EDR Reloaded: Erase Data Remotely

  Рет қаралды 2,718

Black Hat

Black Hat

Күн бұрын

Endpoint security controls are the most essential tool for protecting computer systems from various malware threats. Most of them usually include several layers of detection modules. Among them is the byte signature detection logic, which is usually treated as the most reliable layer with the lowest false positive rate.
What would you say if adversaries can remotely delete critical data from your fully patched servers, over the internet?
Moreover, what if this can be done because of your security control byte signature detection logic? And finally what if the vendor patch is still exploitable?
In this talk, we will first present the original vulnerability (CVE-2023-24860) in a brand-new category which provides unauthenticated remote deletion of critical files such as the entire production database and causing a new level of DOS.
The vulnerability exists, in default settings, of three well-known endpoint security products we have tested and it's Fully Un-Detectable. it can be exploited both on Linux and Windows using at least ten different attack vectors and without almost any limitation.
We will explain the root cause and demo multiple attack vectors on unpatched machines: For example, remote deletion of entire databases, in most cases, the database service and affected data can't be easily recovered, resulting in critical DOS.
Then we will explain and demo, on fully patched machines, how we were able to bypass Microsoft patch (CVE-2023-36010) and still achieve remote deletion of MYSQL and MariaDB databases, remote Denial of Service of MongoDB and remote affect PostgreSQL as well. We are also still able to cause remote deletion of web server logs, self-cannibalism, where Defender deletes its own detection logs and vmware configuration deletion even after the patch.
By:
Tomer Bar | VP of Security Research, SafeBreach
Shmuel Cohen | Security Researcher, SafeBreach
Full Abstract & Presentation Materials: www.blackhat.c...

Пікірлер
The Dark Side of EDR: Repurpose EDR as an Offensive Tool
42:45
Black Hat
Рет қаралды 3,2 М.
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН
Supercharging Transactions with Async Payjoin - TABConf 6
48:01
TABConf (The Atlanta Bitcoin Conference)
Рет қаралды 167
Secure TailsOS Setup For The Average Dark Web Enjoyer
18:00
Mental Outlaw
Рет қаралды 163 М.
Recover Quarantined Malware
25:06
John Hammond
Рет қаралды 48 М.
Car Hacking & CAN Bus Reverse Engineering Seminar
1:28:29
Matthew KuKanich
Рет қаралды 26 М.