Open in app

Sign in

Write

Sign in

David Wells
David Wells

698 Followers

Home

About

Published in

Tenable TechBlog

·Aug 17, 2021

Integer Overflow to RCE — ManageEngine Asset Explorer Agent (CVE-2021–20082)

A couple months back, Chris Lyne and I had a look at ManageEngine ServiceDesk Plus. This product consists of a server / agent model in which agents provide updates on machine status back to the Manage Engine server. Chris ended up finding an unauth XSS-to-RCE chain in the server component…

Exploit

14 min read

Integer Overflow to RCE — ManageEngine Asset Explorer Agent (CVE-2021–20082)
Integer Overflow to RCE — ManageEngine Asset Explorer Agent (CVE-2021–20082)
Exploit

14 min read


Published in

Tenable TechBlog

·Dec 9, 2020

PsExec Local Privilege Escalation

Update: There has been new PsExec versions released in 2021 (v2.30 and v2.32), we confirmed them to also be vulnerable to this Local Privilege Escalation with minor PoC adjustments. So…this one’s been here for a while: a local privilege escalation vulnerability in PsExec. This local privilege escalation allows a non-admin…

Windows

4 min read

PsExec Local Privilege Escalation
PsExec Local Privilege Escalation
Windows

4 min read


Published in

Tenable TechBlog

·Jul 9, 2020

Android MX Player — Path Traversal to Code Execution

MX Player is an Android App that you can find on the Google Play Store, having over 500M downloads. While this is a video player app, we won’t be attacking it with malformed video files. Instead I attacked the video sharing feature it had. This video sharing feature is a…

Hacking

5 min read

Android MX Player — Path Traversal to Code Execution
Android MX Player — Path Traversal to Code Execution
Hacking

5 min read


Published in

Tenable TechBlog

·Jun 15, 2020

Exploiting a Webroot Type Confusion Bug

Remotely Leaking Antivirus Memory Recently, I disclosed a couple vulnerabilities in Webroot Secure Anywhere Antivirus, one of them being a standard Local Privilege Escalation via DLL hijack in %PROGRAMDATA% path. However, instead of writing about that, I felt it would be more interesting to go over CVE-2020–5754, a remotely exploitable…

Infosec

6 min read

Exploiting a Webroot Type Confusion Bug
Exploiting a Webroot Type Confusion Bug
Infosec

6 min read


Published in

Tenable TechBlog

·May 20, 2020

Abusing WebRTC to Reveal Coarse Location Data in Signal

UPDATED 5/20/2020: The blog post was updated to reflect the availability of updated versions of Signal on the Google Play Store and Apple App Store. Signal Private Messenger’s ease of use, multiplatform support, and end-to-end encryption for both text and calls have attracted millions of users per day. …

Cryptography

8 min read

Turning Signal App into a Coarse Tracking Device
Turning Signal App into a Coarse Tracking Device
Cryptography

8 min read


Published in

Tenable TechBlog

·Feb 18, 2020

Bypass Windows 10 User Group Policy (and more) with this One Weird Trick

I‘m going to share an (ab)use of a Windows feature which can result in bypassing User Group Policy (as well as a few other interesting things). Bypassing User Group Policy is not the end of the world, but it’s also not something that should be allowed and depending on User…

Windows

6 min read

Bypass Windows 10 User Group Policy (and more) with this One Weird Trick
Bypass Windows 10 User Group Policy (and more) with this One Weird Trick
Windows

6 min read


Published in

Tenable TechBlog

·Jan 12, 2020

Let’s Reverse Engineer Discord

Quick note: This research was a joint effort between Joseph Bingham and David Wells. The Discord chat app was the target of our latest research project. While this blog will not be covering any exploits, we will share what we learned about the Discord call protocol, and share our insights…

Gaming

5 min read

Let’s Reverse Engineer Discord
Let’s Reverse Engineer Discord
Gaming

5 min read


Published in

Tenable TechBlog

·Sep 4, 2019

Kernel Write-What-Where in Qualcomm Driver == LPE

README Recently, I found a Kernel Write-What-Where vulnerability in Qualcomm Atheros WLAN Driver Service (QcomWlanSrvx64.exe) version 12.0.0.825, that came default on the Dell XPS I ordered. The affected kernel-mode component was Qcamain10x64.sys. I discovered this on what I thought was the latest Qualcomm Atheros service at the time (after fully updating…

Windows

5 min read

Kernel Write-What-Where in Qualcomm Driver == LPE
Kernel Write-What-Where in Qualcomm Driver == LPE
Windows

5 min read


Published in

Tenable TechBlog

·Jul 22, 2019

COModo: From Sandbox to SYSTEM (CVE-2019–3969)

Antivirus (AV) is a great target for vulnerability hunting: Large attack surface, complex parsing, and various components executing with high privileges. So a couple of months ago, I decided looked at the latest Comodo Antivirus v12.0.0.6810. I ended up finding a few cool things, however one I thought was worth…

Antivirus

12 min read

COModo: From Sandbox to SYSTEM (CVE-2019–3969)
COModo: From Sandbox to SYSTEM (CVE-2019–3969)
Antivirus

12 min read


Published in

Tenable TechBlog

·Jun 17, 2019

API Series: SetThreadContext

A great way to learn any operating system (OS) is studying the OS’s APIs. Today we will be looking at SetThreadContext, a powerful and commonly seen API that is capable of changing the registers of remote threads. There are many use cases for such API, but security folk in particular…

Programming

7 min read

API Series: SetThreadContext
API Series: SetThreadContext
Programming

7 min read

David Wells

David Wells

698 Followers
Following
  • Pablo Ramos

    Pablo Ramos

  • James Sebree

    James Sebree

  • Chris Lyne

    Chris Lyne

  • Nicholas Miles

    Nicholas Miles

  • Jacob Baines

    Jacob Baines

See all (15)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams