Bidirectional Unicode spoofing is not a new concept, malware has been using the technique for the last decade, but I was toying around with unicode earlier today for a phishing engagement, by default Win7 doesn’t allow you to create filenames with unicode chars unless you: a. Open RegEdit b. Navigate to HKey_Current_User/Control Panel/Input Method c. … Read More “tricky.lnk – Unicode Text Spoofing” »
A new heap memory corruption (Out-of-Bounds Read) that affects Microsoft Office Excel 2007,2010,2013 and 2016. This vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office Excel file (.xlsm). Advisory & POC
The build brings new changes targeting previously exploited dll-hijacking and uac bypass method vulnerabilities. cliconfg.exe – can no longer be used as target for autoelevation as MS changed it manifest to autoelevate=false. mmc.exe – event viewer console fixed, dll hijacking no longer works. fake IIS inetmgr.exe launch from inetsrv appinfo hardcoded directory fixed too – … Read More “Windows 10 RS1 14316” »
CVE-2016-3115 Affected configurations: All versions of OpenSSH prior to 7.2p2 with X11Forwarding enabled. Vulnerability: Missing sanitisation of untrusted input allows an authenticated user who is able to request X11 forwarding to inject commands to xauth(1). Injection of xauth commands grants the ability to read arbitrary files under the authenticated user’s privilege, Other xauth commands allow … Read More “OpenSSH xauth command injection” »
So I started working on a wiki to drop occasional oneliners and examples that I’ve come across that are useful. It’s a work in progress and any suggestions are welcome. bhafsec.com/wiki/
The Sparkle Updater framework does not set HTTPS everywhere allowing remote command execution attacks. This attack will apparently work if allowing any app to run is set on OSX. Otherwise you get blocked by Quarantine and Gatekeeper, both prevent signed and unsigned applications from being automatically run without the user’s consent. Src:https://www.evilsocket.net/2016/01/30/osx-mass-pwning-using-bettercap-and-the-sparkle-updater-vulnerability/
use-after-free flaw was found in the way the Linux kernel’s key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system. The vulnerability has existed since 2012. Here is a link to the full exploit … Read More “CVE-2016-0728 POC” »
Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoors https://github.com/xsysvermin/BypassUAC UPDATE: apparently was ripped from the original https://github.com/hfiref0x/UACME