Код в мешке
208 subscribers
8.03K photos
1.29K videos
2.06K files
35.9K links
Код в мешке - про кодинг, и не только...
Это личная записная книжка

https://t.me/joinchat/AAAAAEIy6oGlr8oxqTMS5w
Download Telegram
Forwarded from TechToday News
#Windows #Security #Exploit #Article

Windows Exploitation Tricks: Arbitrary Directory Creation to Arbitrary File Read

In this post I’m going to give a technique to go from an arbitrary directory creation vulnerability to arbitrary file read. Arbitrary direction creation vulnerabilities do exist - for example, here’s one that was in the Linux subsystem - but it’s not always obvious how you’d exploit such a bug in contrast to arbitrary file creation where a DLL is dropped somewhere. You could abuse DLL Redirection support where you create a directory calling program.exe.local to do DLL planting but that’s not always reliable as you’ll only be able to redirect DLLs not in the same directory (such as System32) and only ones which would normally go via Side-by-Side DLL loading.

https://googleprojectzero.blogspot.co.uk/2017/08/windows-exploitation-tricks-arbitrary.html

final script on GITHUB :
https://gist.github.com/tyranid/221bf08dd3ddb88ec33d2573a83482d0
Чат канала @R0_Crew

Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Invite Bot: @r0crew_bot

https://t.me/joinchat/AAAAAEPI6ZcpRAslyjQRbA

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/reverse4you_org
VK: https://vk.com/reverse_engineering

#security #malware #exploit #pentest
Forwarded from TechToday News
#Vulnerability #Exploit #Article

Exploiting the Magellan bug on 64-bit Chrome Desktop

In December 2018, the Tencent Blade Team released an advisory for a bug they named “Magellan”, which affected all applications using sqlite versions prior to 2.5.3. In their public disclosure they state that they successfully exploited Google Home using this vulnerability. Despite several weeks having passed after the initial advisory, no public exploit was released. We were curious about how exploitable the bug was and whether it could be exploited on 64-bit desktop platforms. Therefore, we set out to create an exploit targeting Chrome on 64-bit Ubuntu.

https://blog.exodusintel.com/2019/01/22/exploiting-the-magellan-bug-on-64-bit-chrome-desktop/
🖥 Репозиторий: Exploit Street — ориентирование в новой области Windows LPE

Exploit Street — это полезный репозиторий, который включает все известные уязвимости Windows за 2023 и 2024 год.

— Этот репозиторий является местом, где мы погружаемся в постоянно меняющийся мир кибербезопасности, уделяя особое внимание эксплойтам для локального повышения привилегий (LPE), направленным на системы Windows.

Ссылка на GitHub (https://github.com/MzHmO/Exploit-Street)

#Exploit #Windows #Vulnerability
@hackernews_lib