Hijacking Azure Machine Learning Notebooks (via Storage Accounts)
The article discusses vulnerabilities in the Azure Machine Learning (AML) service, particularly focusing on excessive Storage Account permissions that allow code execution in user-created Jupyter notebooks. It highlights a previously remediated privilege escalation vulnerability and introduces a tool for dumping stored credentials from AML workspaces. Affected: Azure Machine Learning

Keypoints :

The Azure Machine Learning (AML) service is used for data processing and integrates with other Azure services.…
Read More

This article discusses the detection and exploitation of a second-order SQL injection vulnerability using Out-of-Band techniques. It highlights the process of identifying the vulnerability, leveraging DNS requests for data exfiltration, and the challenges faced during the exploitation phase. The insights provided aim to enhance understanding of SQL injection vulnerabilities and their implications for application security.…
Read More

Summary:This article discusses how a security consultant uncovered a critical vulnerability by chaining multiple findings across three applications running on the same hostname. Initially rated as informational, a misconfiguration led to administrative access and remote code execution. The case highlights the dangers of seemingly benign vulnerabilities when combined.#WebSecurity…
Read More

Summary:

PowerHuntShares v2 introduces enhanced functionalities for analyzing SMB shares with excessive privileges, aiding cybersecurity teams in identifying and remediating vulnerabilities. Key features include automated secrets extraction, share similarity scoring, and a new ShareGraph Explorer for visualizing share relationships.

Keypoints:

PowerHuntShares is an open-source tool designed to analyze SMB shares with excessive privileges.…
Read More

Short Summary:

Recent advancements in penetration testing for CICS and IMS applications have highlighted the need for enhanced security measures in mainframe environments. This article discusses seven common vulnerabilities found in these systems and offers methods for testing and mitigating these risks.

Key Points:

Significant advancements in penetration testing for CICS and IMS applications.…
Read More

Short Summary:

The article discusses the evolution of Azure Automation Accounts, particularly the introduction of Runtime Environments, which allow for custom PowerShell modules and Python packages. It highlights the potential security risks associated with malicious packages that can be uploaded to these accounts, enabling attackers to gain persistent access through backdoored modules.…

Read More

Short Summary:

This article discusses the benefits of having access to a testing LPAR at NetSPI, particularly during penetration testing engagements. It details how to retrieve information from in-memory tables on z/OS when certain commands cannot be executed. The author shares a REXX script to visualize and access the contents of the Command Tables Location Table (CTLT), which aids in uncovering potential security vulnerabilities.…

Read More

Short Summary:

This article discusses SQL Server credential objects and their potential abuse by threat actors to execute code as different user accounts. It highlights how penetration testers and red teamers can leverage these credentials for privilege escalation, even without local administrative access. The article also provides a detailed walkthrough on how to hijack existing credential objects and execute commands in the context of another user.…

Read More
Short Summary

DEF CON 32 gathered thousands of hackers and security enthusiasts, providing opportunities for learning and networking. Attendees shared insights from various talks, emphasizing the importance of proactive security in the evolving cybersecurity landscape.

Key Points Networking Opportunities: Attendees engaged with the hacker community to build relationships and share knowledge.…
Read More

“`html

Short Summary

Microsoft’s Azure Arc service, introduced in 2019, enables the integration of on-prem resources with Azure cloud. However, it poses security risks due to its authentication model, which relies on a System-Assigned Managed Identity that stores credentials locally. This can lead to unauthorized access if local administrators extract these credentials.…

Read More

GCPwn is a python-based framework for pentesting GCP environments. While individual exploit scripts exist today for GCP attack vectors, GCPwn seeks to consolidate all these scripts and manage multiple sets of credentials at once (for example, multiple service account keys) all within one framework. With the use of interactive prompts, GCPwn makes enumeration and exploitation of resources/permissions more trivial to execute aiding the average pentester.…

Read More
Intro – What is Prototype Pollution?

Prototype Pollution is a JavaScript vulnerability where it’s possible for an attacker to control unexpected variables in JavaScript, which on the client-side can lead to Cross-Site Scripting, and on the server-side lead to Remote Code Execution. 

It is caused by ‘JavaScript Weirdness’, specifically in the declaration and setting of variable names, and is exploitable because of further JavaScript weirdness with weak typing, where it’s possible to have various undeclared variables in code that can be controlled by Prototype Pollution. …

Read More

During a recent red team operation, NetSPI discovered a local privilege escalation path in the default installation of Microsoft Service Fabric Runtime, a software commonly used for local application development. This vulnerability would allow a low privilege user, with a foothold on a host running the service fabric deployment, to elevate their privileges up to System.  …

Read More

Summary: The interaction between web2 client-server architectures and web3 systems presents security challenges. Web3 systems often rely on classic centralized components, which can create unique attack surfaces. In this post, ongoing research on the use of web2 components in web3 systems is summarized, including vulnerabilities found in the Dappnode node management framework.…

Read More