CVE-2024-1086 - Dirty Net Tables Exploit Demo

Поделиться
HTML-код
  • Опубликовано: 15 дек 2024

Комментарии • 7

  • @norsie45
    @norsie45 4 месяца назад

    the exploit often freezes the OS, makes it be completely stuck.

  • @SyedaNoor-m5c
    @SyedaNoor-m5c Месяц назад

    i have to exploit this using vm virtual box, and an attacking machine (kali) can you please tell w how this is done? i can not use metasploit.
    i also want to know where can i get this version of ubunto from

  • @facts4638
    @facts4638 8 месяцев назад +1

    Any way to get access to that version of ubuntu?

    • @PrestonZen
      @PrestonZen  8 месяцев назад +1

      Download it from the Ubuntu archives

    • @facts4638
      @facts4638 8 месяцев назад

      @@PrestonZen Thanks for the swift reply, I managed to get it to work by using mainline. I might try to also get it to work with ubuntu archives to see if it runs smoother.

  • @ВиталийОвчаренко-и1н
    @ВиталийОвчаренко-и1н 8 месяцев назад +1

    To resolve CVE-2024-1086 issues, the steps involved include:
    1. Identify the vulnerability: Understand that CVE-2024-1086 is a use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component that can lead to local privilege escalation.
    2. Patch or update: Check for patches or updates provided by the vendor (in this case, Linux kernel) to address the vulnerability. Apply the necessary patches to fix the issue.
    3. Mitigation: If a patch is not immediately available, consider implementing temporary mitigations or workarounds to reduce the risk of exploitation.
    4. Testing: After applying the patch or mitigation, thoroughly test the system to ensure that the vulnerability has been effectively addressed without causing any adverse effects.
    5. Monitoring: Continuously monitor for any signs of exploitation or unusual activity related to the vulnerability even after applying the fix.
    Approaching the resolution of CVE-2024-1086 in a systematic manner involves following these steps diligently to ensure the security of the affected systems.

    • @user-lg4le8xr4s
      @user-lg4le8xr4s 8 месяцев назад

      Why even bother copying & pasting this