few detection tricks for the existing CVE-2021-1675 POCs: https://twitter.com/mvelazco/status/1410291741241102338?s=09
Twitter
Mauricio Velazco
Detection opportunity #1 for the existing CVE-2021-1675 POCs: spoolsv.exe writing (Sysmon Event 11) and deleting (Sysmon Event 23) .dll files on C:\Windows\System32\spool\drivers\x64\* #printspooler
Zero day for every supported Windows OS version in the wild — PrintNightmare https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c
Medium
Zero day for every supported Windows OS version in the wild — PrintNightmare
zhiniang peng tweeted out a proof of concept exploit and explainer recently, and then quickly deleted it. This exploit and discussion…
From Lares Labs: Detection & Remediation Information for CVE-2021-1675 & CVE-2021-34527 https://github.com/LaresLLC/CVE-2021-1675
GitHub
GitHub - LaresLLC/CVE-2021-1675: CVE-2021-1675 Detection Info
CVE-2021-1675 Detection Info. Contribute to LaresLLC/CVE-2021-1675 development by creating an account on GitHub.
Free Micropatches for PrintNightmare Vulnerability (CVE-2021-34527) https://blog.0patch.com/2021/07/free-micropatches-for-printnightmare.html
0Patch
Free Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)
by Mitja Kolsek, the 0patch Team Update 8/11/2021: August 2021 Windows Updates brought a fix for PrintNightmare that has the same default ef...
More details on CVE-2021-1675 >> https://twitter.com/gentilkiwi/status/1410621282446495749?s=20
Twitter
🥝 Benjamin Delpy
Thanks to @_f0rgetting_ we have an explanation about why we have an Elevated Token (allowing #PrintNightmare on patched domain controllers): legacy If you remove "Authenticated users" from "Builtin\Pre-Windows 2000 Compatible Access", the original Microsoft…
Interested in writing plugins in Volatility 3 for memory forensics? Read our latest blog post, where @RicardoJRdez explains how to do it. Do not miss it! https://reversea.me/index.php/writing-a-volatility-3-plugin/
ManuFuzzer: Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM https://github.com/ant4g0nist/ManuFuzzer
GitHub
ant4g0nist/ManuFuzzer
Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM - ant4g0nist/ManuFuzzer
Thousands of Vulnerable VMWare vCenter Servers Still Publicly Exposed (CVE-2021-21985, CVE-2021-21986) https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/thousands-of-vulnerable-vmware-vcenter-servers-still-publicly-exposed-cve-2021-21985-cve-2021-21986/
Trustwave
Thousands of Vulnerable VMWare vCenter Servers Still Publicly Exposed (CVE-2021-21985, CVE-2021-21986)
On May 25th, 2021, VMWare released patches to address VMSA-2021-0010, a critical security advisory for VMWare vCenter Server addressing two vulnerabilities. One of them was a remote code execution (RCE) in the vSphere Client (CVE-2021-21985) that exists due…
Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+ https://www.mcafee.com/blogs/other-blogs/mcafee-labs/analyzing-cve-2021-1665-remote-code-execution-vulnerability-in-windows-gdi/
McAfee Blog
Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+ | McAfee Blog
Introduction Microsoft Windows Graphics Device Interface+, also known as GDI+, allows various applications to use different graphics functionality on
Yet Another Archive Format Smuggling Malware https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/another-archive-format-smuggling-malware/
Trustwave
Yet Another Archive Format Smuggling Malware
The use of novel disk image files to encapsulate malware distributed via spam has been a theme that we have highlighted over the past couple of years. As anticipated, we have seen more disk image file formats being used, in addition to .ISO, .IMG, and .DAA…
Google Compute Engine (GCE) VM takeover via DHCP flood https://github.com/irsl/gcp-dhcp-takeover-code-exec
GitHub
GitHub - irsl/gcp-dhcp-takeover-code-exec: Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting…
Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent - irsl/gcp-dhcp-takeover-code-exec
good write-up of a classic vuln >> pwnable.kr - bof https://aidenpearce369.github.io/pwn/3-bof/
aidenpearce369
pwnable.kr - bof
A classic buffer overflow challenge
Fuzzing with Grammars https://www.fuzzingbook.org/html/Grammars.html
www.fuzzingbook.org
Fuzzing with Grammars - The Fuzzing Book
In the chapter on "Mutation-Based Fuzzing", we have seen how to use extra hints – such as sample input files – to speed up test generation. In this chapter, we take this idea one step further, by providing a specification of the legal inputs to a program.…
Microsoft signed a malicious Netfilter rootkit https://www.gdatasoftware.com/blog/microsoft-signed-a-malicious-netfilter-rootkit
Gdatasoftware
Microsoft signed a malicious Netfilter rootkit
What started as a false positive alert for a Microsoft signed file turns out to be a WFP application layer enforcement callout driver that redirects traffic to a Chinese IP. How did this happen?
Crackonosh: A New Malware Distributed in Cracked Software https://decoded.avast.io/danielbenes/crackonosh-a-new-malware-distributed-in-cracked-software/
Gendigital
Crackonosh: A new malware distributed in cracked software
Overview of Crackonosh Malware
Zloader With a New Infection Technique https://www.mcafee.com/blogs/other-blogs/mcafee-labs/zloader-with-a-new-infection-technique/
McAfee Blog
Zloader With a New Infection Technique | McAfee Blog
This blog was written by Kiran Raj & Kishan N. Introduction In the last few years, Microsoft Office macro malware using social engineering as a means
The Most Prolific Ransomware Families: A Defenders Guide https://www.domaintools.com/resources/blog/the-most-prolific-ransomware-families-a-defenders-guide
DomainTools | Start Here. Know Now.
The Most Prolific Ransomware Families: A Defenders Guide - DomainTools | Start Here. Know Now.
In this article, DomainTools researchers provide a look at the three most prolific ransomware families and their toolsets.
Analysis of a use-after-free Vulnerability in Adobe Acrobat Reader DC https://blog.exodusintel.com/2021/04/20/analysis-of-a-use-after-free-vulnerability-in-adobe-acrobat-reader-dc/
Exodus Intelligence
Analysis of a use-after-free Vulnerability in Adobe Acrobat Reader DC - Exodus Intelligence
By Sergi Martinez This post analyses CVE-2020-9715, a use-after-free vulnerability affecting several versions of the Adobe Acrobat and Adobe Acrobat Reader products. The vulnerability was discovered by Mark Vincent Yason, who reported it to the Zero Day Initiative…
Inside commercial malware sandboxes https://albocoder.github.io/malware/2021/06/01/SandboxStudy.html
FRIDA-DEXDump: Fast search and dump dex on memory https://securityonline.info/frida-dexdump-fast-search-and-dump-dex-on-memory/
Cybersecurity News
FRIDA-DEXDump v2.0.1 releases: Fast search and dump dex on memory
FRIDA-DEXDump support fuzzy search broken header dex, fix struct data of dex-header, compatible with all android version(frida supported).