Testing a proof of concept [closed]
Has anyone tested CVE-2017-0475.zip to get root? It is an elevation of priviledge proof of concept attack on Android recovery.
Collaborate Disseminate
Has anyone tested CVE-2017-0475.zip to get root? It is an elevation of priviledge proof of concept attack on Android recovery.
Has anyone tested CVE-2017-0475.zip to get root? It is an elevation of priviledge proof of concept attack on Android recovery.
Alice and Bob are on the same file system. Alice made a spam filter plugin, which reads /tmp/mail and then writes the report to /tmp/report. The /tmp/mail has permission 400 and /tmp/report has permission 600. Both files have owner and gro… Continue reading Use side-channel attack to steal file with permission 600?
At work we are using a secure file transfer utility that, after setting it up, sends you and the participants you want to share those files with, two emails. One email contains the randomised username, another one the password. I understan… Continue reading If email is an insecure medium, why are usernames and passwords sent via email (albeit in separate ones)?
I would like to use an AWS S3 bucket to store my IoT firmware file and allows all of my IoT devices to access it to update the firmware to the latest version.
I want that the firmware file in the S3 bucket is secret to only me and my devic… Continue reading Does adding a randomized string in S3 file path has equal security to Google Drive shared link
I have launched a WordPress site for a private group of people. This site serves as a public representational site, but also they make "posts" with "Private" checked, so only logged in users can see those posts. Everyth… Continue reading protect wordpress uploaded files access from non-logged-in users?
My boss truly believes that keeping files on paper and locked in his drawer is the safest place ever. He is the type of guy that processes a file in Word/Excel, prints it, delete the file and store the physical paper in his drawer. Also, h… Continue reading How to technically introduce my boss to computer file security?
After stumbling upon some unknown folders in my unused OneDrive (posted question), I did some digging arround and found some interesting logs. Apparently, OpenSSH had been used for remote access on my machine. A description of the attack c… Continue reading OpenSSH artifacts, remote system access?
Today I opened OneDrive by accident, since I do not use it. To my surprise, inside there were unknown folders, in foreign (to me) languages. Namely, "document" and "photo" folders in Korean and a shortcut in French with… Continue reading Unknown folders in OneDrive [closed]
Let’s say we have an elf a and a textfile a.txt in the same directory.
The a elf is a program, that is remotely accessible/executable.
In addition a contains the instruction fgets(buf,len,stdin); and a remote attacker manages to get full c… Continue reading Generate C File Stream Object on remote machine without fopen()