Разбор LPE в Symantec Endpoint Protection
https://posts.specterops.io/cve-2019-12757-local-privilege-escalation-in-symantec-endpoint-protection-1f7fd5c859c6
https://posts.specterops.io/cve-2019-12757-local-privilege-escalation-in-symantec-endpoint-protection-1f7fd5c859c6
Medium
CVE-2019–12757: Local Privilege Escalation in Symantec Endpoint Protection
Symantec Endpoint Protection Version: 14.2 RU1 Build 3335 (14.2.3335.1000) and below Operating System Tested On: Windows 10 1803 x64
Forwarded from r0 Crew (Channel)
A Collection of Chrome Sandbox Escape POCs/Exploits for learning https://github.com/allpaca/chrome-sbx-db #exploit #dukeBarman
GitHub
GitHub - allpaca/chrome-sbx-db: A Collection of Chrome Sandbox Escape POCs/Exploits for learning
A Collection of Chrome Sandbox Escape POCs/Exploits for learning - allpaca/chrome-sbx-db
fzero_fuzzer
A fast Rust-based safe and thead-friendly grammar-based fuzz generator
https://github.com/gamozolabs/fzero_fuzzer
A fast Rust-based safe and thead-friendly grammar-based fuzz generator
https://github.com/gamozolabs/fzero_fuzzer
GitHub
GitHub - gamozolabs/fzero_fuzzer: A fast Rust-based safe and thead-friendly grammar-based fuzz generator
A fast Rust-based safe and thead-friendly grammar-based fuzz generator - gamozolabs/fzero_fuzzer
DEEPWARE SCANNER - сканер deepfake'ов
https://www.deepware.ai
https://www.deepware.ai
deepware.ai
Deepware | Scan & Detect Deepfake Videos
Scan & Detect Deepfake Videos Scan a suspicious video to find out if it's synthetically manipulated.Contact Us for on-premise solutions. GO TO SCANNER Enemy at the Gates Cybersecurity faces an emerging threat generally known as deepfakes. Malicious uses of…
Forwarded from r0 Crew (Channel)
Extending Ghidra: from Script to Plugins and Beyond https://vimeo.com/377180466 #ghidra #reverse #dukeBarman
Vimeo
Mike Bell: Extending Ghidra: from Script to Plugins and Beyond
Mike Bell speaking at the Jailbreak Brewing Company Security Summit on Friday, October 11, 2019. In this talk, Mike will explore the many ways to extend Ghidra.…
What I Learned from Reverse Engineering Windows Containers
https://unit42.paloaltonetworks.com/what-i-learned-from-reverse-engineering-windows-containers/
https://unit42.paloaltonetworks.com/what-i-learned-from-reverse-engineering-windows-containers/
Unit 42
What I Learned from Reverse Engineering Windows Containers
Our researcher provides an overview on containers - starting with their Linux history - and shows the different implementations of containers in Windows, how they work and the security pitfalls that may occur.
From iPhone to NT AUTHORITY\SYSTEM
https://decoder.cloud/2019/12/12/from-iphone-to-nt-authoritysystem/
https://decoder.cloud/2019/12/12/from-iphone-to-nt-authoritysystem/
Decoder's Blog
From iPhone to NT AUTHORITY\SYSTEM
As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. But what does Apple’s iPhone have to do with it?? Well, keep on r…
Persistence – Office Application Startup
https://pentestlab.blog/2019/12/11/persistence-office-application-startup/
https://pentestlab.blog/2019/12/11/persistence-office-application-startup/
Penetration Testing Lab
Persistence – Office Application Startup
Microsoft Office is the most popular product in Windows operating systems since it allows users to write and edit documents, create and present slides, gather notes, sent emails and perform calcula…
Hacking GitHub with Unicode's dotless 'i'.
https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/
https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/
Operation Wocao: Shining a light on one of China’s hidden hacking groups
https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/
https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/
POPPOPRET-nullbyte-DLL-bypass
A method to bypass a null byte in a POP-POP-RETN address for exploiting local SEH overflows via DLL injection
https://github.com/FULLSHADE/POPPOPRET-nullbyte-DLL-bypass
A method to bypass a null byte in a POP-POP-RETN address for exploiting local SEH overflows via DLL injection
https://github.com/FULLSHADE/POPPOPRET-nullbyte-DLL-bypass
From dropbox(updater) to NT AUTHORITY\SYSTEM
https://decoder.cloud/2019/12/18/from-dropboxupdater-to-nt-authoritysystem/
https://decoder.cloud/2019/12/18/from-dropboxupdater-to-nt-authoritysystem/
Decoder's Blog
From dropbox(updater) to NT AUTHORITY\SYSTEM
Hardlinks again! Yes, there are plenty of opportunities to raise your privileges due to incorrect permissions settings when combined with hardlinks in many softwares (MS included) ;-) In this post…
Using WebRTC ICE Servers for Port Scanning in Chrome
https://medium.com/tenable-techblog/using-webrtc-ice-servers-for-port-scanning-in-chrome-ce17b19dd474
https://medium.com/tenable-techblog/using-webrtc-ice-servers-for-port-scanning-in-chrome-ce17b19dd474
Medium
Using WebRTC ICE Servers for Port Scanning in Chrome
To everything (TURN! TURN! TURN!)
Powershell for exploitation and post exploitation
https://www.peerlyst.com/posts/powershell-for-exploitation-and-post-exploitation-david-dunmore
https://www.peerlyst.com/posts/powershell-for-exploitation-and-post-exploitation-david-dunmore