background preloader

Bug Bounty & Exploits

Facebook Twitter

Car Hacking 101 - Alan Mond, LevelUp 2017. Wifiphisher/wifiphisher: Automated victim-customized phishing attacks against Wi-Fi clients. ImageTragick. Smiegles/crossdomain: Exploit insecure crossdomain.xml files. XPN InfoSec Blog. In my previous post, I showed a number of ways of gaining SYSTEM privileges.

XPN InfoSec Blog

The post ended up being a lot more successful than I thought it would, so thanks to everyone who checked it out :) In this post I wanted to take a look at something which I touched on previously, and that is just how a Windows kernel based exploit achieves privilege escalation. Rather than take something like HackSys Extreme Vulnerable Windows Driver, I wanted to work on something a little bit different, and came across an vulnerability recently disclosed by Google Project Zero here.

This vulnerability is pretty nice and easy to understand due to the effort mjurczyk put into the writeup, and is also marked as a "Wont-Fix" from Microsoft which means that 32-bit versions of Windows 10 Creators Edition are still vulnerable. So.... let's get started. Vulnerability overview. Symantec Encryption Desktop Local Privilege Escalation – Exploiting an Arbitrary Hard Disk Read/Write Vulnerability Over NTFS – Nettitude Labs.

“Huge Dirty COW” (CVE-2017–1000405) – Bindecy. The “Dirty COW” vulnerability (CVE-2016–5195) is one of the most hyped and branded vulnerabilities published.

“Huge Dirty COW” (CVE-2017–1000405) – Bindecy

Every Linux version from the last decade, including Android, desktops and servers was vulnerable. The impact was vast — millions of users could be compromised easily and reliably, bypassing common exploit defenses. Plenty of information was published about the vulnerability, but its patch was not analyzed in detail. We at Bindecy were interested to study the patch and all of its implications. Surprisingly, despite the enormous publicity the bug had received, we discovered that the patch was incomplete. “Dirty COW” recap. FileRun < 2017.09.18 - SQL Injection. #!

FileRun < 2017.09.18 - SQL Injection

/usr/bin/env python. Mac OS X Local Javascript Quarantine Bypass. Details Mac OS X contains a vulnerability that allows the bypass of the Apple Quarantine and the execution of arbitrary Javascript code without restrictions.

Mac OS X Local Javascript Quarantine Bypass

Basically, Apple's Quarantine works by setting an extended attribute to downloaded files (and also to files extracted from downloaded archive/image) that tells the system to open/execute those files in a restricted environment. For example, a quarantined html file won't be able to load local resources. The vulnerability is in one html file, part of the Mac OS X core, that is prone to a DOM Based XSS allowing the excution of arbitrary javascript commands in its (unrestricted) context. A demo video is available at. CVE-2017-0785/CVE-2017-0785.py at master · ojasookert/CVE-2017-0785. 1302 - Apple: Heap Overflow in AppleBCMWLANCore driver when handling Completed Firmware Timestamp messages (0x27) - project-zero - Monorail.

RIPS - Joomla! 3.7.5 - Takeover in 20 Seconds with LDAP Injection. With over 84 million downloads, Joomla!

RIPS - Joomla! 3.7.5 - Takeover in 20 Seconds with LDAP Injection

Is one of the most popular content management systems in the World Wide Web. It powers about 3.3% of all websites’ content and articles. Our code analysis solution RIPS detected a previously unknown LDAP injection vulnerability in the login controller. This one vulnerability could allow remote attackers to leak the super user password with blind injection techniques and to fully take over any Joomla! <= 3.7.5 installation within seconds that uses LDAP for authentication. DIY Spy Program: Abusing Apple's Call Relay Protocol - Martin Vigo. Introduction Apple introduced a new set of features in iOS 8 and Yosemite under the name “Continuity”.

DIY Spy Program: Abusing Apple's Call Relay Protocol - Martin Vigo

These features allow iPhones to work with other iDevices such as Macs and iPads in new ways. Handoff, Instant hotspot and Airdrop are some of the new services offered by Continuity. Among these new services is one named “Call Relay”. Essentially, it allows one to make and receive phone calls via iDevices and route them through the iPhone. In order for it to work, both devices (iPhone and the iDevice that makes/takes the call) need to be on the same WiFi. Sec17 redini. How can I securely use CSS-in-JS with React? — React Armory. CSS-in-JS is an exciting new technology that completely eliminates the need for CSS class names.

How can I securely use CSS-in-JS with React? — React Armory

It makes it possible to add styles directly to your components, using the full power of CSS. Unfortunately, it also promotes interpolation of unescaped props into that CSS, opening you up to injection attacks. And CSS injection attacks are a major security hazard. Mastercard Internet Gateway Service: Hashing Design Flaw – Tinyhack.com. Last year I found a design error in the MD5 version of the hashing method used by Mastercard Internet Gateway Service.

Mastercard Internet Gateway Service: Hashing Design Flaw – Tinyhack.com

The flaw allows modification of transaction amount. They have awarded me with a bounty for reporting it. This year, they have switched to HMAC-SHA256, but this one also has a flaw (and no response from MasterCard). If you just want to know what the bug is, just skip to the Flaw part. What is MIGS? Objective-See. High Sierra's 'Secure Kernel Extension Loading' is Broken › a new 'security' feature in macOS 10.13, is trivial to bypass love these blog posts?

Objective-See

Support my tools & writing on patreon! Mahalo :) Background With each new release of macOS, Apple introduces new 'built-in' security enhancements...and macOS High Sierra (10.13) is no exception. In this blog post we'll take a brief look at High Sierra's somewhat controversial "Secure Kernel Extension Loading" (SKEL) feature. . $ kextstat Index Refs Size Wired Name 1 90 0x9e30 0x9e30 com.apple.kpi.bsd 2 8 0x3960 0x3960 com.apple.kpi.dsep ... 130 0 0x4b00 0x4b000 com.un.approved.kext. Diff - e33fd30777f99a0d6e16b16d096a2663b1031457^! - v8/v8.git - Git at Google. SharknAT&To - Nomotion Blog. Introduction When evidence of the problems described in this report were first noticed, it almost seemed hard to believe.

SharknAT&To - Nomotion Blog

However, for those familiar with the technical history of Arris and their careless lingering of hardcoded accounts on their products, this report will sadly come as no surprise. For everyone else, prepare to be horrified. Escaping a Python sandbox with a memory corruption bug. BIOS SMI Handler Input Validation Failures. Lenovo Security Advisory: LEN-14695 Potential Impact: Execution of code in System Management Mode by an attacker with local administrative access Severity: High Scope of Impact: Industry-Wide. Pre-domain wildcard CORS Exploitation – Arbaz Hussain – Medium. Exploitation : Now it’s time to find Good Exploitation Endpoint to demonstrate & Increase the Impact.There was nothing much on connect.redacted.com to exploit just like static site asking to install their browser extension . But one thing kept my MINDSET to find some exploitation path is that to install that extension you need to be logged in .

I doubted they were storing some information somewhere . So I Started bruteforcing , Reading docs for API Endpoints . And came across which contain’s the user detail’s along with SESSIONID in json response . Able to Takeover user account’s remotely. PowerPoint File Armed with CVE-2017-0199 and UAC Bypass. FortiGuard Labs recently discovered a new malicious PowerPoint file named ADVANCED DIPLOMATIC PROTOCOL AND ETIQUETTE SUMMIT.ppsx.

Taking a look at the four slides of the PowerPoint Open XML Slide Show (PPSX) file, we can tell that it targets people from UN agencies, Foreign Ministries, International Organizations, and those who interact with international governments. We will take a look on how opening this PowerPoint file could compromise your system. Here’s an overview on how the attack works: OS X KERNEL EXPLOIT 기초 (OS X 10.12 SIERRA) &vert; THEORI. Written by reset + s0ngsari 최근 많은 연구들이 Windows 운영체제에 초점이 맞추어져 있지만, 보안적인 측면에서 아이폰과 맥북에 탑재되는 iOS와 macOS를 빼놓을 수 없다. 이번 블로그 시리즈를 통해서 OS X 커널에서의 버그 분석 및 익스플로잇 기법 등을 알아본다. Public Database Directory - Public DB Host. Vulnerable Docker VM - NotSoSecure. Multiple vulnerabilities in RubyGems.

From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks. [Demo] From random block corruption to privilege escalation. Positive Technologies - learn and secure : Disabling Intel ME 11 via undocumented mode. Our team of Positive Technologies researchers has delved deep into the internal architecture of Intel Management Engine (ME) 11, revealing a mechanism that can disable Intel ME after hardware is initialized and the main processor starts. In this article, we describe how we discovered this undocumented mode and how it is connected with the U.S. government's High Assurance Platform (HAP) program. Disclaimer: The methods described here are risky and may damage or destroy your computer. We take no responsibility for any attempts inspired by our work and do not guarantee the operability of anything. For those who are aware of the risks and decide to experiment anyway, we recommend using an SPI programmer.

Introduction Intel Management Engine is a proprietary technology that consists of a microcontroller integrated into the Platform Controller Hub (PCH) chip and a set of built-in peripherals. How to disable ME. Exploiting Node.js deserialization bug for Remote Code Execution. Rattler:identifying and exploiting dll preloading vulnerabilities. In this blog post I am going to describe a new tool (Rattler) that I have been working on and discuss some of the interesting anomalies found while building it. Rattler can be found on our Github repo and was recently discussed at BSides Cape Town. What is Rattler? Rattler helps identify which application DLL’s are vulnerable to DLL preloading attacks. In a nutshell, DLL preloading attacks allow you to trick applications into loading and executing malicious DLL’s.

DLL preloading attacks can result in escalation of privileges, persistence and RCE in some cases. Hyper-V backdoor for UEFI. A Stealth DoS Attack Against CAN-based Automotive Networks [ICS-ALERT-17-209-0] Mitigation tool. Le journal d'un reverser: Meet the "Wake" malware: DDOS and more! My latest blogpost was detailing how to setup a qemu ARM system to do malware analysis, it's now time to use it for analyze an unknown binary. I went to website, and found the 'wake' binary, which looks promising: Vine User Private information disclosure - Bug Bounty POC. Vine User Private information disclosure – BugBountyPOC. Benkow_: Quick look at another Alina fork: XBOT-POS. Hi, it's time for a new post. Today I'll try to have a look at the "Team NZMR" I've found this funny team by hazard on Twitter via the bot @ScumBots I would like to write this little blog post because I think that this is interesting to see an Alina panel behind a .onion domain and as you can see later, I like look at some weird panels :D.

Let's have a look on this server. TrendLabs Security Intelligence BlogCVE-2017-0199: New Malware Abuses PowerPoint Slide Show - TrendLabs Security Intelligence Blog. By Ronnie Giagone and Rubio Wu. [Demo] From random block corruption to privilege escalation. Thinkst Thoughts...: All your devs are belong to us: how to backdoor the Atom editor. This is the first post in a series highlighting bits from our recent BlackHat USA 2017 talk. An index of all the posts in the series is here. Office 365 - Advanced Threat Protection (ATP): Features and Shortfalls - TrustedSec. Harvesting Cb Response Data Leaks for fun and profit. Carbon Black’s Cb Response product is one of the more popular endpoint detection and response (EDR) tools available in an ever-growing marketspace.

However, as a function of how the tool is architected, it is also a prolific data leaker. This threat report blog will help security organizations understand how our vulnerability assessment experts harvested data from Carbon Black’s Cb Response customers and how it is nearly impossible to stop this with the architecture they devised. How severe is the problem? Our experts could recover the following types of information from several Fortune 1000 companies: The leaked data exist primarily around various executable formats (we haven’t seen evidence of this in documents or pdfs yet).

Carbon Black Background:Carbon Black started life as an application whitelisting company called Bit9. Project Zero: Windows Exploitation Tricks: Arbitrary Directory Creation to Arbitrary File Read. Posted by James Forshaw, Project Zero For the past couple of months I’ve been presenting my “Introduction to Windows Logical Privilege Escalation Workshop” at a few conferences. $10k host header - Test. Windows Exploitation Tricks: Arbitrary Directory Creation to Arbitrary File Read. Security vulnerabilities fixed in Firefox 55. Smuggling HTA files in Internet Explorer/Edge.

Shellcode: Windows API hashing with block ciphers ( Maru Hash ) Creating Real Looking User Accounts in AD Lab. Juniper Networks - 2017-07 Security Bulletin: SRX Series: Hardcoded credentials in Integrated UserFW feature. (CVE-2017-2343) Microsoft Windows - LNK Shortcut File Code Execution. Android_vuln_poc-exp/EXP-CVE-2016-6738 at master · jiayy/android_vuln_poc-exp. Stored XSS at Google firebase via Google Cloud IAM. One Cloud-based Local File Inclusion = Many Companies affected.

A Windows UAC Bypass using Device Manager – i break software. [BugBounty] Decoding a $□,000.00 htpasswd bounty. Get_content. [Uber 8k Bug] Login CSRF + Open Redirect = Account Take Over – Ron Chan. How I could Steal Your Google Bug Hunter Account with Two Clicks in IE – Ron Chan. Respect XSS: A Look at CVE-2017-8514. Path of Least Resistance: Cellular Baseband to Application Processor Escalation on Mediatek Devices.

1296 - VirtualBox: Windows Process DLL UNC Path Signature Bypass EoP - project-zero - Monorail. WiSec17 ulqinaku. Zero Day Initiative — Pythonizing the VMware Backdoor. Revoke obfuscation report. Exploiting Cross Origin Resource Sharing. Vine User Private information disclosure - Bug Bounty POC. Hacking Voting Machines at DEF CON 25. 2017 Runner-Up: Neville Longbottom – Underhanded Crypto Contest. [CVE-2017-11105] OnePlus 2 Lack of SBL1 Validation Broken Secure Boot.