Linux Kernel Featured Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like Dirty Pagedirectory. All without even having to recompile the exploit for different kernel targets once.
Fuzzing Featured Tickling ksmbd: fuzzing SMB in the Linux kernel Following the adventure of manually discovering network-based vulnerabilities in the Linux kernel, I'm adding ksmbd-fuzzing functionality to the already extensive kernel-fuzzing tool that is Syzkaller.
Linux Kernel Featured Unleashing ksmbd: crafting remote exploits of the Linux kernel December 22nd 2022: it's Christmas Thursday, one of the last workdays before the Christmas vacation starts. Whilst everyone was looking forward to opening presents from friends and family, the Zero Day Initiative decided to give the IT community a present as well: immense stress in the form of ZDI-22-1690, an
Infrastructure How I hacked smart lights: the story behind CVE-2022-47758 Introduction In this blogpost, we take a closer look at our research regarding CVE-2022-47758: a critical vulnerability impacting a very large number of Internet of Things smart devices. We could leverage this vulnerability in the lamp's firmware for unauthenticated remote code execution on the entire device with the highest privileges
Web Exploitation How I hacked IoT management apps: the story behind CVE-2022-46640 Have you ever wondered how secure desktop applications really are? Recently, we put one of them to the test and found some critical vulnerabilities such as unauthenticated Remote Code Execution (CVE-2022-46640), Local File Inclusion and Remote Wireless Reconfiguration which allowed us to remotely compromise the Windows desktop. In this blogpost,
Binary Exploitation Knote (HackTheBox) Heya infosec folks, in this write-up we will cover the Knote (kernel-note) kernel-pwn challenge on HackTheBox. We can trigger a local privilege escalation attack by exploiting a use-after-free bug. The description of the challenge is as follows: Secure your secrets in the kernel space! Summary * What are kernel modules? * How
Binary Exploitation Superfast (HackTheBox) Hey folks. In this write-up, we're going to discuss the Superfast challenge in HackTheBox which was part of the HackTheBox Business CTF 2022. We're going to perform a single-byte overwrite to bypass ASLR, leak stack pointers, and perform a Return Oriented Programming (ROP) chain. The description of the challenge is:
Binary Exploitation Finale (HackTheBox) Hey all. Today we're going to discuss the retired Finale challenge on HackTheBox. The description on HackTheBox is as follows: It's the end of the season and we all know that the Spooktober Spirit will grant a souvenir to everyone and make their wish come true! Wish you the best
HackTheBox challenges WeakRSA (HackTheBox) G'day everyone! In this write-up we are going to solve the retired WeakRSA challenge on Hack The Box. In order to do so however it is important you understand some of the basics. You will learn * Basic RSA * Decoding pem formats How does RSA work? RSA is an encryption algorithm
HackTheBox challenges Blacksmith (HackTheBox) Hey all. Today we're going to discuss the retired Blacksmith challenge on HackTheBox. The description on HackTheBox is as follows: You are the only one who is capable of saving this town and bringing peace upon this land! You found a blacksmith who can create the most powerful weapon in