TailScale is a popular solution for building virtual networks, but in the hands of a pentester, it can be a pivoting tool.
Magama Bazarov, known under his alter ego “Caster” returns to exploit.org with his exotic release “Bipolar Disorder” about pivoting using TailScale.
https://blog.exploit.org/caster-bipolar-disorder
Currently we are witnessing arrest of creator of main digital privacy respecting messenger Pavel Durov.
WHY THIS MATTERS:
With over 950 million users, Telegram is one of the last products with respect to digital privacy. Holding Durov accountable for content shared by users or for protecting user data from authorities sets a dangerous precedent moving on for everyone that wants to create a privacy first solutions. This is not just about one person. It’s about safeguarding the right to privacy for all of us as a collective.
This action is a serious threat to the fundamental right to privacy in the digital age. Telegram has been a vital tool for millions around the world, ensuring freedom of speech and protecting our personal data, as well as providing the outlet to freely share opinions and information from unwarranted intrusion.
WHAT CAN YOU DO:
We need to raise our voices and demand justice. Write to Amnesty International at contactus@amnesty.org and urge them to support Pavel Durov and advocate for his release. Amnesty has a powerful voice on global platform and has been instrumental in defending human rights across the world. If we unite and work together by sending our concerns to them with requests, we will get justice to work.
Let’s stand together for our fundamental digital rights and make sure this doesn’t go unnoticed. 🛡️
#Repost to other places and channels in order to reach broader masses and communities, so we can get more gravitas in order to protect human right to digital privacy
We as humans are stronger and louder in unity and mass.
Line for Enquiries: contactus@amnesty.org
Mail template: https://telegra.ph/Amnesty-Mail-Template-08-25
#FreeDurov #PrivacyMatters #DigitalRights #AmnestyInternational
I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.
Caster - Funeral
https://blog.exploit.org/caster-funeral
🙂 Telegram started banning bots that send messages, where service number "t.me/+42777"
is included in its content as a link.
Some of popular bots (like @fabrika) got already banned.
If you own a bot, turn off sending messages whose content depends on user input (e.g. greeting with user's firstname, etc.).
P.S Telegram started slowly rollbacking the bans.
Poisoning attacks against Windows machines have become well known among pentesters. In this article, Caster will demonstrate how to detect poisoning attacks using Suricata.
Caster - Neurotransmitter
https://blog.exploit.org/caster-neurotransmitter
Cisco equipment is widespread in production networks. In this article, Caster will demonstrate methods to protect Cisco IOS from network attacks.
Caster - Disciple
https://blog.exploit.org/caster-disciple
⚠️PuTTY CVE-2024-31497 ⚠️
📰Brief: attacker can gain access to private key with public key and some signed messages on hand via forged identification signature of legitimate user. Signed messages may be publicly visible due to storage in public Git.
🚩Possibilities: login into any servers key was used in, supply chain attacks software maintained git, etc.
📗Affected versions: 0.80 and prior.
📚Full description: https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html
Hi to all of those with superior taste and knowledge of true mastery.
Today we are giving away 10 Telegram Premiums amongst our subscribers.
Enjoy and hope the stakes play in your favour, while we do our job 😉
SECURITY ALERT ⚠️
Possible RCE was detected in Telegram's media processing in Telegram Desktop application.
This issue expose users to malicious attacks through specially crafted media files, such as images or videos.
For security reasons disable auto-download feature. Please follow these steps:
1. Go to Settings.
2. Tap on "Advanced".
3. Under the "Automatic Media Download" section, disable auto-download for "Photos", "Videos", and "Files" across all chat types (Private chats, groups, and channels).
We are currently investigating this vulnerability.
A researcher under the nickname Caster returns with his "Against" release to our blog.
This is an extremely specific article about attacks on MikroTik routers.
Release Date: 09/27/2024
https://blog.exploit.org/caster-against/
🚀 OWASP Netryx Release 🚀
https://github.com/OWASP/www-project-netryx
We have our official release of Netryx under OWASP Foundation - advanced Java security framework designed to protect your data and save you from cyber attacks. Here are the key features:
JA3, JA4+, and HTTP/2 Fingerprinting:
identification of users based on TLS and HTTP connection establishment, which helps to avoid bots and bad actors.
Intrusion Detection System (IDS):
Collect and analyze data to detect and block malicious activities.
HTTP/2 0day Protection:
Block attacks exploiting vulnerabilities in the HTTP/2 protocol, preventing you by RST Stream vulnerability
Path Traversal Protection:
Prevent unauthorized access to files outside the web root directory, ensuring your data remains secure.
Protection Against Various Injection Attacks:
HTML, JS, LDAP, and CMD encoders ensuring safety against different types of injection attacks.
Secure Memory Management:
Ensure sensitive information like keys and tokens are safely handled in memory, protecting from Data in Use attacks.
And much more! All these features are implemented in Java, making OWASP Netryx a big addition to your security toolkit.
Don't forget to star the repository 😉
#OWASP #Netryx #CyberSecurity #Java #WebSecurity
Active Directory is used in many networks and is often the target of attacks. In this article, Caster will demonstrate the capabilities of Suricata signatures to detect attacks against Active Directory.
Caster - If You Hadn't
https://blog.exploit.org/caster-ifyouhadnt
Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.
Caster - Kerbhammer
https://blog.exploit.org/caster-kerbhammer
Yet another RCE, Microsoft 🧘♀️
If anyone wanted a fully nuclear RCE, and a reason to keep dependencies updated
Due to one of the Visual Studio download access resources of Microsoft.
This could lead to multiple developer devices being infected, pipeline-poisoning.
Samples and full description of vulnerability will be provided after assessment and testing, after reporting it to Microsoft.
PSA: We, EXPLOIT.ORG, are not liable for any potential damage that can acure from this post
MikroTik equipment is widely distributed all over the world and its security is an acute issue. In this paper, Caster covered many aspects related to the network security of MikroTik equipment.
Caster - Lockdown
https://blog.exploit.org/caster-routeros-lockdown
Alert for iOS users
Trust Wallet has just alerted about zero-day exploit in iMessage.
To disable iMessage go to Settings > Messages and toggle iMessage button.
The days are getting harder and harder 🤷
RCE Status Update.
During the investigation and analysis of the trial material that was provided to us as samples and attack attempts, no illegitimate interference with the Telegram Desktop behavior was detected.
The verdict was made in parallel with the Telegram development team.
PNG samples have nothing to do with the problem, given the specifics of image processing on the Telegram server, while only a properly crafted vunlerable JPG may be considered valid by the server, potentially indicating a problem related to mozjpeg. Despite claims that one of the samples overwrites data in the R9 register to 0x666, we did not find such behavior, moreover, one statement is not a strong evidence of the vulnerability. Without any additional information, it's just guesswork.
The versions of Telegram tested were from 4.16.0 to 4.16.6.
Information about the environment in which the test was performed:
CPU: AMD EPYC™ 7502P 32-Core (Zen2)
Architecture: x86_64
Platform: Windows 10 Version 22H2 (OS Build 19045.4291)
Analyzed and debugged Telegram source code starting points:
- https://github.com/desktop-app/lib_ui/blob/master/ui/image/image_prepare.cpp#L434
- https://github.com/desktop-app/lib_ui/blob/master/ui/image/image_prepare.cpp#L415
- https://github.com/desktop-app/lib_ui/blob/master/ui/image/image_prepare.cpp#L452
- https://github.com/desktop-app/lib_ui/blob/master/ui/image/image_prepare.cpp#L440
- https://github.com/telegramdesktop/tdesktop/blob/84ce72ec7a7f39dddeea5c311a4ec1eb2776847b/Telegram/SourceFiles/storage/file_download.cpp#L160
- https://github.com/telegramdesktop/tdesktop/blob/84ce72ec7a7f39dddeea5c311a4ec1eb2776847b/Telegram/SourceFiles/storage/file_download.cpp#L164
However, there may be things that were not noticed by us in this short time frame.
To request samples, that we were provided with during the investigation or you noticed something that we did not, and want to share with us, please contact us by telegram@exploit.org
⚠️ If you managed to develop POC - contact Telegram directly by security@telegram.org as you'll be eligible for payout starting from 10,000 EUR.