Newsletter 25/04/2023
This machine has a website that allows to analyze image file metadata with exiftool
. However, the version is vulnerable to command injection and can be used to access the system. Then, we find some Windows event logs and a plaintext password as username, probably a mistake. After that, we gain access as another user that is able to execute a binary with sudo
, which behind the scenes runs a Perl script that leads to the privilege escalation
64-bit binary. Buffer Overflow. Format String vulnerability. FILE
structure attack. GOT overwrite
64-bit binary. Heap exploitation. Off-by-one. Overlapping chunks. Tcache poisoning
Server-Side Request Forgery. Regular Expression Denial of Service
Automotive Cybersecurity. CAN bus messages
PJL execution on a printer
Memory dump analysis
Network traffic analysis. Telnet
Windows. File encryption