У нас вы можете посмотреть бесплатно Weaponizing Rsync 0Day Vulnerability by Ege BALCI или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
The Rsync tool is one of the most used utilities for rapidly transferring and synchronizing files between computers. A 25-year-old vulnerability in Rsync enables code execution in connecting peers, leading to silent lateral movement within networks. The Rsync utility is written in the C programming language and is typically used for synchronizing files and directories between two different systems. It uses its own delta transfer algorithm for minimizing network usage during file transfers. During the source code analysis phase of the Rsync utility, the PRODAFT Threat Intelligence Team (PTI) has discovered a vulnerability allowing to write/overwrite arbitrary files inside the computers of connecting peers allowing a “worm-able” RCE vulnerability effecting the systems of connecting peers. The subject vulnerability has existed for many years in rsync utility and will be disclosed for the first time in this talk. The discovery and weaponization phase of such vulnerability will be analyzed by the researchers of the PTI team. / egeblc https://github.com/EgeBalci https://pentest.blog/ https://threatintel.blog/