š
[ Archival Date ]
Nov 9, 2022 12:20 AM
ā ļø [ ORIGIN SOURCE ]
š·ļø [ Tags ]
AppSecEzine
āļø [ Author ]
Renato Rodrigues
š£ [ PoC / Exploit ]
āāāāāā āāāāāāā āāāāāāā āāāāāāāāāāāāāāāā āāāāāāā āāāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāā
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā āāā āāāāāā āāāāā āāāāāāāāā āāāāāāāāā
āāāāāāāāāāāāāāā āāāāāāā āāāāāāāāāāāāāā āāā āāāāāā āāāāā āāāāāāāāāāāāāāāāāāā
āāā āāāāāā āāā āāāāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāāāāā
āāā āāāāāā āāā āāāāāāāāāāāāāāāā āāāāāāā āāāāāāāāāāāāāāāāāāāāāā āāāāāāāāāāāāā
### Week: 44 | Month: November | Year: 2022 | Release Date: 04/11/2022 | Edition: #455 ###
' āā¦āā¬ ā¬āāāāā¬ā āāāāāāāāā
' āāāā āāāā ā āāāāā¤ āā¤
' ā© ā©āāāāāā ā“ āāāāāāāāā
' Something that's really worth your time!
URL: https://blog.doyensec.com/2022/10/27/jupytervscode.html
Description: Visual Studio Code Jupyter Notebook RCE (CVE-2021-26437).
URL: https://link.medium.com/iS48cBO7Aub
Description: Weird Vulnerabilities Happening on Load Balancers, Shallow Copies and Caches.
' ā¦ ā¦āāāāāāā¬āā
' ā āā£āāā¤ā āā“ā
' ā© ā©ā“ ā“āāāā“ ā“
' Some Kung Fu Techniques.
URL: https://github.com/lcvvvv/kscan
Description: Kscan - Simple Asset Mapping Tool.
URL: https://github.com/Accenture/Spartacus
Blog: https://www.pavel.gr/blog/dll-hijacking-using-spartacus
Description: Spartacus DLL Hijacking Discovery Tool.
URL: https://github.com/upx/upx
Description: UPX - the Ultimate Packer for eXecutables.
URL: https://github.com/numencyber/VulnerabilityPoC
Blog: https://link.medium.com/axWuRrL7sub
Description: TCP/IP RCE Vulnerability (CVE-2022-34718) PoC.
URL: https://www.bencteux.fr/posts/filetypes/
Description: Divin'n'phishin with executable filetypes on Windows.
URL: https://www.blackhillsinfosec.com/how-to-weaponize-the-yubikey/
Description: How to Weaponize the Yubikey.
URL: https://github.com/ORCx41/TerraLdr
Description: A Payload Loader Designed With Advanced Evasion Features.
URL: https://github.com/Ge0rg3/requests-ip-rotator
Description: Library to utilize AWS API Gateway's large IP pool as a proxy.
URL: https://github.com/DataDog/threatest
Description: Threatest is a Go framework for end-to-end testing threat detection rules.
URL: https://github.com/Idov31/Sandman
Description: Sandman is a NTP based backdoor for red team engagements in hardened networks.
URL: https://github.com/optiv/Freeze
Description: Toolkit for bypassing EDRs using suspended processes, direct syscalls, and more.
URL: https://github.com/mahaloz/decomp2dbg
Description: A plugin to introduce interactive symbols into your debugger from your decompiler.
' āāāāāāāāāā¬ ā¬ā¬āāā¬āā¬āā¬ ā¬
' āāāāā¤ ā ā āāā¬āā ā āā¬ā
' āāāāāāāāāāāāā“āāā“ ā“ ā“
' All about security issues.
URL: https://bit.ly/3zJKGiF (+)
Description: When Hypervisor Met Snapshot Fuzzing (CVE-2022-21571).
URL: https://positive.security/blog/urlscan-data-leaks
Description: urlscan.io's SOAR spot - Chatty security tools leaking private data.
URL: https://securitylabs.datadoghq.com/articles/openssl-november-1-vulnerabilities
Description: The OpenSSL punycode vulnerability (CVE-2022-3602).
URL: https://blog.assetnote.io/2022/10/28/exploiting-static-site-generators/
Description: Exploiting Static Site Generators - When Static Is Not Actually Static.
URL: https://bit.ly/3NGgYAX (+)
Description: Galaxy Store Applications Installation/Launching without User Interaction.
URL: https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html
PoC: https://github.com/Bdenneu/CVE-2022-33679
Description: RC4 Is Still Considered Harmful.
URL: https://bit.ly/3zJHGTr (+)
Tool: https://github.com/sensepost/impersonate
Description: Abusing Windows' tokens to compromise Active Directory without touching LSASS.
URL: https://etenal.me/archives/1825
Description: Ubuntu Desktop 21.10 LPE - Exploit esp6 modules in Linux kernel (CVE-2022-27666).
URL: https://blog.stratumsecurity.com/2022/10/24/abusing-apache-spark-sql-to-get-code-execution/
Description: Remote Code Execution by Abusing Apache Spark SQL.
URL: https://bit.ly/3UnfRIt (+)
PoC: https://github.com/cckuailong/CVE-2022-40146_Exploit_Jar
Description: Apache Batik Default Security Controls - SSRF and RCE Through Remote Class Loading.
' āāāā¬ ā¬āāā
' ā ā£ ā āāāā
' ā āāāāāā
' Spare time?
URL: https://jcs.org/2021/07/19/desktop
Description: My Fanless OpenBSD Desktop.
URL: https://github.com/binji/smolnes
Description: NES emulator in <5000 bytes of C++.
URL: https://sadservers.com/
Description: Troubleshoot and make a sad server happy!
' āāāā¬āāāāāāā¬āā¬āā¬āāāā
' ā āā¬āāā¤ āāā ā āāā
' āāāā“āāāāāāā“āā“ ā“ āāā
' Content Helpers (0x)
52656e61746f20526f64726967756573202d204073696d7073306e202d2068747470733a2f2f706174686f6e70726f6a6563742e636f6d
https://pathonproject.com/zb/?7a3c05a2c9605588#saZXmCPmdjM6/ZnQhnesoC6exr5P5f1R+nqfuZZHBmY=