Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 3 / 4
61 résultats taggé Windows  ✕
Windows Installer EOP (CVE-2023-21800) https://blog.doyensec.com//2023/03/21/windows-installer.html
21/03/2023 16:51:18
QRCode
archive.org

This blog post describes the details and methodology of our research targeting the Windows Installer (MSI) installation technology.

doyensec doyensecurity EN 2023 vulnerability exploit CVE-2023-21800 MSI Windows
Threat groups are using Windows LNK files to gain access https://www.theregister.com/2023/01/23/threat_groups_malicious_lnk/
24/01/2023 06:04:45
QRCode
archive.org
thumbnail

Microsoft's move last year to block macros by default in Office applications is forcing miscreants to find other tools with which to launch cyberattacks, including the software vendor's LNK files – the shortcuts Windows uses to point to other files.

theregister EN 2023 LNK macros Microsoft Windows threat
Zoom Patches High Risk Flaws on Windows, MacOS Platforms https://www.securityweek.com/zoom-patches-high-risk-flaws-windows-macos-platforms
11/01/2023 09:23:06
QRCode
archive.org

Video messaging giant Zoom has released patches for multiple security vulnerabilities that expose both Windows and macOS users to malicious hacker attacks.

securityweek EN 2023 CVE-2022-36930 CVE-2022-36929 CVE-2022-36927 patch-tuesday zoom zoom-rooms windows macos video-conferencing video-messaging privilege-escalation vulnerability
Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049) https://breakdev.org/zip-motw-bug-analysis/
12/11/2022 22:36:48
QRCode
archive.org
thumbnail

Windows ZIP extraction bug (CVE-2022-41049) lets attackers craft ZIP files, which evade warnings on attempts to execute packaged files, even if ZIP file was downloaded from the Internet.

breakdev EN 2022 CVE-2022-41049 Windows Mark-of-the-Web Bypass Vulnerability analysis
Abusing windows’ tokens to compromise active directory without touching lsass https://sensepost.com/blog/2022/abusing-windows-tokens-to-compromise-active-directory-without-touching-lsass/
08/11/2022 19:05:21
QRCode
archive.org

During an internal assessment, I performed an NTLM relay and ended up owning the NT AUTHORITY\SYSTEM account of the Windows server. Looking at the users connected on the same server, I knew that a domain administrator account was connected. All I had to do to compromise the domain, was compromise the account. This could be achieved by dumping the memory of the LSASS process and collecting their credentials or Kerberos TGT’s. Seemed easy until I realised an EDR was installed on the system. Long story short, I ended up compromising the domain admin account without touching the LSASS process. To do so, I relied on an internal Windows mechanism called token manipulation.

The goal of this blog post is to present how I did it. We will see what access tokens are, what they are used for, how we can manipulate them to usurp legitimate accounts without touching LSASS and finally I will present a tool and a CrackMapExec module that can be used during such assessments. All the source code, binaries and CrackMapExec module can be found here https://github.com/sensepost/impersonate.

sensepost EN 2022 orange LSASS CrackMapExec redteam impersonate tokens abusing Windows
Chaos is a Go-based Swiss army knife of malware https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/
01/10/2022 01:03:28
QRCode
archive.org
thumbnail

Black Lotus Labs, the threat intelligence arm of Lumen Technologies, recently uncovered a multifunctional Go-based malware developed for Windows and Linux

lumen EN 2022 Chaos Go malware Windows Linux IoCs
Break me out of sandbox in old pipe - CVE-2022-22715 Windows Dirty Pipe https://whereisk0shl.top/post/break-me-out-of-sandbox-in-old-pipe-cve-2022-22715-windows-dirty-pipe
23/08/2022 11:23:05
QRCode
archive.org

In February 2022, Microsoft patched the vulnerability I used in TianfuCup 2021 for escaping Adobe Reader sandbox, assigned CVE-2022-22715. The vulnerability existed in Named Pipe File System nearly 10 years since the AppContainer was born. We called it "Windows Dirty Pipe".
In this article, I will share the root cause and exploitation of Windows Dirty Pipe. So let's start our journey.

whereisk0shl EN 2022 CVE-2022-22715 Windows Dirty-Pipe PoC ANALYSIS
911 Proxy Service Implodes After Disclosing Breach https://krebsonsecurity.com/2022/07/911-proxy-service-implodes-after-disclosing-breach/
30/07/2022 13:20:59
QRCode
archive.org

911[.]re, a proxy service that since 2015 has sold access to hundreds of thousands of Microsoft Windows computers daily, announced this week that it is shutting down in the wake of a data breach that destroyed key components of its…

krebsonsecurity EN 2022 Microsoft 911 911re windows breach proxy service crime
Microsoft finds Raspberry Robin worm in hundreds of Windows networks https://www.bleepingcomputer.com/news/security/microsoft-finds-raspberry-robin-worm-in-hundreds-of-windows-networks/
03/07/2022 12:03:15
QRCode
archive.org
thumbnail

Microsoft says that a recently spotted Windows worm has been found on the networks of hundreds of organizations from various industry sectors.

Bleepingcomputer EN 2022 Malware Microsoft Raspberry-Robin raspberryrobin USB Windows Worm Security Detection
From NtObjectManager to PetitPotam https://clearbluejar.github.io/posts/from-ntobjectmanager-to-petitpotam/
26/06/2022 12:50:46
QRCode
archive.org
thumbnail

Windows RPC enumeration, discovery, and auditing via NtObjectManager. We will audit the vulnerable RPC interfaces that lead to PetitPotam, discover how they have changed over the past year, and overcome some common RPC auditing pitfalls.

clearbluejar 2022 EN PetitPotam RPC Windows audit NtObjectManager explanation
NSA, Partners Recommend Properly Configuring, Monitoring PowerShell in New Report https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3069620/nsa-partners-recommend-properly-configuring-monitoring-powershell-in-new-report/utm_source/substack/utm_medium/nsa-partners-recommend-properly-configuring-monitoring-powershell-in-new-report/
25/06/2022 04:43:38
QRCode
archive.org
thumbnail

The National Security Agency (NSA) and partner cybersecurity authorities released a Cybersecurity Information Sheet today recommending that Microsoft Windows® operators and administrators properly

NSA en 2022 PowerShell recommandation information howto guidance Windows Microsoft
7-zip now supports Windows ‘Mark-of-the-Web’ security feature https://www.bleepingcomputer.com/news/microsoft/7-zip-now-supports-windows-mark-of-the-web-security-feature/
25/06/2022 04:39:28
QRCode
archive.org
thumbnail

7-zip has finally added support for the long-requested 'Mark-of-the-Web' Windows security feature, providing better protection from malicious downloaded files.

bleepingcomputer EN 2022 7-Zip Mark-of-the-Web MoTW Windows Microsoft
Raspberry Robin gets the worm early https://redcanary.com/blog/raspberry-robin/
24/06/2022 10:22:25
QRCode
archive.org
thumbnail

Raspberry Robin is a worm spread by external drives that leverages Windows Installer to download a malicious DLL.

redcanary EN 2022 raspberry-robin worm Windows Installer QNAP DLL
SVCReady: A New Loader Gets Ready https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/
07/06/2022 14:48:46
QRCode
archive.org
thumbnail

Don’t let cyber threats get the best of you. Read our post, SVCReady: A New Loader Gets Ready, to learn more about cyber threats and cyber security.

threatresearch EN 2022 SVCReady Loader Windows malware VBA Macro research
Malicious PyPI package opens backdoors on Windows, Linux, and Macs https://www.bleepingcomputer.com/news/security/malicious-pypi-package-opens-backdoors-on-windows-linux-and-macs/
21/05/2022 22:21:57
QRCode
archive.org
thumbnail

Yet another malicious Python package has been spotted in the PyPI registry performing supply chain attacks to drop Cobalt Strike beacons and backdoors on Windows, Linux, and macOS systems.

Backdoor Cobalt-Strike Cobalt-Strike-Beacon Linux macOS PyPI Python Windows supplychain
CVE-2022-26925 : Patchez vos machines Windows sans attendre https://www.it-connect.fr/securite-cve-2022-26925-relais-ntlm-cette-vulnerabilite-touche-toutes-les-versions-de-windows/
11/05/2022 17:42:36
QRCode
archive.org
thumbnail

CVE-2022-26925 : Microsoft a corrigé une faille de sécurité zero-day qui touche toutes les versions de Windows et qui permet une attaque par relais NTLM.

it-connect FR NTLM active-directory microsoft windows entreprise CVE-2022-26925
Dec0ne/KrbRelayUp: KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings). https://github.com/Dec0ne/KrbRelayUp
27/04/2022 10:54:45
QRCode
archive.org
thumbnail

KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings). - GitHub - Dec0ne/KrbRelayUp: KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).

GitHub EN 2022 no-fix vulnerability Windows LDAP domain signing KrbRelayUp privilege escalation
Microsoft Zero-Days, Wormable Bugs Spark Concern https://threatpost.com/microsoft-zero-days-wormable-bugs/179273/
13/04/2022 16:10:01
QRCode
archive.org
thumbnail

For April Patch Tuesday, the computing giant addressed a zero-day under active attack and several critical security vulnerabilities, including three that allow self-propagating exploits.

CVE-2022-26809 EN 2022 threatpost Vulnerabilities Patch-Tuesday zero-day CVE-2022-26904 Windows RPC
Dropping Files on a Domain Controller Using CVE-2021-43893 https://www.rapid7.com/blog/post/2022/02/14/dropping-files-on-a-domain-controller-using-cve-2021-43893/
15/02/2022 11:35:00
QRCode
archive.org
thumbnail

On December 14, 2021, during the Log4Shell chaos, Microsoft published CVE-2021-43893, a remote privelege escalation vulnerability affecting Windows EFS.

CVE-2021-43893 Windows EFS EN Microsoft Rapid7
SysJoker : un malware pour macOS, Windows et Linux qui opère discrètement depuis des mois https://www.macg.co/macos/2022/01/sysjoker-un-malware-pour-macos-windows-et-linux-qui-opere-discretement-depuis-des-mois-126671
15/02/2022 10:27:08
QRCode
archive.org
thumbnail

Un inquiétant cheval de Troie très discret et multiplateformes vient d'être repéré. Baptisé SysJoker et mis en lumière par la firme de sécurité Intezer, il peut cibler autant Windows, Linux que macOS. Pire encore, celui-ci passait sous les radars des antivirus depuis un bout de temps. Les versions Linux et macOS n'étaient jusqu'à présent pas du tout détectées par des sites

malware macos MacGeneration FR SysJoker Windows Linux
page 3 / 4
4350 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio