CVE-2024-50306: Unchecked return value in Apache Traffic Server Nov 17, 2024 Unchecked return value can allow Apache Traffic Server to retain privileges on startup.
Privileges relinquishing order in C Oct 01, 2024 Dropping privileges is a common operation done by programs having setUID and/or setGID bits set. They do privileged operations such as binding a socket to a low port or opening files and then drop privileges to continue execution. However, user and groups have to be relinquished following a certain order otherwise these privileges could be regained later on, allowing attacker to escalate privileges. set*id() functions Linux has several system calls to relinquish privileges, either temporarily, to be able to regain it later in execution, or permanently. ...
CVE-2023-47480: unchecked return values of set*id() family functions in Puredata Sep 26, 2024 GNU inetutils do not check return values of set*id() family functions, leading to potential privilege escalations in binaries such as ftpd or rcpd.
Linux process hollowing Sep 07, 2024 Process injection, hollowing and stealth on Linux operating system
Windows explorer restrictions bypasses - filesystem access Apr 08, 2024 Explaining and bypassing some Windows explorer restrictions.
CVE-2023-40303: unchecked return values of set*id() family functions in GNU inetutils Aug 14, 2023 GNU inetutils do not check return values of set*id() family functions, leading to potential privilege escalations in binaries such as ftpd or rcpd.
On checking set*id() return values Jul 26, 2023 If set*id() syscalls' return values are not checked, it can cause security issues such as privilege escalation.
CVE-2023-38336: Command injection in netkit-rcp Jul 18, 2023 Netkit-rcp is vulnerable to a command injection in filenames used as copy arguments.
CVE-2023-36631: Circumventing Windows Firewall controls with... Malwarebytes' Windows Firewall Control Jun 21, 2023 Malwarebytes' software for firewall management let unprivileged users perform administrative firewall actions without access controls allowing for local network rules bypass.
OSINT from images' metadata hosted on websites Apr 13, 2023 TL;DR; Images hosted by websites contains numerous metadata fields depending on their filetype (JPG, PNG…). These fields include interesting information for reconnaissance purposes such as: names, telephone numbers, email addresses or URLs. Often, website editors do not strip the images hosted on their websites, making leaks of information possible. Introduction Imagine you are part of a red team and your task is to penetrate inside a company’s perimeter. First, you want to gather intelligence. ...