cyberfeed · @cyberfeed
804 followers · 9737 posts · Server mstdn.social
Carlos Mogas da Silva · @r3pek
297 followers · 1328 posts · Server mastodon.r3pek.org

Linux PrivEsc - I have just completed this room! Check it out: tryhackme.com/room/linuxprives escalation privilege escalation via @RealTryHackMe

#tryhackme #privesc #privilege #linux #tib3rius #linuxprivesc

Last updated 2 years ago

Astra Kernel :verified: · @AstraKernel
572 followers · 584 posts · Server infosec.exchange
Bishop Fox · @BishopFox
739 followers · 91 posts · Server infosec.exchange

Several were identified in Avicena Medical Laboratory by Bishop Fox Researcher Dardan Prebreza. The issues were as follows:

- A critical remote incorrect access control vulnerability that could be exploited to retrieve ~166,000 COVID-19 test results

- A low-risk bug involving vulnerable software that could lead to

See the technical write-up for more info: bishopfox.com/blog/160k-covid-

#vulnerabilities #privesc

Last updated 2 years ago

JM ☠️ · @jmamblat
214 followers · 36 posts · Server infosec.exchange
crackerjack :silverblue: · @jack
77 followers · 126 posts · Server nerfherders.io

This looks like a nasty one! I've always been suspicious of snap and the general direction Ubuntu has been headed in this regard. I doubt this'll be the last we hear about these types of flaws.

securityaffairs.co/wordpress/1

#cybersecurity #cybersecuritynews #privesc #linux #ubuntu

Last updated 2 years ago

@konst LinPEAS and WinPEAS is a good starting point if you’ve got access to the box.

But I suspect you’re not asking for ways to find on these boxes 😅

#privesc

Last updated 2 years ago

eg0n ✅ · @eg0n
45 followers · 51 posts · Server defcon.social

to to.

It sounds like kinda NINy, kinda Quakey thanks to the wave rectifier.

#music #privesc #modular #synths #synth #synthesiser #modularsynth #hacker #hackers #waves

Last updated 2 years ago

LazyTitan · @LazyTitan33
8 followers · 3 posts · Server infosec.exchange

Year of the Dog - I have just completed this room! Check it out: tryhackme.com/room/yearofthe… -style Year of the Dog via @RealTryHackMe

#tryhackme #linux #web #cert #privesc #new #muirlandoracle #year #sqlite #gitea #yearofthedog

Last updated 2 years ago

Rairii :windows: · @Rairii
-1 followers · 650 posts · Server infosec.exchange

OK, so everyone seemed to enjoy the last one. Here's another :)

This time for the called DriverTalent, also known as DriveTheLife from Shenzhen DriveTheLife Software Technology Co.Ltd

Vendor website is hxxps://160.com in Chinese and hxxps://www.drivethelife.com in English.

To me the vendor is a bad actor. It's a PUP, and the same developers once bundled a mapper driver (send IOCTL with obfuscated unsigned driver PE, it loads it) with most of their products, some of which have been distributed in the past via bundler networks.

Here's the technical details:

  • It installs a service, DevDrvSvc (in the zh-CN version) or LDrvSvc (in the english version), that runs as SYSTEM.
  • This service exposes IPC via shared memory (with a semaphore to lock that memory, an event to notify the server that a message is sent, and an event to notify the client that a message was replied to).
  • All the objects are created with a security descriptor that has a NULL access control list (so everyone at Medium IL can access them).
  • The IPC commands include creating an arbitrary process (where the command line and application name are obfuscated by 1024-byte XOR key) as SYSTEM (in session zero or current session); copying a file as SYSTEM with arbitrary source and destination paths; deleting a file as SYSTEM with arbitrary path.

Latest known vulnerable components are devdrvsvc.dll v1.0.21.616 and LDrvSvc.dll v2.0.8.610.

Uninstallation of this software will prevent exploitation of the issue.

PoC code will fit in a reply.

#privesc #zeroday #PotentiallyUnwantedProgram #pup #0day

Last updated 2 years ago

Rairii :windows: · @Rairii
-1 followers · 650 posts · Server infosec.exchange

OK, so I'm going to drop a nice here. At least I think it's 0day, but for bring your own vulnerable driver purposes it's still not blocklisted (despite reporting it months ago, maybe MS only adds drivers that are actively exploited):

BattlEye Anti-Cheat BEDAISY.SYS PPL privesc:

  • Have the string "top BEService&pi" somewhere in your executable PE image. You can just write it to .data if you want.
  • Load bedaisy.
  • Open its \\?\GLOBALROOT\Device\BattlEye device.
  • Write a 9-byte zerofilled buffer to it.
  • Congratulations, you just got WinTCB PPL, go tamper with lsass or whatever.

#zeroday #anticheat #privesc

Last updated 2 years ago

Who Let The Dogs Out · @ashed
68 followers · 6578 posts · Server mastodon.ml

Abuse AD CS via dNSHostName Spoofing

This blog covers the technical details of CVE-2022-26923. Active Directory Domain Services Elevation of Privilege Vulnerability via AD CS dNSHostName Spoofing.

research.ifcr.dk/certifried-ac

When you have SYSTEM on server/workstation:
gist.github.com/Wh04m1001/355c

#redteam #privesc #adcs #ad

Last updated 2 years ago

Who Let The Dogs Out · @ashed
68 followers · 6578 posts · Server mastodon.ml

*DNSHostName Spoofing combined with KrbRelayUp*

Domain user to domain admin without the requirement for adding/owning previously a computer account. Step-by-step write-up of the attack in a pure Windows environment.

gist.github.com/tothi/f89a3712

#redteam #relay #ldap #privesc #adcs #ad

Last updated 2 years ago

Schon wieder Freitag und unser letztes -Video ist Live. Oder zumindest das Letzte, in dem wir unser Ziel angreifen, denn nach diesem Video sind wir endlich . Wie es danach weiter geht, erfahrt ihr am Schluss!

youtu.be/-jIIfdjzKMs

#nethack #root #ethical #hacking #privesc #ctf

Last updated 6 years ago

Tinker ☀️ · @tinker
8187 followers · 4740 posts · Server infosec.exchange

Full PRTG response to the PrivEsc vuln with patch information!

Patch is available. If you run PRTG Network Monitor, please update!

kb.paessler.com/en/topic/81765

#infosec #hacking #privesc #patch

Last updated 6 years ago

Tinker ☀️ · @tinker
8187 followers · 4740 posts · Server infosec.exchange

Windows Privilege Escalation by exploiting security product PRTG Network Monitor.

Still no patch! This is live!

PoC Exploit Code: github.com/Critical-Start/Sect

Great writeup of process of discovering PrivEsc’s! Read to learn how to do it yourself!

criticalstart.com/2018/10/prtg

#hacking #infosec #privesc

Last updated 6 years ago