Published: Dec. 15, 2020, 11 p.m.
Big news this week as several government agencies and contractors may have been compromised. We also have a number of great writeups this week covering everything from a PS4 webkit exploit, MacOS, and Windows.
\n
\n[00:00:25] CISA issues emergency directive for SolarWinds Orion products compromise
\n
\n\t- https://twitter.com/CISAgov/status/1338348931571445762
- https://www.sec.gov/ix?doc=/Archives/edgar/data/1739942/000162828020017451/swi-20201214.htm
- https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html
- https://twitter.com/KimZetter/status/1338305089597964290
- https://twitter.com/mamah1987/status/1338369455177523201
- https://www.cisa.gov/news/2020/12/13/cisa-issues-emergency-directive-mitigate-compromise-solarwinds-orion-network
\n
\n\n
\n[00:26:53] Finding Critical Open Source Projects
\n
\n\t- https://opensource.googleblog.com/2020/12/finding-critical-open-source-projects.html
- https://github.com/ossf/criticality_score
\n
\n\n
\n[00:33:46] Vulnerabilities in McAfee ePolicy Orchestrator
\n
\n\t- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
\n
\n\n
\n[00:39:20] Chat Question: How to get good at exploit dev
\n
\n\n
\n[00:44:34] Novel Abuses On Wi-Fi Direct Mobile File Transfers
\n
\n\t- https://blog.doyensec.com//2020/12/10/novel-abuses-wifi-direct-mobile-file-transfers.html
\n
\n\n
\n[00:47:55] PsExec Local Privilege Escalation
\n
\n\t- https://medium.com/tenable-techblog/psexec-local-privilege-escalation-2e8069adc9c8
\n
\n\n
\n[00:52:31] Windows: WOF FSCTL_SET_REPARSE_POINT_EX Cached Signing Level SFB
\n
\n\t- https://bugs.chromium.org/p/project-zero/issues/detail?id=2088
\n
\n\n
\n[01:01:07] This is for the Pwners: Exploiting a WebKit 0-day in PlayStation 4
\n
\n\t- https://www.synacktiv.com/en/publications/this-is-for-the-pwners-exploiting-a-webkit-0-day-in-playstation-4.html
\n
\n\n
\n[01:08:51] Game On - Finding vulnerabilities in Valve\u2019s "Steam Sockets"
\n
\n\t- https://research.checkpoint.com/2020/game-on-finding-vulnerabilities-in-valves-steam-sockets/
\n
\n\n
\n[01:14:57] Apple macOS Kernel OOB Write Privilege Escalation Vulnerability [CVE-2020-27897]
\n
\n\t- https://www.thezdi.com/blog/2020/12/9/cve-2020-27897-apple-macos-kernel-oob-write-privilege-escalation-vulnerability
\n
\n\n
\n[01:17:22] ABSTRACT SHIMMER: Host Networking is root-Equivalent, Again [CVE-2020-15257]
\n
\n\t- https://research.nccgroup.com/2020/12/10/abstract-shimmer-cve-2020-15257-host-networking-is-root-equivalent-again/
\n
\n\n
\n[01:24:41] Now you C me, now you don't, part two: exploiting the in-between
\n
\n\t- https://securitylab.github.com/research/now-you-c-me-part-two
\n
\n\n
\n[01:36:04] Portable Data exFiltration: XSS for PDFs
\n
\n\t- https://portswigger.net/research/portable-data-exfiltration
\n
\n\n
\n[01:45:27] HackerOne's 12 Days of Hacky Holidays
\n
\n\t- https://hackerone.com/h1-ctf?type=team
\n
\n\n
\n[01:47:55] The 2020 SANS Holiday Hack Challenge
\n
\n\t- https://holidayhackchallenge.com/2020/
\n
\n\n
Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)
\n
Or the video archive on Youtube (@dayzerosec)