About Oscar Mallo

This author has not yet filled in any details.
So far Oscar Mallo has created 8 blog entries.

Google messes up: Office 365 login portal is not from Microsoft

By |3 Oct. 2022|

«Office 365 login» With those words, many people start their workday to authenticate to Microsoft's web tools, with which their companies are integrated. This Google search usually yields the link to the Office portal as the first result. Today (at the time of this writing it's October 3), when performing this Google search, a glitch in the famous search engine caused the targeted link to end up on the GoDaddy login page. This could have allowed many users to get confused and trust this web portal with the credentials to access the Microsoft 365 suite. In the image below, it shows how Google displays as the main «Sign In - Outlook» link the URL that ends up redirecting to GoDaddy: ...

Comments Off on Google messes up: Office 365 login portal is not from Microsoft

CVE-2022-26134. Zero Day vulnerability affecting Atlassian Confluence

By |3 Jun. 2022|

A remote code execution vulnerability affecting Atlassian Confluence products has recently been identified and assigned CVE-2022-26134. This vulnerability is exploitable without requiring authentication and being actively exploited. According to the initial analysis, the vulnerability is a code injection (OGNL Inyection), similar to other vulnerabilities that have been reported on other occasions. Products affected by vulnerability CVE-2022-26134 Atlassian Confluence Server. Atlassian Confluence Data Center. According to official information published by Atlassian, all versions of Confluence Server and Data Center have been affected by CVE-2022-26134 vulnerability . CVE-2022-26134 Workarounds and security patches Patch for the Atlassian confluence vulnerability Atlassian has released the following versions 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4 and 7.18.1 which contain a fix for this issue. Atlassian recommends upgrading ...

Comments Off on CVE-2022-26134. Zero Day vulnerability affecting Atlassian Confluence

Abusing SeLoadDriverPrivilege for privilege escalation

By |14 Jun. 2018|

0x01 – Preamble In Windows operating systems, it is well known that assigning certain privileges to user accounts without administration permissions can result in local privilege escalation attacks. Although Microsoft's documentation is quite clear about it, throughout several pentests we have found privilege assignment policies assigned to ordinary users, that we have been able to exploit to take full control over a system. Today, we will analyze the impact associated to the assignment of the "Load and unload device drivers" policy, which specifies the users who are allowed to dynamically load device drivers. The activation of this policy in the context of non-privileged users implies a significant risk due to the possibility of executing code in kernel space. Although this ...

Enterprise WiFi network security audit from openwrt

By |14 Jul. 2015|

The main difficulties found when performing a security audit of Enterprise WiFi network by a security analyst in ethical hacking are the following: WPA Enterprise networks impersonation. Client’s devices and mobile terminals attacks. WiFi WPA Enterprise password cracking. Hostapt-WPE (Wireless Pwnage Edition) is a WiFi attack tool which replaces part of the problem creating a fake access point with a modified radius service responsible for clients’ usernames and passwords compilation. Nevertheless, we have learned from experience that big problems emerge when using this software in distribution such as in Kali Linux. Actually, the following problems were not present since years ago: Low transmission speeds, unsatisfactory for client’s association. WiFi card and chipsets incompatibility with 5Ghz band. WiFi security audit performance ...

Comments Off on Enterprise WiFi network security audit from openwrt

We are using cookies to give you the best experience on our website. You can find out more about which cookies we are using or switch them off in Cookies Settings

Necessary

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages. Keeping this cookie enabled helps us to improve our website.

Cookies policy