Gaining code execution using a malicious SQLite database
https://research.checkpoint.com/select-code_execution-from-using-sqlite/
https://research.checkpoint.com/select-code_execution-from-using-sqlite/
Check Point Research
SELECT code_execution FROM * USING SQLite; - Check Point Research
Gaining code execution using a malicious SQLite database Research By: Omer Gull tl;dr SQLite is one of the most deployed software in the world. However, from a security perspective, it has only been examined through the lens of WebSQL and browser exploitation.…
Поиск уязвимых драйверов в Windows
https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf
https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf
Инструмент для поиска уязвимостей с помощью символьного исполнения. Ориентирован на работу с прошивками и небольшим объемом анализируемого кода.
https://github.com/ChrisTheCoolHut/Firmware_Slap
https://github.com/ChrisTheCoolHut/Firmware_Slap
GitHub
GitHub - ChrisTheCoolHut/Firmware_Slap: Discovering vulnerabilities in firmware through concolic analysis and function clustering.
Discovering vulnerabilities in firmware through concolic analysis and function clustering. - ChrisTheCoolHut/Firmware_Slap
Alaid TechThread
Инструмент для поиска уязвимостей с помощью символьного исполнения. Ориентирован на работу с прошивками и небольшим объемом анализируемого кода. https://github.com/ChrisTheCoolHut/Firmware_Slap
Техника обхода CIG в Windows путем манипуляции c хэндлами
https://tyranidslair.blogspot.com/2019/08/windows-code-injection-bypassing-cig.html
https://tyranidslair.blogspot.com/2019/08/windows-code-injection-bypassing-cig.html
Blogspot
Windows Code Injection: Bypassing CIG Through KnownDlls
TL;DR; This blog post describes a technique to inject a DLL into a process using only Duplicate Handle process access (caveats apply) which ...
Очередной инструмент для автоматизации OSINT. Работает на основе https://opendata.rapid7.com
https://github.com/tg12/rapid7_OSINT
https://github.com/tg12/rapid7_OSINT
Rapid7 Open Data
Offering researchers and partners access to data from Project Sonar, which conducts internet-wide surveys to gain insights into global exposure to common vulnerabilities.
Инструмент для проведения фишинговых атак на пользователей office 365
https://github.com/mdsecactivebreach/o365-attack-toolkit
https://github.com/mdsecactivebreach/o365-attack-toolkit
GitHub
GitHub - mdsecactivebreach/o365-attack-toolkit: A toolkit to attack Office365
A toolkit to attack Office365. Contribute to mdsecactivebreach/o365-attack-toolkit development by creating an account on GitHub.
Стоимость атаки для деградации сети Tor оценивается в несколько тысяч долларов
https://www.zdnet.com/google-amp/article/degrading-tor-network-performance-only-costs-a-few-thousand-dollars-per-month/
https://www.zdnet.com/google-amp/article/degrading-tor-network-performance-only-costs-a-few-thousand-dollars-per-month/
ZDNet
Degrading Tor network performance only costs a few thousand dollars per month
Attackers can flood Tor's bridges with just $17k/month, Tor's load balancers for only $2.8k/month, academics say.
Анализ heap overflow в RDP
https://www.malwaretech.com/2019/08/dejablue-analyzing-a-rdp-heap-overflow.html
https://www.malwaretech.com/2019/08/dejablue-analyzing-a-rdp-heap-overflow.html
Malwaretech
DejaBlue: Analyzing a RDP Heap Overflow
In August 2019 Microsoft announced it had patched a collection of RDP bugs, two of which were wormable. The wormable bugs, CVE-2019-1181 & CVE-2019-1182 affect every OS from Windows 7 to Windows 10. There is some confusion about which CVE is which, though…
Подборка однострочников для проведения атак в Windows инфраструктуре
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/amp/
arno0x0x
Windows oneliners to download remote payload and execute arbitrary code
In the wake of the recent buzz and trend in using DDE for executing arbitrary command lines and eventually compromising a system, I asked myself « what are the coolest command lines an a…