regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems explained
HTML-код
- Опубликовано: 30 июл 2024
- Recently the news of a high severity security risk, shocked the OpenSSH world. Researchers from Qualys Security Advisory showed a remote shell possibility using a double free attach on heap combined with other techniques including unlink & aa4bmo.
In this video I'll try to go a bit deep into this attack and give you leads what to study next if you are interested while describing the technical aspects of this case.
00:00 - CVE-2024-6387
01:23 - Race Condition
04:28 - a look at RegreSSion attack on malloc & free
05:55 - Using Signals & free race condition for attacks
11:00 - How the attack on OpenSSH works
20:10 - aa4bmo attack
22:46 - Why old debian first? No ASLR nor NX
24:29 - Making things faster
- OpenSSH change log: www.openssh.com/releasenotes....
- Qualys Security Advisory: www.qualys.com/2024/07/01/cve...
- Phrack 0x3d: phrack.org/issues/61/6.html#ar...
- Delivering Signals for Fun and Profit: lcamtuf.coredump.cx/signals.txt Наука
Amazing Explanation Jadi Jan, Thanks ❤
You're welcome 😊
that's great jadi joon!
Brilliant 🔥
VERY very GOOD video
Nice Explanation!
Glad it was helpful!
very good jadi
Great and informative
Glad you think so!
thanks for your explanation Jadi I'm looking for you
You're welcome 😊
great video
Thanks for the visit
U r the best
Nice
Thank you
You're welcome
graet
❤
Afreen
Thanks for make it easy to understand.👌
One question out of context of video.!
How do you work with that magic mouse !! I know the gestures are useful and it's like a mouse and touchpad mixed together but really are your fingers ok 🥲 ???
Every time I tried to use it my hand scream at me 😅
How do you deal with charging ???🙃
My fingers are [still] ok.. but the design of this thing is BAD.
@@geekingjadi yeah I agree ! A great functionality tool but BAD design 😵💫 !!
Do some exercises every 10 min or so to keep your fingers healthy, we need more of your grate videos ✌🏻