Hacking Brasil
241 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
Google: YouTube lento para todos que bloqueiam anúncios de publicidade

▶️Os usuários do Reddit descobriram que o Google fez alterações no código do YouTube, fazendo com que os vídeos da plataforma carregassem mais lentamente em navegadores com bloqueadores de anúncios ativos.

▶️O problema foi percebido pela primeira vez no Firefox, onde o YouTube começou a carregar 5 segundos mais lento que no Chrome.

▶️Os usuários da extensão uBlock Origin desenvolveram um filtro especial que permite contornar o carregamento lento de vídeos no YouTube.

#Google #YouTube #AdBlockers
This media is not supported in your browser
VIEW IN TELEGRAM
Leaking ASCII Kernel Data

SLAM exploits unmasked gadgets to let a userland process leak arbitrary ASCII kernel data. In the demo below, we leak the root password hash within half a minute on a last-generation Ubuntu system, where we emulate the upcoming Intel LAM feature.

Code and data:
https://github.com/vusec/slam
Feliz ano novo! Tudo de melhor para nós. 🎉
GTFONow

Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
#exploit
1. CVE-2023-40713:
Exploiting GOG Galaxy XPC service for privilege escalation in macOS
https://securityintelligence.com/x-force/exploiting-gog-galaxy-xpc-service-privilege-escalation-macos

2. CVE-2023-6560:
io_uring_io_uaddr_map() Dangerous Multi-Page Handling
https://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html

3. CVE-2022-36267:
Airspan AirSpot 5410 - Unauth Remote CI
https://github.com/0xNslabs/CVE-2022-36267-PoC
CVE-2024-20656

PoC for Local Privilege Escalation in the VSStandardCollectorService150 Service

Blog: https://www.mdsec.co.uk/2024/01/cve-2024-20656-local-privilege-escalation-in-vsstandardcollectorservice150-service/

During this blog post we will explore the VSStandardCollectorService150 service which used for diagnostic purposes by Visual Studio and is running in NT AUTHORITY\SYSTEM context, and how it can be abused to perform arbitrary file DACL reset in order to escalate privileges.
Ataque DDoS em um site a partir de um smartphone🗄

Um ataque DDoS a um site usando falhas de segurança e uma ferramenta chamada Hunner para detectar essas mesmas falhas.

Instalação:
$ pkg install git
$ pkg python

$ git clone https://github.com/b3-v3r/hunner
$ cd hunner
$ apt install repo-root
$ apt install hping3

Uso:

$ python hunner.py

Você verá um menu onde poderá selecionar funções para ataque. Se quiser realizar o mais comum, pressione “3” e depois “1”.
Demonized Shell
Advanced Tool for persistence in linux.

https://github.com/MatheuZSecurity/D3m0n1z3dShell
Acunetix Linux v23.11.0 - 23 Nov 2023

Download
: https://ponies.cloud/scanner_web/acunetix/Acunetix-v23.11.231123131-Linux-Pwn3rzs-CyberArsenal.7z
Password: Pwn3rzs

Changelog:
Too long for a post, refer here:
https://www.acunetix.com/changelogs/acunetix-premium/v23-11-0-november-2023/


Enjoy!
Fortify SCA 23.2

Windows
:
SCA:
https://ponies.cloud/source_code_analysis/fortifySCA/win/Fortify_SCA_23.2.0_Windows.zip


Tools:
https://ponies.cloud/source_code_analysis/fortifySCA/win/Fortify_Tools_23.2.0_Windows.zip



Mac:
SCA:
https://ponies.cloud/source_code_analysis/fortifySCA/osx/Fortify_SCA_23.2.0_Mac.tar.gz


Tools:
https://ponies.cloud/source_code_analysis/fortifySCA/osx/Fortify_Tools_23.2.0_Mac.tar.gz



Linux:
SCA:
https://ponies.cloud/source_code_analysis/fortifySCA/lin/Fortify_SCA_23.2.0_Linux.tar.gz


Tools:
https://ponies.cloud/source_code_analysis/fortifySCA/lin/Fortify_Tools_23.2.0_Linux.tar.gz



Crack & License file:
https://ponies.cloud/source_code_analysis/fortifySCA/Fortify_SCA_23.2_Crack_pwn3rzs_cyberarsenal.7z



Rules
:
https://ponies.cloud/source_code_analysis/fortifySCA/FortifyRules_2023.3.0.0006_en.zip

Password
: 
Pwn3rzs


Setup:
Read the README.txt file

Enjoy!
CVE-2023-21823:
Windows Graphics Component RCE
https://github.com/Elizarfish/CVE-2023-21823

CVE-2023-6875:
WordPress POST SMTP Mailer 2.8.7 Authorization Bypass / Cross Site Scripting
https://github.com/UlyssesSaicha/CVE-2023-6875
100 Free Security Tools by Cyber Threat Intelligence, 2023
(Remote Code Execution) Vulnerability In #Confluence Data Center and Confluence Server with #CVSS v3: 10/10

Severity:
Atlassian rates the severity level of this vulnerability as critical (10.0 with the following vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) per our internal assessment.
This is our assessment, and you should evaluate its applicability to your own IT environment.

Affected Versions:
This RCE (Remote Code Execution) vulnerability affects out-of-date Confluence Data Center and Server 8 versions released before Dec. 5, 2023 as well as 8.4.5 which no longer receives backported fixes in accordance with our Security Bug Fix Policy. Atlassian recommends patching to the latest version.

Note: 7.19.x LTS versions are not affected by this vulnerability

Product
Confluence Data Center and Server

Affected Versions
8.0.x
8.1.x
8.2.x
8.3.x
8.4.x
8.5.0-8.5.3

https://www.opencve.io/cve/CVE-2023-22527

https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html

PoC: https://github.com/Avento/CVE-2023-22527_Confluence_RCE
Acunetix Windows v24.1 - 11 Jan 2024

Download
: https://ponies.cloud/scanner_web/acunetix/Acunetix-v24.1.240111130-Windows-Pwn3rzs-CyberArsenal.rar
Password: Pwn3rzs

Changelog:
Too long for a post, refer here:
https://www.acunetix.com/changelogs/acunetix-premium/v24-1-11-january-2024/


Enjoy!