- 34
- 36 423
MalwareCube
Canada
เข้าร่วมเมื่อ 16 พ.ย. 2014
Cybersecurity, tech, stuff.
Demonstrating the New Linux Exploit (9.9 CVSS)
A deep dive into CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177. A remote unauthenticated attacker can silently replace existing printers or install new ones with a malicious one, resulting in arbitrary command execution (on the computer) when a print job is started.
Timestamps:
0:00 - Introduction
1:45 - Vulnerability Overview
5:50 - Shodan Impact
7:04 - What is CUPS?
8:15 - The Internet Printing Protocol (IPP)
10:00 - Proof of Concept
19:05 - Remote Code Execution
26:10 - Getting a Shell
32:20 - Mitigation
References:
- www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
- www.phoronix.com/news/Linux-CVSS-9.9-Rating
- github.com/RickdeJager/cupshax/
Timestamps:
0:00 - Introduction
1:45 - Vulnerability Overview
5:50 - Shodan Impact
7:04 - What is CUPS?
8:15 - The Internet Printing Protocol (IPP)
10:00 - Proof of Concept
19:05 - Remote Code Execution
26:10 - Getting a Shell
32:20 - Mitigation
References:
- www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
- www.phoronix.com/news/Linux-CVSS-9.9-Rating
- github.com/RickdeJager/cupshax/
มุมมอง: 14 165
วีดีโอ
How GitHub is Phishing Millions of Developers
มุมมอง 9772 หลายเดือนก่อน
In this video, I share one of the more interesting and clever phishing attempts I've seen in a while. This one’s different: the attacker is using the legitimate GitHub "issues" feature to push their phishing attempt through trusted services. Watch as we break down how exactly the attacker did it and even uncover what malicious code it tries to social engineer us into running. After doing some c...
this one-liner will crash your system
มุมมอง 2.9K6 หลายเดือนก่อน
Do not 'curl forkbomb.me | bash' :-)
How to Pivot and Tunnel with Ligolo-ng
มุมมอง 3.2K8 หลายเดือนก่อน
How can we perform lateral movement using a compromised host to reach the internal network? Ligolo-NG is how. Ligolo-NG: github.com/nicocha30/ligolo-ng
How to Fix and Debug Exploit Code
มุมมอง 3358 หลายเดือนก่อน
Sometimes a public exploit you locate contains broken code, throws vague errors, or fails to achieve your intended goal. It's important to be able to troubleshoot and debug these issues effectively; otherwise, you'll find yourself endlessly spinning your wheels. Especially on the OSCP exam. In this video, I aim to demystify the methodology of approaching fixing exploits and explore ways in whic...
Day 17 - I Tawt I Taw A C2 Tat! (TryHackMe Advent of Cyber 2023)
มุมมอง 11K11 หลายเดือนก่อน
This is a video walkthrough of Day 17 for the Advent of Cyber 2023 event. In today's task, we look at the SiLK suite, and how it can be used to identify network behaviour, patterns, and anomalies. Launch Advent of Cyber: tryhackme.com/r/christmas 0:00 - Introduction and Story 1:25 - Accessing the Machine 2:52 - Network Traffic Data 7:00 - PCAPs vs Network Flows 9:13 - How to Collect and Process...
Learn to Hack For Free | TryHackMe Advent of Cyber 2023
มุมมอง 7511 หลายเดือนก่อน
tryhackme.com/christmas #tryhackme #hacking #cybersecurity
Live Phishing Investigation and Response
มุมมอง 154ปีที่แล้ว
Join me as I delve into a live investigation of a recent phishing email, exposing its attempt to steal victims' credit card information. I also cover reporting the malicious webpages at the registrar level to (hopefully) hinder their campaign.
NahamCon CTF 2023 - Ninety One
มุมมอง 88ปีที่แล้ว
A quick walk-through of the "Ninety One" challenge from the recent 48-Hour NahamCon CTF Competition. NahamCon CTF 2023: ctf.nahamcon.com
NahamCon CTF 2023 - Glasses
มุมมอง 91ปีที่แล้ว
A quick walk-through of the "Glasses" challenge from the recent 48-Hour NahamCon CTF Competition. NahamCon CTF 2023: ctf.nahamcon.com
NahamCon CTF 2023 - Fast Hands
มุมมอง 151ปีที่แล้ว
A quick walk-through of the "Fast Hands" challenge from the recent 48-Hour NahamCon CTF Competition. NahamCon CTF 2023: ctf.nahamcon.com
NahamCon CTF 2023 - Online Chatroom
มุมมอง 208ปีที่แล้ว
A quick walk-through of the "Online Chatroom" challenge from the recent 48-Hour NahamCon CTF Competition. NahamCon CTF 2023: ctf.nahamcon.com
Session Hijacking Attack | Natas: OverTheWire (Level 18)
มุมมอง 138ปีที่แล้ว
In Level 18 of OverTheWire's Natas CTF wargame, we are able to leverage a brute-forcing attack to hijack a valid admin PHPSESSID on the webserver. OverTheWire: overthewire.org/wargames/ Writeups: github.com/odacavo/overthewire/tree/main/01_natas Session Hijacking Attack: owasp.org/www-community/attacks/Session_hijacking_attack PHP session_id: www.php.net/manual/en/function.session-id.php 0:00 -...
SQL Injection Timing Attack | Natas: OverTheWire (Level 17)
มุมมอง 159ปีที่แล้ว
In Level 17 of OverTheWire's Natas CTF wargame, we are able to leverage the SLEEP() statement in SQL to infer a blind response for our SQL injection in order to brute force the correct password. OverTheWire: overthewire.org/wargames/ Writeups: github.com/odacavo/overthewire/tree/main/01_natas 0:00 - Introduction 0:33 - Source Code Walkthrough 1:57 - Demonstration and Solution 4:40 - Python Solu...
Blind Command Substitution RCE | Natas: OverTheWire (Level 16)
มุมมอง 124ปีที่แล้ว
In Level 16 of OverTheWire's Natas CTF wargame, we are able to leverage blind command substitution and brute force automation to get remote code execution on the web server. OverTheWire: overthewire.org/wargames/ Writeups: github.com/odacavo/overthewire/tree/main/01_natas Command Substitution: www.gnu.org/software/bash/manual/html_node/Command-Substitution.html 0:00 - Introduction 0:20 - Source...
Blind SQL Brute Forcing | Natas: OverTheWire (Level 15)
มุมมอง 194ปีที่แล้ว
Blind SQL Brute Forcing | Natas: OverTheWire (Level 15)
SQL Injection | Natas: OverTheWire (Level 14)
มุมมอง 76ปีที่แล้ว
SQL Injection | Natas: OverTheWire (Level 14)
Magic Bytes & Hex Editing RCE | Natas: OverTheWire (Level 13)
มุมมอง 197ปีที่แล้ว
Magic Bytes & Hex Editing RCE | Natas: OverTheWire (Level 13)
File Upload RCE | Natas: OverTheWire (Level 12)
มุมมอง 114ปีที่แล้ว
File Upload RCE | Natas: OverTheWire (Level 12)
XOR Deep Dive | Natas: OverTheWire (Level 11)
มุมมอง 143ปีที่แล้ว
XOR Deep Dive | Natas: OverTheWire (Level 11)
Filtered PHP Command Injection | Natas: OverTheWire (Level 10)
มุมมอง 87ปีที่แล้ว
Filtered PHP Command Injection | Natas: OverTheWire (Level 10)
PHP Command Injection | Natas: OverTheWire (Level 9)
มุมมอง 80ปีที่แล้ว
PHP Command Injection | Natas: OverTheWire (Level 9)
PHP Base64 & Hex Decoding | Natas: OverTheWire (Level 8)
มุมมอง 148ปีที่แล้ว
PHP Base64 & Hex Decoding | Natas: OverTheWire (Level 8)
Local File Inclusion (LFI) Attacks | Natas: OverTheWire (Level 7)
มุมมอง 74ปีที่แล้ว
Local File Inclusion (LFI) Attacks | Natas: OverTheWire (Level 7)
Introduction to Port Scanning | Nmap Essentials
มุมมอง 89ปีที่แล้ว
Introduction to Port Scanning | Nmap Essentials
Python Secret POSTing | Natas: OverTheWire (Level 6)
มุมมอง 75ปีที่แล้ว
Python Secret POSTing | Natas: OverTheWire (Level 6)
Look to the Cookie! 🍪 | Natas: OverTheWire (Level 5)
มุมมอง 123ปีที่แล้ว
Look to the Cookie! 🍪 | Natas: OverTheWire (Level 5)
HTTP Header Manipulating | Natas: OverTheWire (Level 4)
มุมมอง 131ปีที่แล้ว
HTTP Header Manipulating | Natas: OverTheWire (Level 4)
Robots.txt | Natas: OverTheWire (Level 3)
มุมมอง 77ปีที่แล้ว
Robots.txt | Natas: OverTheWire (Level 3)
You made a wonderful Natas series. It's very sad that you stopped before completing the remaining exercises, but you created a well-explained tutorial. Your explanations are very clear and easy to understand. Please keep posting more content. Thank you for this amazing series!
Thank you! I would like to return to the series soon. I do have a lot new videos I want to film here, I hope to post more frequently before the new year
finally no more proxychains
thanks for it man
CUPS is the generic print system. I purposely uninstall it. Since I use HP printers, I use HP Linux Imaging and Printer system (HPLIP) and foomatic is not installed either.
hey malwarecube, awesome explanation. I am trying to replicate the same on my mac m2 pro, running a vmware fusion with ubuntu server, but am not able to do it. Can you help with that ? Also, how do you have your lab setup ( i need help setting this up on m2 arm chips, as some packages don't work on arm the way it works on x64 processors ).
I was a bit confused on how this exploit worked. But this video really helped me out to understand it. Thanks again!
Thanks man! 😀 I'm glad you enjoyed it.
great explanation, thank you
great video!
wow cool 😀 please more like that Stuff(P😀C) please
Fantastic video. Enjoyed it very much.
@@Sanc888 thank you :)
Apakah bisa menolong kami yang kena penipuan kak. 🥹🙏🙏
Very nice! Thanks for sharing. Still: please put your image/cam on your lower right instead as it covers up stuff that you are trying to present and it beats the point of presenting something since only you can see it while presenting it.
Yeah, I've since found a way to record the screen and camera separately so I can manually hide it in editing as needed.
Thank you dude. First time messing with commands in the terminal. Cups-browsed service removed. This happened at a strange time. Kind of new to Linux and someone else in the house just bought a printer which I noticed popping up in the network lol. I didn't feel very at risk although the status command did indicate vulnerable.
Great vid and POC
Totally over rated, Most distributions have fixed it by ether removing the daemon, or disabling it. This is not Windows were it takes them for weeks to fix anything.
Nice explanation! Thanks
31:58 Your telnet expects " " newline sequences while the remote terminal only prints " ". After skimming the manpage, I think the onlcr option in stty can address that.
@pierrecolin6376 nice catch :)
awesome poc. thanks for the video
Awesome demo. Great narration. Thank you! I am not a linux person, what surprised me is that apparently it seems common practice that network printers located outside your LAN can simply advertise themselves to your linux box. Mitigation imho would be fixing firewall settings or adding OS specific protection against accepting IPs outside your home turf. If this exploit is based on mDNS, I would doubt though that mDNS would be sble to cross your subnet in the first place. Or did I miss a crucial point? I have to admit I have definitely blind spots when it comes to Linux 😊 Thanks anyway for taking the time & explaining the mechanics behind this in such a well paced way, I am sure it helps many people better judge their personal risk.
@twr4641 thanks! Yeah there is a way to exploit internet facing systems that doesn't use the mDNS method just by sending over a UDP port 631 packet. This video demonstrates that LAN / local network method since it was a bit easier to lab, but the original blog I linked shows the WAN entry point method as well :)
@@MalwareCubeThat makes sense. I am sure the service might be triggerable in a variety of ways. Thanks for demoing this vulnerability at just the right pace.
Rather than trying to come up with a printer brand just call it "Print to PDF". I guarantee most enteprise workers would fall for it. You can even make the command actually produce a pdf file and they wouldn't notice the impact.
@@MartinWoad fantastic idea, you're right.
Dude, I was watching this video 2 days ago when you had 999 subscribers. Now you have 1.41k. Nice!! Great explanation indeed. Loved it
@@Abhinav-MR thank you so much!
Loved the lab demo. Great video!
Awesome. Thanks. 🥲
8:20 @PirateSoftware REF 💅
😈🖨 EvilPrinter
Ubuntu had the patched CUPS packages out early that morning ( West Coast US )
Not interesting really. Problem is.. cups.. desktop.. NAT.. != normally on public IP... So it makes it incredibly boring.. and no one in their right mind put it on the internet.. But as a horizontal vector.. sure
correct, but at least 75k had put it on the Internet. Actually, according to Marcus Hutchins' research, he found 107,287 Internet exposed cups-browsed instances. Not really a nothingburger but I wouldn't clock it as a 9.9 either.
Brilliant walkthrough 😍😍😍
Really great explanation!
Great video, earned a sub bro!!!
Amazing video man. Loved the way you went into detail and explained everything.
Why this is so highly rated? Well I could bet on "now printers work fine, we will fix issue later". Later comes never and everybody forgets about it. :)
@@erglaligzda2265 considering one of the CVEs has basically been around since 2011, you're probably right 😅
Actually yes. I've found clues of this attack style at an enterprise and ive spot checked all of the printers and some managers reported this issue a year ago and nothing happened.
Proper NAT, and keeping your local network secure is important, obviously port 631 should be blocked on your public network facing nics.
this channel is such a gem bro hope you get more subs soon! Edit: btw do you know your site is down it may be my filters but i dont think so
Thank you so much! me too :) lol
So, for a user behind NAT, there's nothing to worry about?
You didn't really do anything wrong except not align xterm with your terminal sizing. You I believe were using xterm-256-color but regardless you can fix it with exporting the terminal size with stty rows and columns. Good video.
@ADudeOnTheInternet ahhh yes, that's what it was. Good catch lol. And thank you :)
subbed
hey congrats on hitting 1000 subscriber. I'm the 1000th subscriber
Woot! that's huge, thank you for being 1k. 🥳
The vulnerability is concerning, but of more concern is THE LINUX COMMUNITY (not the developers) trying to play down the seriousness.
I think it will be interesting to see how it plays out. The CVEs have already been downgraded slightly from what it was originally hyped up to be.
The devs HAVE played this down. I get where they are coming from. It's a lot o work to fix this. They just don't have the will or resources to tackle this fix.
Great video
@ramseyibe2844 thank you :)
Great video and explanation
Awesome stuff. Thank you for covering this!
@@TylerRamsbey thanks for watching Tyler!! 🙏
thanks
Thanks for the thorough demo.
thx for the nice explanation and POC \o/
Great video. Thanks for sharing
Fantastic video, Andrew! Thank you for putting this together and sharing. Looking forward to more videos in the future.
Thanks so much :)
I got the same email. John Hammond made a video about the same "fake captcha" phishing attempt this week too. Was funny to see it in the wild literally the day after watching that video.
Hey, great video! Saw myself in the VT community tab :D Keep it up!
no way, that's really cool! Thank you.
I laughed so hard when i saw "press pasta then enter" asking me to run your malware on my computer for you is crazy lol
Fr