HackDig : Dig high-quality web security articles

OpenSMTPD Vulnerability (CVE-2020-8794) Can Lead to Root Privilege Escalation and Remote Code Execution

By Alexander Elkholy (Threats Analyst) A root privilege escalation and remote execution vulnerability (designated as CVE-2020-8794) has been discovered in the free and open-source Unix Daemon, OpenSMTPD. The flaw originates from an out-of-bounds read, which attackers can take advantage of to execute arbitrary code on vulnerable systems. What is the vulnerabi
Publish At:2020-03-12 10:49 | Read:1683 | Comments:0 | Tags:Vulnerabilities CVE-2020-8794 RCE root Unix Daemon Vulnerabi

SetUID program exploitation: Crafting shared object files without a compiler

In this post we look at an alternative to compiling shared object files when exploiting vulnerable setUID programs on Linux. At a high level we’re just going to copy the binary and insert some shellcode. First we take a look the circumstances that might lead you to use this option. Also check out this previous post on setUID exploitation. A hacker chal
Publish At:2019-09-19 17:35 | Read:2151 | Comments:0 | Tags:Blog analysis exploit root UNIX

Where 2 worlds collide: Bringing Mimikatz et al to UNIX

Presentation on Active Directory integration solutions for UNIX (as given at Black Hat Europe 2018). Over the past fifteen years there’s been an uptick in “interesting” UNIX infrastructures being integrated into customers’ existing AD forests. Whilst the threat models enabled by this should be quite familiar to anyone securing a heter
Publish At:2019-09-19 17:35 | Read:2185 | Comments:0 | Tags:Presentations analysis auditing Black Hat Europe blue team c

An offensive introduction to Active Directory on UNIX

By way of an introduction to our talk at Black Hat Europe, Security Advisory EMEAR would like to share the background on our recent research into some common Active Directory integration solutions. Just as with Windows, these solutions can be utilized to join UNIX infrastructure to enterprises’ Active Directory forests. Background to Active Directory i
Publish At:2019-09-19 17:35 | Read:2542 | Comments:0 | Tags:Blog analysis auditing Black Hat Europe blue team conference

UNIX and Linux setUID advice and guidance

It is a topic that often comes up on client engagements, usually when running structured build reviews of Linux “gold builds”, but occasionally when trying to explain in detail how we used a Linux system to pivot internally. SetUID and setGID files are inevitably a risk, potentially allowing attackers to elevate privileges to root from a basic us
Publish At:2017-10-27 17:20 | Read:11591 | Comments:0 | Tags:Blog AIX analysis auditing blueteam FreeBSD Linux root Solar

Exploring Windows Subsystem for Linux

Whilst there has been quite a lot of analysis of Microsoft’s new Windows Subsystem for Linux (aka WSL or Bash on Ubuntu on Windows) and how it functions (particularly from Alex Ionescu), most of this has focused on how it affects the Windows security model. Being a keen UNIX focused researcher, I decided to take it for a spin. The first thing I did onc
Publish At:2017-10-27 17:20 | Read:10775 | Comments:0 | Tags:Blog analysis Linux root Windows

Dogspectus ransomware campaign relies on Leaked Hacking Team Exploits and Towelroot

Blue Coat spotted a new ransomware-based campaign serving the Dogspectus malware. Crooks combined a Hacking Team exploit and the Towelroot exploit. Security experts at Blue Coat have spotted a new campaign spreading an Android Ransomware dubbed Dogspectus. The malicious code hijacks mobile advertisements to scam gift cards, it locks the device in a state tha
Publish At:2016-04-26 15:35 | Read:5540 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Mobile Android CVE

How a few legitimate app developers threaten the entire Android userbase

A handful of app distributors are putting hundreds of millions of Android users at risk by bundling powerful root exploits with their wares, computer scientists have found. The researchers presented a paper on Thursday that shows how the exploits—which legitimate developers openly use to give Android phones added functionality—can be easily reverse-engineere
Publish At:2015-10-16 18:20 | Read:4337 | Comments:0 | Tags:Gear & Gadgets Risk Assessment Technology Lab android rootin

VERT IoT Hack Lab: Developing Your Inner Hacker

Getting root is fun, and with IoT gadgets, getting root is generally easy. This is why the IoT Hack Lab @ SecTor will be so much fun!If you still reminisce about (or look forward to) the first time you got root on a device, and you will be in Toronto on October 20-21, visit us at the convention centre where we’ll be setup in the expo hall. Expo passes are fr
Publish At:2015-10-14 14:25 | Read:5977 | Comments:0 | Tags:Featured Articles Tripwire News hack IoT Hack Lab root SecTo

Android adware wields potent root exploits to gain permanent foothold

Researchers have uncovered yet another Android-based adware campaign targeting people who download what they believe are trusted titles from websites and other third-party app stores.The apps use repackaged icons to disguise themselves as popular titles and are offered for download through pop-up ads on visited websites and in-app promotions, according to a
Publish At:2015-10-08 05:15 | Read:4641 | Comments:0 | Tags:Gear & Gadgets Law & Disorder Risk Assessment Technology Lab

padmin to root: Roles on AIX

Following a recent post from a consultant at IBM discussing how how privileged access should be performed on VIOS, I figured it was time to share some of our research in this arena. Those of you that are regular readers will know that I love root. For those of you that are new, welcome aboard. Let’s start by defining what VIOS is. VIOS is a subsystem t
Publish At:2015-10-03 05:00 | Read:5390 | Comments:0 | Tags:Blog AIX analysis auditing exploit root UNIX

How to root the LG Watch Urbane ( B285 )

A few days ago I've bought a LG Watch Urbane from the Google Store since it seemed to me the very first "elegant" wear device. I really like old fashioned wrist watches so I waited for something similar to be on the market before getting a Wear device. Unfortunately, being it a relatively new device, there aren't many informations on the web on how to root
Publish At:2015-06-16 03:25 | Read:6502 | Comments:0 | Tags:android LG Watch Urbane root android wear wear TWRP SuperSU


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud