Erlang - 4369
Erlang Cookie RCE
https://book.hacktricks.xyz/pentesting/4369-pentesting-erlang-port-mapper-daemon-epmd
Erlang Cookie RCE
If you can leak the Authentication cookie you will be able to execute code on the host. Usually, this cookie is located in ~/.erlang.cookie and is generated by erlang at the first start.
There is a epmd port. And rabbit service on 65000 port. We need to rce we need erlang.cookie value. We can brute force it or we can find it via another services on the host.
Erlang Cookie - Remote Code Execution
https://www.exploit-db.com/exploits/49418
We need to change relevant parts of the code.
Last updated