Forwarded from Private Shizo
💥CVE-2023-28252(Windows CLFS OOB R/W➡️EoP, 0-day, may have been actively exploited/ITW)
An OOB read and write vulnerability exists in
🦠Exploit sample
⚠️The gadgets are same as the ITW exploit of CVE-2023-23376, the code layout has overlaps with the ITW exploit of CVE-2022-37969.
⚠️Exploiting the vulnerability will give a local unprivileged attacker
⚠️Any authenticated local user can exploit the vulnerability and an exploit is trivial to produce.
An OOB read and write vulnerability exists in
CClfsBaseFilePersisted::ExtendMetadataBlock and CClfsBaseFilePersisted::WriteMetadataBlock when parsing a malformed BLF file. The OOB read leads to one byte increment of the rgContainers[0] value, that results pointing to a fake CONTAINER_CONTEXT with a user space address 0x5000000 treated as an object's vftable pointer, detonating the placed gadgets and escalating privilege to SYSTEM.🦠Exploit sample
⚠️The gadgets are same as the ITW exploit of CVE-2023-23376, the code layout has overlaps with the ITW exploit of CVE-2022-37969.
⚠️Exploiting the vulnerability will give a local unprivileged attacker
SYSTEM level privileges.⚠️Any authenticated local user can exploit the vulnerability and an exploit is trivial to produce.
🔥13👍5😍4
Forwarded from Private Shizo
Exploiting Errors in Windows Error Reporting in 2022.pdf
2.6 MB
💥Exploiting Errors in Windows Error Reporting in 2022
🤩10❤2👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍13❤5🔥5😍1
Forwarded from linkmeup
Отлично! Теперь шелл можно и через SMS пропихнуть.
Пока безопасники бьются с DLP, настраивают политики и заливают порты эпоксидкой, просто отправь SMS на номер.TCPoverSMS, my ass.
https://github.com/persistent-security/SMShell
Пока безопасники бьются с DLP, настраивают политики и заливают порты эпоксидкой, просто отправь SMS на номер.TCPoverSMS, my ass.
https://github.com/persistent-security/SMShell
🤔17👍7🔥4🤩3❤2
Python tool to quickly search through a database of 1231+ default logins and passwords for different products.
https://github.com/ihebski/DefaultCreds-cheat-sheet
Please open Telegram to view this post
VIEW IN TELEGRAM
❤20😍4🔥3👍1
Forwarded from Caster
Caster Mind: MITM Vectors
Основные векторы MITM-атак
::
Main vectors of MITM attacks
[From "Network Nightmare" by Caster]
Основные векторы MITM-атак
::
Main vectors of MITM attacks
[From "Network Nightmare" by Caster]
🔥28❤6⚡3👍1😨1
Forwarded from Caster
Media is too big
VIEW IN TELEGRAM
OSPF Authentication Cracking by Caster
🔥23❤6⚡2
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Прошел год с прошлого релиза, и вот вышло обновление:
CrackMapExec 6.0.0
P.S. Ну лично мне такой штуки как прогресс бар всегда не хватает😁
#redteam #pentest #ad #soft
CrackMapExec 6.0.0
P.S. Ну лично мне такой штуки как прогресс бар всегда не хватает😁
#redteam #pentest #ad #soft
👍16🔥6