Newsletter 25/04/2023

This machine has a website that allows to analyze image file metadata with exiftool
. However, the version is vulnerable to command injection and can be used to access the system. Then, we find some Windows event logs and a plaintext password as username, probably a mistake. After that, we gain access as another user that is able to execute a binary with sudo
, which behind the scenes runs a Perl script that leads to the privilege escalation

64-bit binary. Buffer Overflow. Format String vulnerability. FILE
structure attack. GOT overwrite

64-bit binary. Heap exploitation. Off-by-one. Overlapping chunks. Tcache poisoning

Server-Side Request Forgery. Regular Expression Denial of Service

Automotive Cybersecurity. CAN bus messages

PJL execution on a printer

Memory dump analysis

Network traffic analysis. Telnet

Windows. File encryption