Last Week in Security (LWiS) - 2022-03-28
RCE on a NAS (@alexjplaskett, @saidelike, and @FidgetingBits), Double Fetch vulns (@N1ckDunn), Razer LPE (@matthiasdeeg), DFIR cloud automation (@ZawadiDone), Ubuntu LPE (@ETenal7), and more!
RCE on a NAS (@alexjplaskett, @saidelike, and @FidgetingBits), Double Fetch vulns (@N1ckDunn), Razer LPE (@matthiasdeeg), DFIR cloud automation (@ZawadiDone), Ubuntu LPE (@ETenal7), and more!
Browser in the Browser (@mrd0x), OSINT Map (@MalfratsInd), Rust packer (@verixvogel), local Kerberos to bypass UAC (@tiraniddo), crash to read/write in Chakra (@33y0re), AtlasC2 (@Gr1mmie), detecting Shadow Credentials (@cfalta ), and more!
Embedded reversing (@zi0Black), SQL injection despite prepared statements (@Dooflin5), AutoWarp Azure token leak (@Yanir_), Viscosity DPAPI defeat (@checkymander), password tricks without mimikatz (@n00py1), Chakra exploitation (@33y0re), rethinking phishing assessments (@matterpreter), and more!
Stealing GitHub secrets (@not_an_aardvark), TeamsImplant (@allevon412), Nimcrypt2 (@icyguider), VMware RCEs (@elk0kc), LdapSignCheck (@cube0x0), yaradbg.dev (@DissectMalware), and more!
VMware RCEs (@__mn1__ and @elk0kc), un-redacting text (@2600AltF4), undetectible AirTags (@positive_sec), Kerberos relaying via DNS (@_dirkjan), tmp.Out volume 2 (@tmpout), tclsh macOS dylib loading (@_D00mfist), Athena agent (@checkymander), and more!
Prevent IP takeover (@infosec_au), Windows LPE via handles (@last0x00), Exception Oriented Programming (@BillDemirkapi and @x86matthew), Bloodhound 4.1 (@_wald0), object overloading (@_xpn_), arb file write on DCs (@Junior_Baines), KrbRelay (@cube0x0), and more!
EXE in LNK embeds (@x86matthew), LinkedIn Slink phishers (@briankrebs), Apollo 2.0 (@djhohnstein), modern relaying (@Jean_Maes_1994), exfil with Power Automate (@varonis), sandboxing defender (@GabrielLandau), SysWhispers rundown (@KlezVirus), and more!
pkexec Linux LPE (@jogibharat), .NET remoting (@codewhitesec), usernames from CUCM (@n00py1), Notepad++ persistence (@_RastaMouse), Mythic update (@its_a_feature_), modern password spraying (@SprocketSec), and more!
PrinterLogic RCEs (@TheParanoids), Java app analysis (@infosec_au), DCSync from Linux (@n00py1), timed race conditions (@itscachemoney), ManageEngine auth bypass (@sourceincite), Windows driver RE methods (@Void_Sec), Sliver 1.5 with BOF support (@LittleJoeTables), and more!
CI/CD pipeline war stories (@0xZon1 + others), Serv-U exploit writing (Carl Livitt of @bishopfox), Safari IndexedDB leak (@FingerprintJS), RDP services vuln (@sztejnworcel), a very slick loader (@cerbersec), and more!