Pwning Pixel 6 with a leftover patch https://github.blog/2023-04-06-pwning-pixel-6-with-a-leftover-patch/
The GitHub Blog
Pwning Pixel 6 with a leftover patch
In this post, I’ll look at a security-related change in version r40p0 of the Arm Mali driver that was AWOL in the January update of the Pixel bulletin, where other patches from r40p0 was applied, and how these two lines of changes can be exploited to gain…
Writing a decent win32 keylogger [1/3] https://www.synacktiv.com/en/publications/writing-a-decent-win32-keylogger-13.html
Synacktiv
Writing a decent win32 keylogger [1/3]
👍1👌1
pryingdeep: Prying Deep - An OSINT tool to collect intelligence on the dark web. https://github.com/iudicium/pryingdeep
GitHub
GitHub - iudicium/pryingdeep: Prying Deep - An OSINT tool to collect intelligence on the dark web.
Prying Deep - An OSINT tool to collect intelligence on the dark web. - iudicium/pryingdeep
New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security https://thehackernews.com/2024/01/new-terrapin-flaw-could-let-attackers.html
CVE-2023-7102: A zero-day flaw affects Barracuda Email Security Gateway https://securityonline.info/cve-2023-7101-cve-2023-7102-two-0-day-flaws-affect-barracuda-email-security-gateway/
Daily CyberSecurity
CVE-2023-7102: A zero-day flaw affects Barracuda Email Security Gateway
Barracuda Networks has faced a formidable challenge with the discovery of two zero-day vulnerabilities, CVE-2023-7102 and CVE-2023-7101
Live Debugging Techniques for the Linux Kernel, Part 1 of 3 https://blogs.oracle.com/linux/post/live-kernel-debugging-1
Oracle
Live Debugging Techniques for the Linux Kernel, Part 1 of 3
The first of a three part series providing detailed instructions on how to debug a live Linux kernel. In this first part Alex Thorlton provides setup instructions to create an environment that will facilitate playing with the various techniques that will…
Ghidriff: Ghidra Binary Diffing Engine https://clearbluejar.github.io/posts/ghidriff-ghidra-binary-diffing-engine/
clearbluejar
Ghidriff: Ghidra Binary Diffing Engine
As seen in most security blog posts today, binary diffing tools are essential for reverse engineering, vulnerability research, and malware analysis. Patch diffing is a technique widely used to identify changes across versions of binaries as related to security…
Windows CLFS and five exploits used by ransomware operators https://securelist.com/windows-clfs-exploits-ransomware/111560/
Securelist
Windows CLFS and five exploits used by ransomware operators
We had never seen so many CLFS driver exploits being used in active attacks before, and then suddenly there are so many of them captured in just one year. Is there something wrong with the CLFS driver? Are all these vulnerabilities similar? These questions…
StarCraft Remastered: Emulating a buffer overflow for fun and profit https://www.youtube.com/watch?v=fcdUEpI0gyE
YouTube
REcon 2018 - StarCraft Remastered: Emulating a buffer overflow for fun and profit
This video is a re-run of my REcon 2018 presentation in Brussels.
Chapters:
00:00 Introduction
01:54 Fun facts
05:35 Presentation
Abstract:
StarCraft 1.16.1 and older had a buffer overflow bug in the map parsing code. The hackers in South Korea leveraged…
Chapters:
00:00 Introduction
01:54 Fun facts
05:35 Presentation
Abstract:
StarCraft 1.16.1 and older had a buffer overflow bug in the map parsing code. The hackers in South Korea leveraged…
SSH ProxyCommand == unexpected code execution (CVE-2023-51385) https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html
Vin01’s Blog
SSH ProxyCommand == unexpected code execution (CVE-2023-51385)
Summary
❤2
ETW internals for security research and forensics https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/
The Trail of Bits Blog
ETW internals for security research and forensics
Why has Event Tracing for Windows (ETW) become so pivotal for endpoint detection and response (EDR) solutions in Windows 10 and 11? The answer lies in the value of the intelligence it provides to security tools through secure ETW channels, which are now also…
Less SmartScreen More Caffeine: (Ab)Using ClickOnce for Trusted Code Execution https://posts.specterops.io/less-smartscreen-more-caffeine-ab-using-clickonce-for-trusted-code-execution-1446ea8051c5
SpecterOps
Less SmartScreen More Caffeine | SpecterOps Blog
With the barrier to entry for initial access ever increasing, we spent some time digging into potentially lesser-known weaponization options for ClickOnce deployments...
SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250) https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
AtlasLdr: Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls https://github.com/Krypteria/AtlasLdr
GitHub
GitHub - Krypteria/AtlasLdr: Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls
Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls - Krypteria/AtlasLdr
CVE-2023-6817: Linux kernel: use-after-free in nf_tables https://www.openwall.com/lists/oss-security/2023/12/22/6
Full Chain Baseband Exploits, Part 1 https://labs.taszk.io/articles/post/full_chain_bb_part1/
labs.taszk.io
Full Chain Baseband Exploits, Part 1
Full Chain Baseband Exploitation, Part 1
Threat Actor “UAC-0099”: Exploiting CVE-2023-38831 Against Ukraine https://securityonline.info/threat-actor-uac-0099-exploiting-cve-2023-38831-against-ukraine/
Daily CyberSecurity
Threat Actor "UAC-0099": Exploiting CVE-2023-38831 Against Ukraine
Cyber threat actor UAC-0099 has been actively targeting Ukraine since mid-2022, according to insights from the Deep Instinct Threat Lab
Rust Binary Analysis, Feature by Feature https://research.checkpoint.com/2023/rust-binary-analysis-feature-by-feature/
Check Point Research
Rust Binary Analysis, Feature by Feature - Check Point Research
Problem Statement You attempt to analyze a binary file compiled in the Rust programming language. You open the file in your favorite disassembler. Twenty minutes later you wish you had never been born. You’ve trained yourself to think like g++ and msvc: Here’s…
👌3
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable https://securityonline.info/cve-2023-42465-sudo-affected-by-stack-register-flaw-openssh-openssl-and-mysql-are-vulnerable/
Daily CyberSecurity
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable
Researchers issued CVE-2023-42465 for SUDO for this vulnerability. This flaw classified as critical has been found in sudo up to 1.9.14.
🔥2
Patching DLLs with BDF https://cryptonominom.com/2023/12/22/DLL-Patching.html
Cryptonominom
Patching DLLs with BDF
TL;DR