Newsletter 25/04/2023

This machine has a website that allows to analyze image file metadata with exiftool. However, the version is vulnerable to command injection and can be used to access the system. Then, we find some Windows event logs and a plaintext password as username, probably a mistake. After that, we gain access as another user that is able to execute a binary with sudo, which behind the scenes runs a Perl script that leads to the privilege escalation

64-bit binary. Buffer Overflow. Format String vulnerability. FILE structure attack. GOT overwrite

64-bit binary. Heap exploitation. Off-by-one. Overlapping chunks. Tcache poisoning

Server-Side Request Forgery. Regular Expression Denial of Service

Automotive Cybersecurity. CAN bus messages

PJL execution on a printer

Memory dump analysis

Network traffic analysis. Telnet

Windows. File encryption