcvbe Hacking » Programming 0 04-13-2019 10:35 AM
Hacking / Cyber Services kaiten Unverified Advertising 0 11-24-2018 01:04 AM
HACKING SITES !!! ss-service Hacking » Programming 34 04-24-2018 09:33 AM
My favorite Hacking OS cyberdarkrooter Hacking » Programming 5 05-30-2017 02:53 AM
Hacking Wireless Newer Tutorials 0 05-21-2015 11:58 AM


Cybercrime forum, cybercrime site, ,fraud forum, russian fraud forum, Credit cards, carder, infraud, carders.ws, crdpro, fraudsters, darkpro, crdcrew, dumps, cvv, cc, stuff carding, legit seller, vendor, free cvv, dumps+pin, skimmer, ,shimmer, emv software, emv chip writer, free cc+cvv, valid cards, track 2, free cvv, dump pin, dumps, cvv, cc, credit cards, real carding, legit vendor, carder forum, carding tutorial, russian hackers, online cvv shop, track 101, enroll, fullz