Hackercool 2021 08.pdf

(47489 KB) Pobierz
To
Advertise
with us
Contact :
admin@hackercoolmagazine.com
Copyright © 2016 Hackercool CyberSecurity (OPC) Pvt Ltd
All rights reserved. No part of this publication may be reproduced, distributed, or
transmitted in any form or by any means, including photocopying, recording, or other
electronic or mechanical methods, without the prior written permission of the
publishe -r, except in the case of brief quotations embodied in critical reviews and
certain other noncommercial uses permitted by copyright law. For permission
requests, write to the publisher, addressed “Attention: Permissions Coordinator,” at
the address below.
Any references to historical events, real people, or real places are used fictitiously. Na
-mes, characters, and places are products of the author’s imagination.
Hackercool Cybersecurity (OPC) Pvt Ltd.
Banjara Hills, Hyderabad 500034
Telangana, India.
Website :
www.hackercoolmagazine.com
Email Address :
admin@hackercoolmagazine.com
Information provided in this Magazine is
strictly for educational purpose only.
Please don't misuse this knowledge
to hack into devices or networks without
taking permission. The Magazine will not
take any responsibility for misuse of this
information.
Then you will know the truth and the truth will set you free.
John 8:32
Hello Hackercoolians. Hope you are all fine and healthy. Welcome to our Eighth
Issue of this year. We have been hearing a lot about PrintNightmare since two months.
So we at Hackercool Magazine thought it good to include a Real World Hacking Scena
-rio about exploiting PrintNightmare in Real World. This sounds all too meaningful
since the vulnerability that affects the print spooler service of Microsoft is still refusing to
die.
Although Microsoft released a patch (KB5005652) to address this vulnerability,
another vulnerability in the print spooler service, CVE-2021-36958 came to light. An att-
acker successfully exploiting this vulnerability could execute malicious code with SYSTEM
privileges on the target system. This vulnerability is still unpatched and only protection is
disabling of the print spooler service.
The earlier patch (KB5005652) has caused its own share of problems in Enterprise.
This patch is causing some Enterprise users to reinstall print drivers or install new drive
-rs which can be done only with admin privileges. So users needed to be given admin
privileges to do that thus increasing further security risk.
Our RWHS in this Issue shows you one of the most common hacking scenario used
in Real World. In our next Issue, readers will see another scenario of exploiting Print
Nightmare. In the WiFi Security feature, we will go deep into Wireless Fidelity and see
how to crack WPA / WPA2 using three tools.
Metasploit This Month Feature has another exploit relating to Exiftool and that's
interesting. Apart from this, all our regular features are present.
Edition 4 Issue 8
“the printnightmare vulnerability is fresh, but already sensational"
Zgłoś jeśli naruszono regulamin