Twitter | Pretraživanje | |
ollypwn
yet another security researcher
34
Tweetovi
54
Pratim
1.277
Osobe koje vas prate
Tweetovi
ollypwn 29. sij
Odgovor korisniku/ci @CitadelArcho @intigriti
😂
Reply Retweet Označi sa "sviđa mi se"
ollypwn 28. sij
Odgovor korisniku/ci @BenjaminPill
There are some errors because of threading in openssl, so the connection are under some circumstances not terminated by signals. I haven't looked for at solution to this. But yes, you might be right about that
Reply Retweet Označi sa "sviđa mi se"
ollypwn 26. sij
Udp only
Reply Retweet Označi sa "sviđa mi se"
ollypwn 26. sij
Odgovor korisniku/ci @layle_ctf
My pleasure. Amazing job with getting RCE!
Reply Retweet Označi sa "sviđa mi se"
ollypwn proslijedio/la je tweet
Luca Marcelli 26. sij
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!
Reply Retweet Označi sa "sviđa mi se"
ollypwn 25. sij
Odgovor korisniku/ci @hjy79425575
Loads as in what svchost loads for the service. It loads a lot, but the service loads 2
Reply Retweet Označi sa "sviđa mi se"
ollypwn 24. sij
Odgovor korisniku/ci @layle_ctf
So clean
Reply Retweet Označi sa "sviđa mi se"
ollypwn 24. sij
Odgovor korisniku/ci @TekDefense
RD Gateway uses DTLS, which is TLS for UDP, so all traffic is encrypted. So there is really no way to tell if a single packet is malicious. But I can record a PCAP for you. DM me
Reply Retweet Označi sa "sviđa mi se"
ollypwn 24. sij
Just added Python3 PoC (with scanner) to the repo
Reply Retweet Označi sa "sviđa mi se"
ollypwn 23. sij
PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.
Reply Retweet Označi sa "sviđa mi se"
ollypwn 23. sij
Odgovor korisniku/ci @layle_ctf
You can also reference my previous post where the same error messages are applied in the "real code" with my pseudo-code comments
Reply Retweet Označi sa "sviđa mi se"
ollypwn 23. sij
CVE-2020-0609 & CVE-2020-0610 Before / After patch Pseudo-code
Reply Retweet Označi sa "sviđa mi se"
ollypwn 22. sij
CVE-2020-0609 & CVE-2020-0610 (RDP / RD Gateway RCE) Here are the immediate patches: Should be able to create a PoC vulnerability checker in the upcoming weeks with this info.
Reply Retweet Označi sa "sviđa mi se"
ollypwn 22. sij
Odgovor korisniku/ci @JoshInGeneral
Inside Management Console,
Reply Retweet Označi sa "sviđa mi se"
ollypwn 21. sij
Odgovor korisniku/ci @w0rldkauts
And the other place you check is not patched/updated?
Reply Retweet Označi sa "sviđa mi se"
ollypwn 20. sij
Odgovor korisniku/ci @vm_call @CitadelArcho
skrev i selv disassemblere og decompilere? jeg brugte bare den der lå i mappen sammen med gcc compileren...
Reply Retweet Označi sa "sviđa mi se"
ollypwn 18. sij
Odgovor korisniku/ci @layle_ctf @gN3mes1s
Feel free to shoot me a DM if there's any issue! :)
Reply Retweet Označi sa "sviđa mi se"
ollypwn 18. sij
Odgovor korisniku/ci @layle_ctf @gN3mes1s
Nice blog post. Sorry to hear it didn't work. Looks like the commands were the same
Reply Retweet Označi sa "sviđa mi se"
ollypwn 18. sij
A great explanation on the recent critical vulnerabilities CVE 2020-0609 & CVE 2020-0610 (RD Gateway RCE) by on Might look into these vulnerabilities further in the coming weeks
Reply Retweet Označi sa "sviđa mi se"
ollypwn proslijedio/la je tweet
Patch Friday 17. sij
Vulnerability severity levels
Reply Retweet Označi sa "sviđa mi se"