text stringlengths 0 1.99k |
|---|
thread in oss-security to discuss this with the community [12]. |
--[ 9 - Conclusion |
This was a very hard exploit. It is still not reliable at all. I hope this |
learning approach helps you become familiar with ProFTPd internals and |
gives you some insights on vulnerability exploitation. |
--[ 10 - References |
[01] http://www.proftpd.org/docs/faq/linked/faq-ch1.html |
[02] https://nvd.nist.gov/vuln/detail/CVE-2020-9273 |
[03] https://nvd.nist.gov/vuln/detail/CVE-2020-9272 |
[04] https://github.com/proftpd/proftpd/issues/903 |
[05] http://www.phreedom.org/research/exploits/proftpd-ascii/ |
[06] http://bugs.proftpd.org/show_bug.cgi?id=3521 |
[07] http://phrack.org/issues/67/7.html |
[08] http://bugs.proftpd.org/show_bug.cgi?id=3536 |
[09] http://bugs.proftpd.org/show_bug.cgi?id=3711 |
[10] http://bugs.proftpd.org/show_bug.cgi?id=4169 |
[11] https://www.reddit.com/r/netsec/comments/323z0j/ |
proftpd_unauthenticated_copying_of_files_via_site/ |
[12] https://seclists.org/oss-sec/2021/q3/119 |
--[ 11 - Source code |
Please find the exploit source code at |
https://github.com/ptef/CVE-2020-9273/blob/main/exploit_proftpd.c |
|=------------------------------------------------------------------------=| |
|=-------=[ Mapping IOKit Methods Exposed to User Space on macOS ]=-------=| |
|=------------------------------------------------------------------------=| |
|=-----------------=[ Karol Mazurek (@karmaz95) of AFINE ]=---------------=| |
|=------------------------------------------------------------------------=| |
================= |
--[ Table of contents |
============================================================================ |
0 - Introduction |
1 - IOKit Interface Fundamentals |
1.0 - Introduction to IOKit |
1.1 - Registry |
1.1.1 - Planes |
1.1.2 - Services |
1.1.3 - Driver |
1.1.4 - Matching |
1.1.5 - IOKit Personalities |
1.1.6 - Service Instances |
1.2 - User Clients |
1.2.1 - Multiple User Clients per Service |
1.2.2 - External Methods |
1.2.3 - Dispatch Mechanism |
1.2.4 - getTargetAndMethodForIndex |
1.2.5 - Access Control |
1.3 - User Space App |
1.3.1 - Service Discovery |
1.3.2 - Spawning User Client |
1.3.3 - Calling External Method |
1.4 - User Space Application Flow |
2 - IOKit Reconnaissance |
2.0 - What to Map |
2.1 - KEXT Analysis |
2.1.1 - Bundle Names |
2.1.2 - Driver Names |
2.1.3 - NewUserClients |
2.1.4 - UC Types |
2.1.5 - External Methods |
2.1.6 - Arguments |
2.2 - Runtime Enumeration |
2.2.1 - Service Discovery Automation |
2.2.2 - Driver Hooking in Kernel Space |
2.2.3 - Driver Hooking in User Space |
2.2.4 - Corpus |
2.2.5 - Tracer |
2.3 - Map Verification |
3 - Conclusion |
4 - Acknowledgements |
5 - References |
============================================================================ |
============ |
--[ 0 - Introduction |
============================================================================ |
IOKit is the core framework macOS uses for communication between user |
space and the kernel, exposing numerous driver interfaces. Despite ongoing |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.