|
ollypwn
@
ollypwn
Copenhagen, Denmark
|
|
yet another security researcher
|
|
|
34
Tweetovi
|
54
Pratim
|
1.277
Osobe koje vas prate
|
| Tweetovi |
|
ollypwn
@ollypwn
|
29. sij |
|
😂
|
||
|
|
||
|
ollypwn
@ollypwn
|
28. sij |
|
There are some errors because of threading in openssl, so the connection are under some circumstances not terminated by signals. I haven't looked for at solution to this. But yes, you might be right about that
|
||
|
|
||
|
ollypwn
@ollypwn
|
26. sij |
|
Udp only
|
||
|
|
||
|
ollypwn
@ollypwn
|
26. sij |
|
My pleasure. Amazing job with getting RCE!
|
||
|
|
||
| ollypwn proslijedio/la je tweet | ||
|
Luca Marcelli
@layle_ctf
|
26. sij |
|
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;)
Don't forget to patch! pic.twitter.com/FekupjS6qG
|
||
|
|
||
|
ollypwn
@ollypwn
|
25. sij |
|
Loads as in what svchost loads for the service. It loads a lot, but the service loads 2
|
||
|
|
||
|
ollypwn
@ollypwn
|
24. sij |
|
So clean
|
||
|
|
||
|
ollypwn
@ollypwn
|
24. sij |
|
RD Gateway uses DTLS, which is TLS for UDP, so all traffic is encrypted. So there is really no way to tell if a single packet is malicious. But I can record a PCAP for you. DM me
|
||
|
|
||
|
ollypwn
@ollypwn
|
24. sij |
|
Just added Python3 PoC (with scanner) to the repo
github.com/ollypwn/BlueGa… twitter.com/ollypwn/status…
|
||
|
|
||
|
ollypwn
@ollypwn
|
23. sij |
|
PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610
Please use for research and educational purpose only.
github.com/ollypwn/BlueGa… pic.twitter.com/R43AHUwGV0
|
||
|
|
||
|
ollypwn
@ollypwn
|
23. sij |
|
You can also reference my previous post where the same error messages are applied in the "real code" with my pseudo-code comments
|
||
|
|
||
|
ollypwn
@ollypwn
|
23. sij |
|
CVE-2020-0609 & CVE-2020-0610
Before / After patch
Pseudo-code pic.twitter.com/ev79YH5SUH
|
||
|
|
||
|
ollypwn
@ollypwn
|
22. sij |
|
CVE-2020-0609 & CVE-2020-0610 (RDP / RD Gateway RCE)
Here are the immediate patches:
Should be able to create a PoC vulnerability checker in the upcoming weeks with this info. pic.twitter.com/4rOvEAfQTL
|
||
|
|
||
|
ollypwn
@ollypwn
|
22. sij |
|
Inside Management Console, docs.microsoft.com/en-us/dotnet/f…
|
||
|
|
||
|
ollypwn
@ollypwn
|
21. sij |
|
And the other place you check is not patched/updated?
|
||
|
|
||
|
ollypwn
@ollypwn
|
20. sij |
|
skrev i selv disassemblere og decompilere? jeg brugte bare den der lå i mappen sammen med gcc compileren...
|
||
|
|
||
|
ollypwn
@ollypwn
|
18. sij |
|
Feel free to shoot me a DM if there's any issue! :)
|
||
|
|
||
|
ollypwn
@ollypwn
|
18. sij |
|
Nice blog post. Sorry to hear it didn't work. Looks like the commands were the same
|
||
|
|
||
|
ollypwn
@ollypwn
|
18. sij |
|
A great explanation on the recent critical vulnerabilities CVE 2020-0609 & CVE 2020-0610 (RD Gateway RCE) by @MalwareTechBlog on @kryptoslogic
Might look into these vulnerabilities further in the coming weeks
kryptoslogic.com/blog/2020/01/r…
|
||
|
|
||
| ollypwn proslijedio/la je tweet | ||
|
Patch Friday
@PatchFriday
|
17. sij |
|
Vulnerability severity levels pic.twitter.com/7MZUs7fWaS
|
||
|
|
||