#CVE-2024-3400 #RCE #Palo_Alto_OS
https://github.com/W01fh4cker/CVE-2024-3400-RCE
https://github.com/h4x0r-dz/CVE-2024-3400
https://github.com/W01fh4cker/CVE-2024-3400-RCE
https://github.com/h4x0r-dz/CVE-2024-3400
GitHub
GitHub - W01fh4cker/CVE-2024-3400-RCE-Scan: CVE-2024-3400-RCE
CVE-2024-3400-RCE. Contribute to W01fh4cker/CVE-2024-3400-RCE-Scan development by creating an account on GitHub.
👍5❤2🙏2
CVE-2024-2448:
Authenticated Command Injection In Progress Kemp LoadMaster
https://rhinosecuritylabs.com/research/cve-2024-2448-kemp-loadmaster
Authenticated Command Injection In Progress Kemp LoadMaster
https://rhinosecuritylabs.com/research/cve-2024-2448-kemp-loadmaster
Rhino Security Labs
CVE-2024-2448: Authenticated Command Injection In Progress Kemp LoadMaster
This blog covers 2 vulnerabilities discovered by Rhino Security Labs in Kemp LoadMaster load balancers: CVE-2024-2448 and CVE-2024-2449.
👍7❤5🙏2
Exploit Development
https://0xninjacyclone.github.io/posts/exploitdev_1_intro/
https://0xninjacyclone.github.io/posts/exploitdev_2_stack/
https://0xninjacyclone.github.io/posts/exploitdev_3_heap/
https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/
https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/
https://0xninjacyclone.github.io/posts/exploitdev_6_elf/
https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/
https://0xninjacyclone.github.io/posts/exploitdev_8_bor/
https://0xninjacyclone.github.io/posts/exploitdev_1_intro/
https://0xninjacyclone.github.io/posts/exploitdev_2_stack/
https://0xninjacyclone.github.io/posts/exploitdev_3_heap/
https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/
https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/
https://0xninjacyclone.github.io/posts/exploitdev_6_elf/
https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/
https://0xninjacyclone.github.io/posts/exploitdev_8_bor/
👍5❤4🔥4
Disable-TamperProtection
A POC to disable TamperProtection and other Defender / MDE components
It is possible to abuse SYSTEM / TrustedInstaller privileges to tamper or delete WdFilter settings (ALTITUDE regkey) and unload the kernel minidriver to disable Tamper protection and other Defender components. This also affects Microsoft's Defender for Endpoint (MDE), blinding MDE of telemetry and activity performed on a target.
An example, to use the POC is as follows:
Blog: Breaking through Defender's Gates - Disabling Tamper Protection and other Defender components
POC Demo: https://youtu.be/MI6aVDHRix8
This vulnerability, during testing was found to affect the following versions of Windows:
A POC to disable TamperProtection and other Defender / MDE components
It is possible to abuse SYSTEM / TrustedInstaller privileges to tamper or delete WdFilter settings (ALTITUDE regkey) and unload the kernel minidriver to disable Tamper protection and other Defender components. This also affects Microsoft's Defender for Endpoint (MDE), blinding MDE of telemetry and activity performed on a target.
An example, to use the POC is as follows:
1 — Unload WdFilter
2 — Disable Tamper Protection
3 — Disable Defender / MDE components
4 — Reinstate / restore the WdFilter
Blog: Breaking through Defender's Gates - Disabling Tamper Protection and other Defender components
POC Demo: https://youtu.be/MI6aVDHRix8
This vulnerability, during testing was found to affect the following versions of Windows:
• Windows Server 2022 until BuildLabEx Version: 20348.1.amd64fre.fe_release.210507-1500 (April 2024 update)
• Windows Server 2019
• Windows 10 until BuildLabEx Version: 19041.1.amd64fre.vb_release.191206-1406 (April 2024 update)
• Windows 11 until BuildLabEx Version: 22621.1.amd64fre.ni_release.220506-1250 (Sep 2023 update).
GitHub
GitHub - AlteredSecurity/Disable-TamperProtection: A POC to disable TamperProtection and other Defender / MDE components
A POC to disable TamperProtection and other Defender / MDE components - AlteredSecurity/Disable-TamperProtection
❤4👍1👌1