Windows CLFS Driver Privilege Escalation
This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.
Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.
Research: https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability
Exploit: https://github.com/duck-sec/CVE-2023-28252-Compiled-exe
This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.
Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.
Research: https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability
Exploit: https://github.com/duck-sec/CVE-2023-28252-Compiled-exe
Coresecurity
Analysis of CVE-2023-28252 CLFS Vulnerability | Core Security
The CVE-2023-28252 vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. This blog will provide a detailed analysis and proof of concept for…
👍1
How to detect android malware using Random Forest Classifier and explain it use linearsvc
https://github.com/liansecurityOS/android-malware-detection
https://github.com/liansecurityOS/android-malware-detection
GitHub
GitHub - liansecurityOS/android-malware-detection: This is a opensource repo about how to detect android malware using Random Forest…
This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc. - liansecurityOS/android-malware-detection
🔥3
How to protect Evilginx using Cloudflare and HTML Obfuscation
https://www.jackphilipbutton.com/post/how-to-protect-evilginx-using-cloudflare-and-html-obfuscation
https://www.jackphilipbutton.com/post/how-to-protect-evilginx-using-cloudflare-and-html-obfuscation
Jack Button
How to protect Evilginx using Cloudflare and HTML Obfuscation
Using a combination of Cloudflare and HTML Obfuscation, it is possible to protect your Evilginx server from being flagged as deceptive and so increase your chances of success on Red Team and Social Engineering engagements. Anyone who has tried to run a Social…
🔥2
ThievingFox - Remotely retrieving credentials from password managers and Windows utilities
https://blog.slowerzs.net/posts/thievingfox/
https://github.com/Slowerzs/ThievingFox/
https://blog.slowerzs.net/posts/thievingfox/
https://github.com/Slowerzs/ThievingFox/
Slowerzs' blog
ThievingFox - Remotely retrieving credentials from password managers and Windows utilities
🔥3
Disable Windows Defender (+ UAC Bypass, + Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
https://github.com/EvilGreys/Disable-Windows-Defender-
🔥4❤🔥1👎1
Skrapa is a zero dependency and customizable Python library for scanning Windows and Linux process memory.
https://research.nccgroup.com/2024/01/25/memory-scanning-for-the-masses/
https://github.com/fox-it/skrapa
https://research.nccgroup.com/2024/01/25/memory-scanning-for-the-masses/
https://github.com/fox-it/skrapa
Send phishing messages and attachments to Microsoft Teams users
https://github.com/Octoberfest7/TeamsPhisher
https://github.com/Octoberfest7/TeamsPhisher
GitHub
GitHub - Octoberfest7/TeamsPhisher: Send phishing messages and attachments to Microsoft Teams users
Send phishing messages and attachments to Microsoft Teams users - Octoberfest7/TeamsPhisher
🔥2👍1
A Deep Dive Into Exploiting Windows Thread Pools
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
urien.gitbook.io
A Deep Dive Into Exploiting Windows Thread Pools | Diago Lima
🔥2
Active Directory Enumeration for Red Teams
https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
MDSec
Active Directory Enumeration for Red Teams - MDSec
The Directory Service is the heart and soul of many organisations, and whether its Active Directory, OpenLDAP or something more exotic, as a source of much knowledge it often acts...
🔥2
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).
https://github.com/wh0amitz/SharpADWS
https://github.com/wh0amitz/SharpADWS
GitHub
GitHub - wh0amitz/SharpADWS: Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services…
Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS). - wh0amitz/SharpADWS
🔥2
This Proof-Of-Concept demonstrates the exploitation of CVE-2023-22098 against VirtualBox 7.0.10 r158379
https://github.com/google/security-research/tree/master/pocs/oracle/virtualbox/cve-2023-22098
https://github.com/google/security-research/tree/master/pocs/oracle/virtualbox/cve-2023-22098
GitHub
security-research/pocs/oracle/virtualbox/cve-2023-22098 at master · google/security-research
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research
🔥2
Pivoting from Microsoft Cloud to On-Premise Machines
https://whiteknightlabs.com/2024/02/21/pivoting-from-microsoft-cloud-to-on-premise-machines/
https://whiteknightlabs.com/2024/02/21/pivoting-from-microsoft-cloud-to-on-premise-machines/
White Knight Labs
Pivoting from Microsoft Cloud to On-Premise Machines | White Knight Labs
This article will demonstrate one situation discovered during a recent cloud penetration test that allowed us to pivot from a Microsoft cloud
🔥2
GitHub - xhzeem/toxicache: Go scanner to find web cache poisoning vulnerabilities in a list of URLs
https://github.com/xhzeem/toxicache
https://github.com/xhzeem/toxicache
GitHub
GitHub - xhzeem/toxicache: Go scanner to find web cache poisoning vulnerabilities in a list of URLs
Go scanner to find web cache poisoning vulnerabilities in a list of URLs - xhzeem/toxicache
🔥3👍1
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
rootkit
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
Intro Recently, I had the pleasure to attend the training on Windows Kernel Exploitation at nullcon by the HackSysTeam. The training was well executed, and I got the intro into the world of kernel. But, as you know, nobody could teach you internals about…
🔥4
Kali Linux 2024.1 Release (Micro Mirror) | Kali Linux Blog
https://www.kali.org/blog/kali-linux-2024-1-release
https://www.kali.org/blog/kali-linux-2024-1-release
Kali Linux
Kali Linux 2024.1 Release (Micro Mirror)
Hello 2024! Today we are unveiling Kali Linux 2024.1. As this is our the first release of the year, it does include new visual elements! Along with this we also have some exciting new mirrors to talk about, and of course some package changes - both new tools…
🔥2❤1
Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386)
https://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC
https://github.com/vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC
GitHub
GitHub - vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC: Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386)
Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386) - vvmdx/Apache-Solr-RCE_CVE-2023-50386_POC
🔥3
Nice blog about #Recon Automation using tools like #Subfinder, #Chaos, #Nuclei, #Httpx, Notify, and Anew to find bugs and vulnerabilities.
https://dhiyaneshgeek.github.io/bug/bounty/2020/02/06/recon-with-me/
https://dhiyaneshgeek.github.io/bug/bounty/2020/02/06/recon-with-me/
Geek Freak
Recon with Me !!!
Security Through Intelligent Automation
👍2