ac

We Asked Def Con Attendees Why People Are Still Getting Hacked









ac

FreeBSD Security Advisory - FreeBSD-SA-19:08.rack

FreeBSD Security Advisory - While processing acknowledgements, the RACK code uses several linked lists to maintain state entries. A malicious attacker can cause the lists to grow unbounded. This can cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service. An attacker with the ability to send specially crafted TCP traffic to a victim system can degrade network performance and/or consume excessive CPU by exploiting the inefficiency of traversing the potentially very large RACK linked lists with relatively small bandwidth cost.




ac

Senate Cracks Down On Net Gambling




ac

Webscraping Allows Hackers To Hit Online Gambling Sites With Botnets




ac

Hackers Busted In Online Poker Cheats





ac

Music Sales Are Not Affected By Web Piracy, Study Finds










ac

SetNamedSecurityInfo() Ignores / Destroys Protected DACLs / SACLs

With Windows 2000 Microsoft introduced the inheritance of access rights and new Win32-API functions like SetNamedSecurityInfo() which handle the inheritance. SetNamedSecurityInfo() but has a serious bug: it applies inheritable ACEs from a PARENT object to a target object even if it must not do so, indicated by the flags SE_DACL_PROTECTED and/or SE_SACL_PROTECTED in the security descriptor of the target object.




ac

Whale Win32 Attack Surface Toolkit

Whale in a win32 attack surface toolkit written in C#. It's capable of monitoring many of different areas of the Windows for new and removed kernel objects, open ports, drivers, services and much more. It also allows a user to test for different bug classes and has found a few interesting issues across the sub-systems.




ac

ptrace Sudo Token Privilege Escalation

This Metasploit module attempts to gain root privileges by blindly injecting into the session user's running shell processes and executing commands by calling system(), in the hope that the process has valid cached sudo tokens with root privileges. The system must have gdb installed and permit ptrace. This module has been tested successfully on Debian 9.8 (x64) and CentOS 7.4.1708 (x64).





ac

European Union Backs Biometric Passports




ac

Rice Apologizes To Obama For Passport Hack




ac

State Department Passport Snoop Faces Little Or No Jail Time




ac

Hacker War Drives San Francisco Cloning RFID Passports




ac

Hackers Expose Security Flaws With Elvis Presley Passport





ac

Citrix Gateway 11.1 / 12.0 / 12.1 Cache Bypass

Citrix Gateway versions 11.1, 12.0, and 12.1 suffer from a caching bypass vulnerability.




ac

Ivanti Workspace Manager Security Bypass

Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability.




ac

File Explorer 1.4 Access Bypass

File Explorer for iOS version 1.4 suffers from an access bypass vulnerability.




ac

Linux PTRACE_TRACEME Local Root

Linux kernel versions starting at 4.10 and below 5.1.7 PTRACE_TRACEME local root exploit that uses the pkexec technique.




ac

Netis E1+ 1.2.32533 Hardcoded Backdoor Account

Netis E1+ version 1.2.32533 suffers from having a hardcoded backdoor root account.








ac

New Spectre Attack Enables Secrets To Be Leaked Over A Network





ac

RIAA Wants Infamous File-Sharer To Campaign Against Piracy