Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
๐Ÿšจ CVE-2022-34502
Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file.

๐ŸŽ–@cveNotify
IDA Pro 8.0 released!

โ„น๏ธ Golang 1.18
โ„น๏ธ iOS 16 dyld shared cache support
โ„น๏ธ ARC decompiler
โ„น๏ธ Better firmware analysis
โ„น๏ธ FLAIR pattern generator (makepat)

https://hex-rays.com/products/ida/news/8_0/

๐ŸŽ–@cveNotify
๐Ÿคฎ4๐Ÿ˜3
Image displays its own MD5 hash
๐Ÿ—ฃASIC_SP

Absolute noob question incoming... What are some practical uses for this?
๐Ÿ‘คWhatArghThose

There's a mathematical function (maybe in parametric form) whose graph is the "picture of the algebraic equation" of the function itself. I can't find it right now. [not exactly correct, see below\]

EDIT:

Tupper's self-referential formula:

https://en.wikipedia.org/wiki/Tupper%27s_self-referential_formula
๐Ÿ‘คAcrobatic-Cause-4925

See also: This PDF is an NES ROM that prints its own MD5 hash!
๐Ÿ‘คcbarrick


๐ŸŽ–@malwr
๐Ÿ‘1
Microsoft Shift F10 bypass + Autopilot privilege escalation
๐Ÿ—ฃk4m1ll0

Am i missing something, or could you just as easily pop out the harddisk and put it in another machine to remove the DisableCMDRequest.TAG file/do whatever you want?
๐Ÿ‘คBl00dsoul

There are ways to disable it: https://call4cloud.nl/2022/01/the-oobe-massacre-the-beginning-of-shift-f10/

Another attack vector would be audit mode at beginning of setup. After creating admin accounts or whatever sysprep back to OOBE to continue with autopilot
๐Ÿ‘คHankMardukasNY

This vuln is fairly well-known in the Intune community, but mostly theoretical - great to see a writeup and full attack chain. Do you have any recommendations for mitigating it? I've focused on using preprovisioning to lock down the system and defaultuser0, but being able to alt-tab and modify system state at all seems like a huge attack surface
๐Ÿ‘คPl4nty


๐ŸŽ–@malwr
๐Ÿ‘1