0-Day Vulnerability to be Discovered in Windows

As reported,  privilege escalation exploit, for which no cure exists, is on the GitHub now
29 August 2018   176

In Windows, a 0-day vulnerability has been discovered that allows malicious users to gain system-level rights. The problem was reported by a Twitter user with the SandboxEscaper nickname. The exploit's PoC code is available on the GitHub.

The problem lies in the Windows task scheduler. When processing the ALPC tool, it becomes possible to obtain privileges at the SYSTEM level. It can be used by attackers to enhance the capabilities of malware.

According to the head of the coordination center CERT Will Dormann, the vulnerability remains urgent. The performance of the PoC code was tested on 64-bit Windows 10 with the latest updates. You can raise the user's rights to the SYSTEM level.

In response to a letter from The Register, a Microsoft representative announced that they were aware of the problem. The company promised to release an update fixing the vulnerability.

Cloudflare to Develop IPFS Gateway

According to the developers, new gateway will allow to create P2P based websites
20 September 2018   80

Cloudflare told about the IPFS gateway, which will allow creating sites based on P2P network. The company said that access to content will be done without having to install special software on the devices.

As a technology feature, Cloudflare experts note decentralization. Using a standard network scheme with servers involves physical storage of data in one place. Hacking the server or damage to communications as a result of an emergency (for example, a natural disaster) will lead to inaccessibility of information or its loss. The same is threatened with information if the server owner has decided to refuse it.

Cloudflare Network
Cloudflare Network

The IPFS gateway combines computers, on each of which some information is stored, to the worldwide network. Therefore, the inaccessibility of one computer does not mean that the content can not be viewed or downloaded. Therefore, the key differences are two:

  1. With IPFS, anyone can freely post information instead of storing it on remote servers and paying for their services.
  2. Requests for access to data are carried out using cryptographic hashing, rather than by IP address. The query data is converted to a series of letters and numbers, by which the system finds the required files. For example, the query for any information will not like "get information that is located at IP address 93.184.216.34", but the kind "get information with hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy". This hash sum is part of the desired file and is on several computers.

The system automatically determines the authenticity of the file. If we take as an example a query with a hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy, then when receiving the information it should remain the same. If the hash value differs, then the file has been changed. In other words, the hash-sum can be represented as a unique fingerprint:

IPFS Security
IPFS Security

Supporters of decentralization are also in a number of other companies. Mozilla employees believe that consumers should not be tied to a particular product, brand or platform. In early August 2018, developers published a version of the IoT gateway Things Gateway 0.5. In it, they realized the possibility of loading third-party icons and an interface for complex devices.