Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 07/18/15 in all areas

  1. Vand pachet de licente pentru cele din titlu. Pret: 1000ron. Plata inainte, evident. Transfer bancar, de preferat BT.
    1 point
  2. Windows 10 RTM (10240) Close/Preview apps without autentification Windows 10 is a personal computer operating system being developed by Microsoft as part of the Windows NT family of operating systems. A new update to this OS is the three finger swipe up gesture, that opens the multiple screen mode and shows all the active apps, to allow them to be sorted/opened/closed/minimized. This feature also works without the user being logged in, potentially allowing an attackers to examine the running programs or close them. By allowing an attacker to maximize random apps could lead to running unwanted code on locked machines. Preliminary tests show that on maximize events do trigger on maximize events (WM_SIZE message with the value SIZE_MAXIMIZED in wParam). This may allow an attacker to activate a previously installed backdoor on a user machine, and run it only on maximize if the screen is locked (thus, allowing him to run arbitrary code without logging in if he has physical access to the machine). POC of this exploit: In the first picture we can observe a Wordpad Document opened and a Google Chrome minimized Lock the screen. Note: I have a password that is required for unlocking Screen is locked Execute the 3 fingers swipe up gesture with the touchpad I can see all the running apps with a GUI that are minimized. Moreover, I can see a preview of them, maximize them, or close them. Note that I can see the text "Sensitive information without logging in" I clicked chrome. After that I clicked space to open the login screen. I am logging in with my password Chrome is maximized. I've managed to preview an app (see sensitive text) and maximize another app without entering my login password. Source: em @ Romanian Security Team.
    1 point
  3. Da, beata, sunt mama.
    1 point
  4. clear_v1.1.rar :: Free File Hosting - File Dropper: File Host for Mp3, Videos, Music, Documents.
    -1 points
  5. First of all I would like to thank phrack articles, its author and other security researchers for teaching me about different exploit techniques, without whom none of the posts would have been possible!! I firmly believe that always original reference articles are the best place to learn stuffs. But at times we may struggle to understand it because it may be not be linear and it may be outdated too. So to the best of my efforts, here I have just simplified and conglomerated different exploit techniques under one roof, inorder to provide a complete understanding about linux exploit development to beginners!! Any questions, corrections and feedbacks are most welcomed!! Now buckle up, lets get started!! I have divided this tutorial series in to three levels: Level 1: Basic Vulnerabilities In this level I will introduce basic vulnerability classes and also lets travel back in time, to learn how linux exploit development was carried back then. To achieve this time travel, with current linux operating system, I have disabled many security protection mechanisms (like ASLR, Stack Canary, NX and PIE). So in a sense this level is kids stuff, no real fun happens!! Classic Stack Based Buffer Overflow Integer Overflow Off-By-One (Stack Based) Level 2: Bypassing Exploit Mitigation Techniques In this level lets get back to current days, to learn how to bypass different exploit mitigation techniques (like ASLR, Stack Canary, NX and PIE). Real fun do happen here!! Bypassing NX bit using return-to-libc Bypassing NX bit using chained return-to-libc Bypasing ASLR Part I using return-to-plt Part II using brute force Part III using GOT overwrite and GOT dereference Level 3: Heap Vulnerabilities In this level lets time travel back and forth, to learn about heap memory corruption bugs. Heap overflow using unlink Heap overflow using Malloc Maleficarum Off-By-One (Heap Based) User After Free NOTE: The above list is NOT a complete list. Few more topics needs to be covered up. I am working on it, so expect it to be posted soon!! https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
    -1 points
×
×
  • Create New...