Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Image displays its own MD5 hash
πŸ—£ASIC_SP

Absolute noob question incoming... What are some practical uses for this?
πŸ‘€WhatArghThose

There's a mathematical function (maybe in parametric form) whose graph is the "picture of the algebraic equation" of the function itself. I can't find it right now. [not exactly correct, see below\]

EDIT:

Tupper's self-referential formula:

https://en.wikipedia.org/wiki/Tupper%27s_self-referential_formula
πŸ‘€Acrobatic-Cause-4925

See also: This PDF is an NES ROM that prints its own MD5 hash!
πŸ‘€cbarrick


πŸŽ–@malwr
πŸ‘1
Microsoft Shift F10 bypass + Autopilot privilege escalation
πŸ—£k4m1ll0

Am i missing something, or could you just as easily pop out the harddisk and put it in another machine to remove the DisableCMDRequest.TAG file/do whatever you want?
πŸ‘€Bl00dsoul

There are ways to disable it: https://call4cloud.nl/2022/01/the-oobe-massacre-the-beginning-of-shift-f10/

Another attack vector would be audit mode at beginning of setup. After creating admin accounts or whatever sysprep back to OOBE to continue with autopilot
πŸ‘€HankMardukasNY

This vuln is fairly well-known in the Intune community, but mostly theoretical - great to see a writeup and full attack chain. Do you have any recommendations for mitigating it? I've focused on using preprovisioning to lock down the system and defaultuser0, but being able to alt-tab and modify system state at all seems like a huge attack surface
πŸ‘€Pl4nty


πŸŽ–@malwr
πŸ‘1