Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Browser Security Handbook
Link

#browser
———
@islemolecule_source
👍2
Forwarded from APT
298559809-27f286d7-e0e3-47ab-864a-e040f8749708.webm
6.5 MB
👩‍💻 Windows CLFS Driver Privilege Escalation

This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.

📊 Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.

Research:
🔗 https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability

Exploit:
🔗 https://github.com/duck-sec/CVE-2023-28252-Compiled-exe

#windows #privesc #clfs #driver
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
Buffer Overflow Attacks.pdf
5.4 MB
👍3
How to start with exploit development
Link

#pwn
———
@islemolecule_source
👍2
Buffer Overflow Guide 1.pdf
644.8 KB
Buffer Overflow Guide 1.pdf
👍4
Buffer Overflow.pdf
1 MB
Buffer Overflow.pdf
#pwn
———
@islemolecule_source
👍3
18482-egg-hunter---a-twist-in-buffer-overflow.pdf
4.3 MB
egg hunter a twist in buffer overflow.pdf
#pwn
———
@islemolecule_source
👍2
Exp 301-unlocked.pdf
10.7 MB
OSED pdf
#pwn
———
@islemolecule_source
👍2
OSED Notes Study Overview by Joas Antonio (1).pdf
20 MB
Osed notes

#pwn
———
@islemolecule_source
👍3
👍6
Source Byte
Linux Internals and Forensics.pdf
Mr. Kazemi is one of the best teachers in Iran got into problem with an organization for his Linux Internals and Linux Forensics course and that organization did not pay for the course.
So the course is published for free by Mr. Kazemi to be reviewed by the public.

This course has high quality because it was created for an important organization.

slides 👆🏻

language : persian

course materials : https://news.1rj.ru/str/source_chat/3075 / https://news.1rj.ru/str/akazemi67_courses/23
9👍3
Binary exploitation: stack,Heap,...
Link

#pwn
———
@islemolecule_source
👍2
stack-overflow.pdf
1.6 MB
stack-overflow.pdf
qses-08-buffer-overflows_part2.pdf
1.8 MB
qses-08-buffer-overflows_part2.pdf
👍1
Source Byte
Lecture21.pdf
Some lecture and article around buffer overflow

#pwn
———
@islemolecule_source
👍2
This is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (#ADWS) protocol.

https://github.com/FalconForceTeam/SOAPHound

blog
👍2
Abuse_public_PEF.pdf
2.6 MB
Threat Intelligence of
Abused Public Post-Exploitation Frameworks


credit : https://jsac.jpcert.or.jp/index.html
2👍2