👍2
Forwarded from APT
298559809-27f286d7-e0e3-47ab-864a-e040f8749708.webm
6.5 MB
This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.
📊 Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.
Research:
🔗 https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability
Exploit:
🔗 https://github.com/duck-sec/CVE-2023-28252-Compiled-exe
#windows #privesc #clfs #driver
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
👍2
Buffer Overflow Guide 1.pdf
644.8 KB
Buffer Overflow Guide 1.pdf
👍4
Source Byte
Linux Internals and Forensics.pdf
Mr. Kazemi is one of the best teachers in Iran got into problem with an organization for his Linux Internals and Linux Forensics course and that organization did not pay for the course.
So the course is published for free by Mr. Kazemi to be reviewed by the public.
This course has high quality because it was created for an important organization.
slides 👆🏻
language : persian
course materials : https://news.1rj.ru/str/source_chat/3075 / https://news.1rj.ru/str/akazemi67_courses/23
So the course is published for free by Mr. Kazemi to be reviewed by the public.
This course has high quality because it was created for an important organization.
slides 👆🏻
language : persian
course materials : https://news.1rj.ru/str/source_chat/3075 / https://news.1rj.ru/str/akazemi67_courses/23
Telegram
Source Byte in Source Chat
❤9👍3
👍2
stack-overflow.pdf
1.6 MB
stack-overflow.pdf
qses-08-buffer-overflows_part2.pdf
1.8 MB
qses-08-buffer-overflows_part2.pdf
356lecture21.pdf
3.3 MB
356lecture21.pdf
Lecture21.pdf
441.9 KB
Lecture21.pdf
👍1
This is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (#ADWS) protocol.
https://github.com/FalconForceTeam/SOAPHound
blog
https://github.com/FalconForceTeam/SOAPHound
blog
👍2
Abuse_public_PEF.pdf
2.6 MB
Threat Intelligence of
Abused Public Post-Exploitation Frameworks
credit : https://jsac.jpcert.or.jp/index.html
Abused Public Post-Exploitation Frameworks
credit : https://jsac.jpcert.or.jp/index.html
❤2👍2