Justin Steven

323 Followers
68 Following
48 Posts
@crikeycon love love love that Droppy uses "they" ❤️​
@campuscodi the concept that PortSwigger took was https://www.usenix.org/conference/usenixsecurity20/presentation/van-goethem which was academic research from 2020 on using HTTP/2 multiplexing to exploit timing sidechannels. The Rapid Reset DoS is somewhat similar, but it's newer and is definitely not what inspired the work. @albinowax presented Single Packet Attack at BHUSA which well and truly predates the Rapid Reset DoS public announcement.
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections | USENIX

Smooth Jazz was a super cute SQL Injection challenge by hashkitten for last week’s @DownUnderCTF. It involves the careful and painful threading of three separate needles. We had so much fun solving it that I’ve written up the journey at https://www.justinsteven.com/posts/2023/09/10/ductf-2023-smooth-jazz-sqli/
DownUnderCTF 2023 - Smooth Jazz (SQL Injection)

justinsteven
@wvu excellent. For me it is another glorious day of not needing to do Diffie-Hellman key exchange by hand
@oj nothing says "Am I the problem?" like "git blame"

@jeremy @oj sorry, but no.

You've suggested "poison the access logs and execute them" despite the fact that the challenge uses a shell to `rm` the filename you give it; it doesn't execute it. You've also suggested "simply execute a system-level reverse shell" by "determining most-likely binary available in target OS to establish command exec" but you haven't shown _how_ to get command exec.

Now you're saying to wget something off of 127.0.0.1 without saying if you're doing that locally on your machine, or if you're doing it on the victim's machine - in which case you're nowhere near being able to execute arbitrary commands on their machine yet, and if you could why would you want to wget their localhost anyway?

You don't then get to say "in the meantime someone else already posted similar solutions" like you were on the right track. Sorry, but you just weren't.

The challenge was "how do you achieve command injection?" not "what would you do with command injection?"

The trick used in the solutions we know work was that file_exists() will honour a URL such as ftp:// to check the existence of a file, at which point you have various places inside a ftp:// URL to hide a command injection trigger (I originally used the username/password part, and bitquark used the fragment which I think is super clever)

Saying "nice trick" or "interesting, TIL" or "yeah gotcha that makes sense" would parse. Saying nothing at all would be appropriate. Saying "that's what I was saying all along!" which is how what you're saying sounds to me (but it might just be me) just doesn't make sense. Take the L.

The VOD of the Gartner Peer Insights widget DOM XSS bug is up! It breaks down the vuln that popped alert on Gradle, LogRhythm, SentinelOne, Synopsys, Veeam, Vodafone and more. Dive into the code, the bug, the POC, the patch and the bypass at https://youtu.be/fCNsZU0uqVs
Computer Hacking - Gartner Peer Insights widget DOM XSS

YouTube

A DOM XSS vulnerability in Gartner's Peer Insights Widget affected the sites of Gradle, LogRhythm, SentinelOne, Synopsys, Veeam, Vodafone and more. Details of the bug, the patch, the bypass, and the final patch are up at https://gartner.com.ring0.lol/

Also, when this toot is two hours old (12pm Sydney time) I'll be live at https://twitch.tv/justinsteven breaking down how I found the bug and how it all worked. If you can't make it then it'll be on YouTube in the coming days, but if you can, come say hi! ❤️

Gartner Peer Insights widget - postMessage DOM XSS vulnerability

If you enjoyed the X41 security review of Git, you might like my work from a while back. RCE via IDEs, shell prompts (including the latest oh-my-zsh), Git pillaging tools and even "git clone -> git status" (still works on modern Git in default config) https://github.com/justinsteven/advisories/blob/main/2022_git_buried_bare_repos_and_fsmonitor_various_abuses.md
advisories/2022_git_buried_bare_repos_and_fsmonitor_various_abuses.md at main · justinsteven/advisories

Contribute to justinsteven/advisories development by creating an account on GitHub.

GitHub

OK, so what does fidget mean? What information do you have around you, right now? Take a deeper look. Why is that WiFi AP named XNF998FE? Why is your laptop's serial number XY3327S? How often is that helicopter circling? Why are so many license plates from a particular state with a specific prefix? Look for the lack of entropy that is an encoded signal.

In the early Metasploit days this involved dumping function addresses of DLLs from a literal binder of DVDs. The opcode database and later analysis by folks like skape (matt miller) and spoonm made exploit development much easier as a result.

Scanning the internet is easy. Understanding all the data coming back takes a lifetime. Grab some data dumps and sift through specific protocols and fields. Toss Fiddler at a Windows thick client (or enable HTTP event tracing).

We are flooded in dodgy software, weak numeration, and information leaks. Stop for a bit, breath, pick one, and go deep.