regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems explained
Vložit
- čas přidán 8. 08. 2024
- Recently the news of a high severity security risk, shocked the OpenSSH world. Researchers from Qualys Security Advisory showed a remote shell possibility using a double free attach on heap combined with other techniques including unlink & aa4bmo.
In this video I'll try to go a bit deep into this attack and give you leads what to study next if you are interested while describing the technical aspects of this case.
00:00 - CVE-2024-6387
01:23 - Race Condition
04:28 - a look at RegreSSion attack on malloc & free
05:55 - Using Signals & free race condition for attacks
11:00 - How the attack on OpenSSH works
20:10 - aa4bmo attack
22:46 - Why old debian first? No ASLR nor NX
24:29 - Making things faster
- OpenSSH change log: www.openssh.com/releasenotes....
- Qualys Security Advisory: www.qualys.com/2024/07/01/cve...
- Phrack 0x3d: phrack.org/issues/61/6.html#ar...
- Delivering Signals for Fun and Profit: lcamtuf.coredump.cx/signals.txt - Věda a technologie
that's great jadi joon!
Amazing Explanation Jadi Jan, Thanks ❤
You're welcome 😊
Nice Explanation!
Glad it was helpful!
VERY very GOOD video
Brilliant 🔥
thanks for your explanation Jadi I'm looking for you
You're welcome 😊
very good jadi
great video
Thanks for the visit
Great and informative
Glad you think so!
Thank you
You're welcome
U r the best
Nice
Thanks for make it easy to understand.👌
One question out of context of video.!
How do you work with that magic mouse !! I know the gestures are useful and it's like a mouse and touchpad mixed together but really are your fingers ok 🥲 ???
Every time I tried to use it my hand scream at me 😅
How do you deal with charging ???🙃
My fingers are [still] ok.. but the design of this thing is BAD.
@@geekingjadi yeah I agree ! A great functionality tool but BAD design 😵💫 !!
Do some exercises every 10 min or so to keep your fingers healthy, we need more of your grate videos ✌🏻
graet
❤
Afreen