Demonstrating the New Linux Exploit (9.9 CVSS)

  Рет қаралды 14,566

MalwareCube

MalwareCube

Күн бұрын

Пікірлер: 57
@TylerRamsbey
@TylerRamsbey 3 ай бұрын
Awesome stuff. Thank you for covering this!
@MalwareCube
@MalwareCube 3 ай бұрын
@@TylerRamsbey thanks for watching Tyler!! 🙏
@MartinWoad
@MartinWoad 3 ай бұрын
Rather than trying to come up with a printer brand just call it "Print to PDF". I guarantee most enteprise workers would fall for it. You can even make the command actually produce a pdf file and they wouldn't notice the impact.
@MalwareCube
@MalwareCube 3 ай бұрын
@@MartinWoad fantastic idea, you're right.
@muqsitbaig
@muqsitbaig 3 ай бұрын
Amazing video man. Loved the way you went into detail and explained everything.
@pierrecolin6376
@pierrecolin6376 3 ай бұрын
31:58 Your telnet expects " " newline sequences while the remote terminal only prints " ". After skimming the manpage, I think the onlcr option in stty can address that.
@MalwareCube
@MalwareCube 3 ай бұрын
@pierrecolin6376 nice catch :)
@Abhinav-MR
@Abhinav-MR 3 ай бұрын
Dude, I was watching this video 2 days ago when you had 999 subscribers. Now you have 1.41k. Nice!! Great explanation indeed. Loved it
@MalwareCube
@MalwareCube 3 ай бұрын
@@Abhinav-MR thank you so much!
@royalcanadianbearforce9841
@royalcanadianbearforce9841 3 ай бұрын
Loved the lab demo. Great video!
@DalBileAbas
@DalBileAbas 3 ай бұрын
Thanks for the thorough demo.
@readysetexploit
@readysetexploit 2 ай бұрын
I was a bit confused on how this exploit worked. But this video really helped me out to understand it. Thanks again!
@MalwareCube
@MalwareCube 2 ай бұрын
Thanks man! 😀 I'm glad you enjoyed it.
@alignedfibers
@alignedfibers 3 ай бұрын
Proper NAT, and keeping your local network secure is important, obviously port 631 should be blocked on your public network facing nics.
@praisong7475
@praisong7475 3 ай бұрын
Great video and explanation
@erglaligzda2265
@erglaligzda2265 3 ай бұрын
Why this is so highly rated? Well I could bet on "now printers work fine, we will fix issue later". Later comes never and everybody forgets about it. :)
@MalwareCube
@MalwareCube 3 ай бұрын
@@erglaligzda2265 considering one of the CVEs has basically been around since 2011, you're probably right 😅
@sirseven3
@sirseven3 3 ай бұрын
Actually yes. I've found clues of this attack style at an enterprise and ive spot checked all of the printers and some managers reported this issue a year ago and nothing happened.
@JuanBotes
@JuanBotes 3 ай бұрын
thx for the nice explanation and POC \o/
@Mcohen20
@Mcohen20 3 ай бұрын
Really great explanation!
@aalekhmotani3877
@aalekhmotani3877 2 ай бұрын
great explanation, thank you
@regisu85
@regisu85 3 ай бұрын
Nice explanation! Thanks
@neotokyo98
@neotokyo98 3 ай бұрын
hey congrats on hitting 1000 subscriber. I'm the 1000th subscriber
@MalwareCube
@MalwareCube 3 ай бұрын
Woot! that's huge, thank you for being 1k. 🥳
@YousefNein
@YousefNein 3 ай бұрын
Great video. Thanks for sharing
@phillydee3592
@phillydee3592 3 ай бұрын
Great vid and POC
@comosaycomosah
@comosaycomosah 3 ай бұрын
this channel is such a gem bro hope you get more subs soon! Edit: btw do you know your site is down it may be my filters but i dont think so
@MalwareCube
@MalwareCube 3 ай бұрын
Thank you so much! me too :) lol
@mohammedmuzammilali320
@mohammedmuzammilali320 3 ай бұрын
awesome poc. thanks for the video
@kenlen8029
@kenlen8029 3 ай бұрын
Thank you dude. First time messing with commands in the terminal. Cups-browsed service removed. This happened at a strange time. Kind of new to Linux and someone else in the house just bought a printer which I noticed popping up in the network lol. I didn't feel very at risk although the status command did indicate vulnerable.
@twr4641
@twr4641 3 ай бұрын
Awesome demo. Great narration. Thank you! I am not a linux person, what surprised me is that apparently it seems common practice that network printers located outside your LAN can simply advertise themselves to your linux box. Mitigation imho would be fixing firewall settings or adding OS specific protection against accepting IPs outside your home turf. If this exploit is based on mDNS, I would doubt though that mDNS would be sble to cross your subnet in the first place. Or did I miss a crucial point? I have to admit I have definitely blind spots when it comes to Linux 😊 Thanks anyway for taking the time & explaining the mechanics behind this in such a well paced way, I am sure it helps many people better judge their personal risk.
@MalwareCube
@MalwareCube 3 ай бұрын
@twr4641 thanks! Yeah there is a way to exploit internet facing systems that doesn't use the mDNS method just by sending over a UDP port 631 packet. This video demonstrates that LAN / local network method since it was a bit easier to lab, but the original blog I linked shows the WAN entry point method as well :)
@twr4641
@twr4641 3 ай бұрын
@@MalwareCubeThat makes sense. I am sure the service might be triggerable in a variety of ways. Thanks for demoing this vulnerability at just the right pace.
@JamalHiggins23
@JamalHiggins23 3 ай бұрын
Great video, earned a sub bro!!!
@stanislavsmetanin1307
@stanislavsmetanin1307 3 ай бұрын
Awesome. Thanks. 🥲
@ADudeOnTheInternet
@ADudeOnTheInternet 3 ай бұрын
You didn't really do anything wrong except not align xterm with your terminal sizing. You I believe were using xterm-256-color but regardless you can fix it with exporting the terminal size with stty rows and columns. Good video.
@MalwareCube
@MalwareCube 3 ай бұрын
@ADudeOnTheInternet ahhh yes, that's what it was. Good catch lol. And thank you :)
@seba19762
@seba19762 3 ай бұрын
So, for a user behind NAT, there's nothing to worry about?
@DarkSw0rD
@DarkSw0rD 3 ай бұрын
thanks
@javabeanz8549
@javabeanz8549 3 ай бұрын
Ubuntu had the patched CUPS packages out early that morning ( West Coast US )
@animusdsouza9718
@animusdsouza9718 2 ай бұрын
hey malwarecube, awesome explanation. I am trying to replicate the same on my mac m2 pro, running a vmware fusion with ubuntu server, but am not able to do it. Can you help with that ? Also, how do you have your lab setup ( i need help setting this up on m2 arm chips, as some packages don't work on arm the way it works on x64 processors ).
@Thiccolo
@Thiccolo 3 ай бұрын
subbed
@ramseyibe2844
@ramseyibe2844 3 ай бұрын
Great video
@MalwareCube
@MalwareCube 3 ай бұрын
@ramseyibe2844 thank you :)
@alientec258
@alientec258 2 ай бұрын
wow cool 😀 please more like that Stuff(P😀C) please
@drtechno-v3e
@drtechno-v3e Ай бұрын
CUPS is the generic print system. I purposely uninstall it. Since I use HP printers, I use HP Linux Imaging and Printer system (HPLIP) and foomatic is not installed either.
@testu1testu294
@testu1testu294 3 ай бұрын
Very nice! Thanks for sharing. Still: please put your image/cam on your lower right instead as it covers up stuff that you are trying to present and it beats the point of presenting something since only you can see it while presenting it.
@MalwareCube
@MalwareCube 3 ай бұрын
Yeah, I've since found a way to record the screen and camera separately so I can manually hide it in editing as needed.
@OfflineSetup
@OfflineSetup 3 ай бұрын
The vulnerability is concerning, but of more concern is THE LINUX COMMUNITY (not the developers) trying to play down the seriousness.
@MalwareCube
@MalwareCube 3 ай бұрын
I think it will be interesting to see how it plays out. The CVEs have already been downgraded slightly from what it was originally hyped up to be.
@-iIIiiiiiIiiiiIIIiiIi-
@-iIIiiiiiIiiiiIIIiiIi- 3 ай бұрын
The devs HAVE played this down. I get where they are coming from. It's a lot o work to fix this. They just don't have the will or resources to tackle this fix.
@drkwrk5229
@drkwrk5229 3 ай бұрын
Not interesting really. Problem is.. cups.. desktop.. NAT.. != normally on public IP... So it makes it incredibly boring.. and no one in their right mind put it on the internet.. But as a horizontal vector.. sure
@MalwareCube
@MalwareCube 3 ай бұрын
correct, but at least 75k had put it on the Internet. Actually, according to Marcus Hutchins' research, he found 107,287 Internet exposed cups-browsed instances. Not really a nothingburger but I wouldn't clock it as a 9.9 either.
@clivewi9103
@clivewi9103 3 ай бұрын
Totally over rated, Most distributions have fixed it by ether removing the daemon, or disabling it. This is not Windows were it takes them for weeks to fix anything.
@yudiokta5881
@yudiokta5881 3 ай бұрын
Apakah bisa menolong kami yang kena penipuan kak. 🥹🙏🙏
new linux exploit is absolutely insane
8:29
Low Level
Рет қаралды 432 М.
All PHP Applications are Vulnerable
8:37
Mental Outlaw
Рет қаралды 130 М.
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
How to Pivot and Tunnel with Ligolo-ng
16:23
MalwareCube
Рет қаралды 3,9 М.
this Linux feature makes hacking IMPOSSIBLE
11:08
Low Level
Рет қаралды 559 М.
How to stop apps from spying on Windows
10:28
PC Security Channel
Рет қаралды 62 М.
HackTheBox - EvilCUPS
43:25
IppSec
Рет қаралды 12 М.
How To Hack APIs with Python
22:55
John Hammond
Рет қаралды 89 М.
How This JavaScript Code Exploits your Browser (CVE-2023-38600)
8:31
How GitHub is Phishing Millions of Developers
20:08
MalwareCube
Рет қаралды 1 М.
How To Use Yazi: An Awesome Terminal File Manager Written In Rust
22:05
The Art of Human Hacking
14:40
Artificially Aware
Рет қаралды 21 М.