Database: Check all tables from a known owner

This is an oracle 12c query to find out all tables that are owned by “cyrus”. select owner,table_name from all_tables where owner=’CYRUS’; the contents in the row is case sensitive, in this example the content in row “owner” is CYRUS not Cyrus or cyrus. another way if you do not know the case of the … Continue reading “Database: Check all tables from a known owner"

Link: http://cyruslab.net/2018/09/22/database-check-all-tables-from-a-known-owner/

Hack the MinU: 1 (CTF Challenge)

Hello Friends! Today we are going to solve another CTF challenge “MinU: 1” This boot2root is an Ubuntu Based virtual machine and has been tested using Virtual Box. The network interface of the virtual machine will take its IP settings from DHCP. Your goal is to capture the flag on /root. You can download it… Continue reading →
The post Hack the MinU: 1 (CTF Challenge) appeared first on Hacking Articles.

Link: http://www.hackingarticles.in/hack-the-minu-1-ctf-challenge/

Microsoft Windows ALPC Task Scheduler Local Privilege Elevation

On vulnerable versions of Windows the alpc endpoint method SchRpcSetSecurity implemented by the task scheduler service can be used to write arbitrary DACLs to .job files located in c:\windows\tasks because the scheduler does not use impersonation when checking this location. Since users can create files in the c:\windows\tasks folder, a hardlink can be created to a file the user has read access to. After creating a hardlink, the vulnerability can be triggered to set the DACL on the linked file. WARNING: The PrintConfig.dll (%windir%\system32\driverstor\filerepository\prnms003*) on the target host will be overwritten when the exploit runs. This Metasploit module has been tested against Windows 10 Pro x64.

Link: https://packetstormsecurity.com/files/149470/alpc_taskscheduler.rb.txt