Browsing tag

execution

pongoOS – A Pre-Boot Execution Environment For Apple Boards

  A pre-boot execution environment for Apple boards built on top of checkra1n.   Building on macOS Install Xcode + command-line utilities make clean all Building on Linux Download Sam Bingner’s iOS Toolchain Copy scripts/arm64-apple-ios12.0.0-clang to a directory in $PATH Adjust the TOOLCHAIN variable to point to the downloaded toolchain make clean all Contributions By […]

ThreadBoat – Uses Thread Execution Hijacking To Inject Shellcode

  Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. With Thread Hijacking, it allows the hijacker.exe program to suspend a thread within the target.exe program allowing us to write shellcode to a thread.Usage int main() { System sys; Interceptor incp; Exception exp; sys.returnVersionState(); if (sys.returnPrivilegeEscalationState()) { std::cout << “Token Privileges […]

Another Vulnerability is found in Intel Management Engine which allows execution of Code with no Digital Fingerprint

Taking advantage of Intel ME technology, within which attackers can execute unsigned code on the target machine. This leads to a full compromise of the platform. Intel Management Engine is a closed technology, which is a microcontroller embedded into the Platform Controller Hub (PCH) with a set of well-proportioned peripherals. Through PCH, almost all communication […]