HackerOne – Telegram
HackerOne
11K subscribers
644 photos
31 videos
79 files
2.74K links
Community : @Sec0x01
@Bug0x
Download Telegram
Linux kernel ioctls race condition -> use after free

Upstream : https://github.com/torvalds/linux/commit/b3defb791b26ea0683a93a4f49c77ec45ec96f10

call stack:


thread a:
-> snd_seq_write
-> snd_seq_client_enqueue_event
-> snd_seq_event_dup
-> snd_seq_cell_alloc
-> schedule -> thread b

thread b:
-> snd_seq_ioctl_set_client_pool
-> snd_seq_pool_mark_closing (set closeing to 1)
-> snd_seq_queue_client_leave_cells (release cell)
-> wake_up -> thread a

thread a:
-> snd_seq_ioctl_set_client_pool
-> snd_seq_pool_mark_closing (set closeing to 1 again)
-> snd_seq_queue_client_leave_cells (already release cell by thread b)
-> snd_seq_pool_done (release pool and allocate new pool, 2cd pool;
set closeing to 0)
-> snd_seq_write
-> snd_seq_client_enqueue_event
-> snd_seq_event_dup
-> snd_seq_cell_alloc
-> schedule -> thread b

thread b:
back to snd_seq_queue_client_leave_cells, after func wake_up
-> snd_seq_queue_client_leave_cells
-> snd_seq_pool_done (release pool and allocate new pool, 3rd pool;
set closeing to 0)
(leave 2cd pool's cell unhandled)
-> wake_up -> thread a:

thread a:
-> snd_seq_cell_alloc:
while (pool->free == NULL && ! nonblock && ! pool->closing)
meet dead loop, now pool in thread a is the 2cd pool, has been released,
now is a wild pointer.
This media is not supported in your browser
VIEW IN TELEGRAM
[Digikala] Infinity loop client side bug,

Just for fun!
#Google #XSS by Coltuneac Alexandru
Exobot Author Calls It Quits and Sells Off Banking Trojan Source Code
https://www.bleepingcomputer.com/news/security/exobot-author-calls-it-quits-and-sells-off-banking-trojan-source-code/

Things are about to get a lot worse for Android users after the source code of a highly advanced Android banking trojan has been sold to different parties on a well-known hacking forum. [...]
Deleted Account
Photo
Source code test shellcode by Jems forshow of google project zero

https://github.com/raminfp/shellcode
Microsoft Resumes Meltdown & Spectre Updates for AMD Devices
https://www.bleepingcomputer.com/news/microsoft/microsoft-resumes-meltdown-and-spectre-updates-for-amd-devices/

Microsoft has resumed the rollout of security updates for AMD devices. The updates patch the Meltdown and Spectre vulnerabilities. [...]
[webapps] PEAR XML_RPC < 1.3.0 - Remote Code Execution
https://www.exploit-db.com/exploits/43828/?rss

PEAR XML_RPC
Free PDF about Programming from Stack Overflow
http://books.goalkicker.com/
XSStrike is a program which can crawl, fuzz and bruteforce parameters for XSS. It can also detect and bypass WAFs.
https://github.com/UltimateHackers/XSStrike
Google Forms (WordPress plugin) SSRF vulnerability
https://klikki.fi/adv/wpgform.html
🖕
Topic this course will cover:
Reviewing the C language and the C11 standard
Understanding the development cycle
Setting values
Writing statements and expressions
Adding comments to code for clarity
Declaring data types
Manipulating strings
Declaring variables
Using operators and expressions
Working with functions
Controlling flow with if-else statements and loops
Initializing arrays
Working with files
Including files and executing macros with the C preprocessor
Understanding best coding practices

Course overview:
Course provider: Lynda
Platform: Windows/*Nix
Skill level required: Beginner
Duration: ~7.5 Hours

Download overview:
Name: C-Essential-Training
Total size: ~732.9 MB
Contains: 19 folders and 101 files (Including exercise file)