Omri Herscovici (@omriher) 's Twitter Profile
Omri Herscovici

@omriher

Developer, Hacker & Lover | Security Researcher at @Intel | Former @_CPResearch_ Vulnerability Research TL | Opinions are non-existent

ID: 65497246

linkhttp://omriher.com calendar_today13-08-2009 23:15:18

244 Tweet

1,1K Takipçi

261 Takip Edilen

Omri Herscovici (@omriher) 's Twitter Profile Photo

That's why we recommed simply using the following command for the SIGRed workaround: reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters" /v "TcpReceivePacketSize" /t REG_DWORD /d 0xFF00 /f net stop DNS && net start DNS But patching is much preferred!

Omri Herscovici (@omriher) 's Twitter Profile Photo

There are 40,000 internet-facing Windows DNS servers listening on TCP port 53, but for #SIGRed it could be much higher in case the server only listens on UDP 53. You can force the target to initiate a TCP connection to you by turning on the Truncation flag in a UDP response

Omri Herscovici (@omriher) 's Twitter Profile Photo

It seems that RRSIG-Records parsing indeed leads to the vulnerable function, therefore can also be used to trigger the vulnerability

Omri Herscovici (@omriher) 's Twitter Profile Photo

Turning ON Analytical Logs in Windows DNS could allow for the detection of the SIGRed vulnerability. Looks like the logging of the crafted SIG query is written even if the exploitation fails and the server crashes

Omri Herscovici (@omriher) 's Twitter Profile Photo

We're getting asked whether the registry workaround for SIGRed works on Windows Server 2003 and the answer is YES. However, if your organization still runs it there are probably multiple other ways to pwn it other than using CVE-2020-1350

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

[CPR-Zero] CVE-2020-6008, CVE-2020-6009 & CVE-2020-6010 (Learning Management Systems): Multiple critical vulnerabilities (SQLi + File Write) in the 3 leading WordPress LMS Plugins cpr-zero.checkpoint.com/vulns/cprid-21… cpr-zero.checkpoint.com/vulns/cprid-21… cpr-zero.checkpoint.com/vulns/cprid-21…

Omri Herscovici (@omriher) 's Twitter Profile Photo

After 7 years at Check Point Research, I'm moving on to my next endeavor. Leading the vulnerability research team at Check Point Research was an inspiring position, and it is truly one of the best places in infosec. See you guys down the road!

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

A malicious picture can trigger an Instagram vulnerability potentially resulting in RCE on mobile devices. Read our full technical paper here: research.checkpoint.com/2020/instagram…

Omri Herscovici (@omriher) 's Twitter Profile Photo

I stopped maintaining CapTipper 4 years ago since the decline of exploit kits. To my surprise, I learned the tool is still being used in DFIR toolkits and networking courses in colleges. So I found some time to fix a few bugs and port the code to Python3: github.com/omriher/CapTip…

Omri Herscovici (@omriher) 's Twitter Profile Photo

ChatGPT doesn't only pass Turing's test, but would also slide into his DMs, tell him to meet them at the make-out point and then ghost him