www.hvs-consulting.de/en/nfs-secur...
github.com/hvs-consulti...
x.com/michael_eder...
4/4🧵
www.hvs-consulting.de/en/nfs-secur...
github.com/hvs-consulti...
x.com/michael_eder...
4/4🧵
Turn on the option "subtree_check" for all of your exports! This will restrict NFS to the exported directories.
Details:
The escape to the root directory is possible due to how NFS file handles are created by the file system. Supported FS: ext, xfs, btrfs
3/4🧵
Turn on the option "subtree_check" for all of your exports! This will restrict NFS to the exported directories.
Details:
The escape to the root directory is possible due to how NFS file handles are created by the file system. Supported FS: ext, xfs, btrfs
3/4🧵
Just add yourself to the /etc/shadow and /etc/passwd files with the new NetExec implementation🔥
2/4🧵
Just add yourself to the /etc/shadow and /etc/passwd files with the new NetExec implementation🔥
2/4🧵
And the original implementation they did at: github.com/SecuraBV/Tim...
3/3🧵
And the original implementation they did at: github.com/SecuraBV/Tim...
3/3🧵
To prevent attackers from tampering with the system clock, the DC generates a MAC to authenticate NTP responses. The MAC has the form MD5(MD4(computer-pwd) || NTP-response), where the NTP-response acts as a salt. This hash can then be cracked using hashcat.
2/3🧵
To prevent attackers from tampering with the system clock, the DC generates a MAC to authenticate NTP responses. The MAC has the form MD5(MD4(computer-pwd) || NTP-response), where the NTP-response acts as a salt. This hash can then be cracked using hashcat.
2/3🧵