Last Week in Security (LWiS) - 2024-06-17
Nighthawk 0.3 (@MDSecLabs), Musl heap exploit (@NCCsecurityUS), Copilot chat 💉 (@wunderwuzzi23), allowPrivilegeEscalation in K8s (@christophetd), and more!
Nighthawk 0.3 (@MDSecLabs), Musl heap exploit (@NCCsecurityUS), Copilot chat 💉 (@wunderwuzzi23), allowPrivilegeEscalation in K8s (@christophetd), and more!
SCCM ansible role (@synzack21), Hacking millions of modems (@samwcyo), F5 Secure Vault (@myst404_), Secure Kerrnel (@33y0re), and more!
F5 TLS MITM (@lowercase_drm + @myst404_), WASM phishing tool (@JumpsecLabs), MS Recall info (@GossiTheDog), Checkpoint path traversal (@watchtowrcyber), smbclient-ng (@podalirius_), and more!
A special two week edition!
Evading MDI (@yaumn_), TAP->NTLM (@_dirkjan), ELF verifier (@kev169), Kerberos delegation + 🦀 in beacons (@_RastaMouse), and more!
Entra to on-prem (@_dirkjan), new bloodhound edges (@Jonas_B_K ), Chrome type confusion (@_manfp), GitHub RCE via actions (@Creastery), and more!
AD Group abuse (@decoder_it), NetNTLM leak attacks (@pfiatde), 'adversary flywheels' (@WHITEHACKSEC), Nemesis 1.0 (@harmj0y + team) and more!
LSA Whisperer (@mcbroom_evan), VirtualBox LPE (@mansk1es), Android Intent exploitation (@suidpit), MagicDot "rootkit" (@oryair1999), and more!
Dev tunnels for C2 (@RedSiege), UAF Windows LPE (@KeyZ3r0), SCCM enum script (@_Mayyhem), ETW patching (@jsecurity101), and more!
Evilginx + GoPhish (@mrgretzky), Ghostwriter updates (@cmaddalena), Intune EPM privesc (@synzack21 + team) 🎣 page bot defense (@fin3ss3g0d), and more!