lock (@lockedbyte) 's Twitter Profile
lock

@lockedbyte

Android kernel vulnerability researcher | Mathematics student

ID: 1026853173091282944

calendar_today07-08-2018 15:30:49

31 Tweet

2,2K Takipçi

897 Takip Edilen

lock (@lockedbyte) 's Twitter Profile Photo

I were able in collaboration with blasty to create a working Proof of Concept exploit for the new sudo CVE-2021-3156. Tested just in Ubuntu 20.04.1 LTS, in other distros offsets may change. PoC available: github.com/lockedbyte/CVE…

I were able in collaboration with <a href="/bl4sty/">blasty</a> to create a working Proof of Concept exploit for the new sudo CVE-2021-3156.
Tested just in Ubuntu 20.04.1 LTS, in other distros offsets may change. PoC available: github.com/lockedbyte/CVE…
blasty (@bl4sty) 's Twitter Profile Photo

Last night lock showed you how we managed to exploit sudo with a partial overwrite of a funcptr and some small bruteforce. Today.. we do it single-shot with some help of glibc/nss. haxx.in/CVE-2021-3156_…

Last night <a href="/lockedbyte/">lock</a> showed you how we managed to exploit sudo with a partial overwrite of a funcptr and some small bruteforce. Today.. we do it single-shot with some help of glibc/nss.
haxx.in/CVE-2021-3156_…
Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

Our young owlet @Lockedbyte reported an uncontrolled recursion in the XML parser of OSSEC/Wazuh (CVE-2021-28040) that has been fixed recently. Not all bugs are cool RCEs, but hey, bugs that lead to DoS should be fixed too.

lock (@lockedbyte) 's Twitter Profile Photo

I developed a Remote Code Execution PoC exploit for the Exim Use-After-Free that was recently disclosed (as part of Qualys 21Nails advisory). Tested just on Exim 4.92. PoC available: github.com/lockedbyte/CVE…

I developed a Remote Code Execution PoC exploit for the Exim Use-After-Free that was recently disclosed (as part of <a href="/qualys/">Qualys</a> 21Nails advisory). Tested just on Exim 4.92. PoC available: github.com/lockedbyte/CVE…
Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

So lock just brought to our nest a PoC. Read his last entry in our blog: "From theory to practice: analysis and PoC development for CVE-2020-28018 (User-After-Free in Exim)" adepts.of0x.cc/exim-cve-2020-…

Bad Sector Labs (@badsectorlabs) 's Twitter Profile Photo

Exim RCE (lock), Windows kernel exploit writeup (Connor McGarr), plaintext RDP creds from memory (Jonas L, n00py), MS Defender ATP bypasses (Matt Eidelberg), hashcat 6.2.0 (hashcat), persist and blend C2 with Teams (BlackArrow), and more! blog.badsectorlabs.com/last-week-in-s…

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

Dear Fellowlship, How is your summer going? Our N-Day owl lock was bored in his holidays and decided to build an exploit for CVE-2020-9273. Check our post: Having fun with a Use-After-Free in ProFTPd (CVE-2020-9273) adepts.of0x.cc/proftpd-cve-20…

Bad Sector Labs (@badsectorlabs) 's Twitter Profile Photo

ProFTPd UAF (lock), API hacking (Luke Stephens (hakluke) and Farah Hawa), file extension tricks on cloud storage (mr.d0x), built-in AD searching with ADSI (Grimmie), DCE/RPC fingerprints (HD Moore), SAML issues (Secureworks, Joonas Loppi), and more! blog.badsectorlabs.com/last-week-in-s…