In the event logs of patched systems, warnings with EventID 1 appear when trying to exploit this vulnerability. Pretty useful for a SIEM solution in a company.
Wow. On the one hand it's so scary that vulnerabilities as (comparatively) simple as this one exist in the wild. On the other hand, it gives me hope that one can work in cyber-security, without being part of Google Project Zero. Great video!
There are plenty of roles to be filled on the offensive and defensive side that are not even close to the level project zero is at. So yes, if you really want to work in cyber security, you can if you're persistent in learning the basics and preferably beyond yourself.
Man you are the best.I studied about ECC in my college subjects but it was only theory heavy never really implemented it,looking at this explanation i am amazed.This is really cool.Please do cryptography stuffs more often.Thank you
Very nice explanation. Can you make a video about how Microsoft actually patched CryptoAPI? Did they make it so "public key" couldn't be equal "generator" or something else?
Can you also do a video on the Wii & NDS SSL certificate trust chain vulnerability that allowed people to spoof the WFC back online after Nintendo shut down the official one?
Now I'm certainly no expert... But this exploit seems so basic that it should have been easily caught by the cryptography experts who implemented it. Very strange that it wasn't caught earlier.
When three letter agencies step out of the shadows to "correct your homework" you know you have made a huge blunder. Thank for amplifying this Ghidra. #avoidWindows10
it should be noted that elliptic curve is not an algorithm, elliptic curve is a cryptographic technique that also works on symmetric cryptography ;) ECDSA would be an algorithm
you could probably get some green eco carbon credits for using much lower resources to accomplish a benign exercise in algorithm execution that we've assigned magic values to
so this can be also used to exploit code signing, right? so we could sign binaries with a fake microsoft cert and get applications running like they were from microsoft? would this also effect boot stage? like signing drivers without testinging enabled? (of course while using unpatched dll)
Does anyone have a research paper on this POC or anyone have done a research paper on this vulnerability? I have a project report to complete within 2 days. so if you have or if you know a source please let me know. the research paper must contain the POC of CVE-2020-0601 and mitigation techniques as well. This is a really critical moment for me. so please help me and I really appreciate all the supports, as well as I, look forward to supporting you. Thank you.
In the event logs of patched systems, warnings with EventID 1 appear when trying to exploit this vulnerability. Pretty useful for a SIEM solution in a company.
18 likesReplies (1)
SkipToPlay This is only true AFTER the patched system has been rebooted following an attempted exploit, so not as useful as it sounds.
0 likesWow. On the one hand it's so scary that vulnerabilities as (comparatively) simple as this one exist in the wild. On the other hand, it gives me hope that one can work in cyber-security, without being part of Google Project Zero. Great video!
4 likesReplies (1)
There are plenty of roles to be filled on the offensive and defensive side that are not even close to the level project zero is at. So yes, if you really want to work in cyber security, you can if you're persistent in learning the basics and preferably beyond yourself.
1 likeVery good and simple explanation, thank you for doing this.
1 likeExcellent breakdown. Good job.
18 likesMan you are the best.I studied about ECC in my college subjects but it was only theory heavy never really implemented it,looking at this explanation i am amazed.This is really cool.Please do cryptography stuffs more often.Thank you
0 likesGreat video. Simple and yet detailed explanation.
1 likegoing to close my channel down! we found a replacement
296 likesReplies (10)
don't do it. you two are inspirations :)
20 likesschreib nicht so was, es wird sowieso schon langsam dünn mit dem guten content auf YT...
3 likesyou both are great!
2 likesLook forward to your vid on this exploit over flowing into my subscriptions feed
0 likesCan't wait to see you colab.
3 likesahahahhaha!
0 likesDon't do that bro you are the great one all over the internet
0 likesdon't bro please , i'm your fan .
0 likesis that you Liveoverflow in that video :D He sounds exactly like u
1 likeHonestly I thought I was watching your video, trough something felt a bit off. Guess there's a vulnerability in my cryptoAPI as well.
0 likesWell explained ! Good job.
0 likesGreat work! Keep it up 👍
3 likesVery nice explanation. Can you make a video about how Microsoft actually patched CryptoAPI? Did they make it so "public key" couldn't be equal "generator" or something else?
3 likesReplies (2)
That's a good idea! I might have a look at the binary diff!
6 likesAlthough it's in korean, you can checkout patch diff(hex-rays) from this video : https://youtu.be/FNORkpxVcQI?t=216
0 likesCan you also do a video on the Wii & NDS SSL certificate trust chain vulnerability that allowed people to spoof the WFC back online after Nintendo shut down the official one?
2 likesBeautifully explained.!!! Thanks.!!!
1 likeExcellent explanation easy to understand
1 likeNow I'm certainly no expert... But this exploit seems so basic that it should have been easily caught by the cryptography experts who implemented it. Very strange that it wasn't caught earlier.
0 likesWhen three letter agencies step out of the shadows to "correct your homework" you know you have made a huge blunder. Thank for amplifying this Ghidra. #avoidWindows10
6 likes3:11 In reality Wikipedia actually uses the DigiCert SHA2 High Assurance Server CA.
0 likesExcellent explanation. (bitte mehr davon)
2 likesit should be noted that elliptic curve is not an algorithm, elliptic curve is a cryptographic technique that also works on symmetric cryptography ;) ECDSA would be an algorithm
0 likesNever clicked so fast on a video. Nice explanation indeed!
3 likesyou could probably get some green eco carbon credits for using much lower resources to accomplish a benign exercise in algorithm execution that we've assigned magic values to
0 likesBRILIANT EXPLANATION!
0 likesVery good explanation
1 likeGreat explanation!
1 likeGood explaining thanks man
1 likeReplies (1)
you are my idol
1 likeLove your channel!
0 likesso this can be also used to exploit code signing, right?
3 likesso we could sign binaries with a fake microsoft cert and get applications running like they were from microsoft?
would this also effect boot stage? like signing drivers without testinging enabled?
(of course while using unpatched dll)
Replies (1)
You still can do it. You just have to also install rogue CA certificate with name "Microsoft" on it.
0 likesWaiting for reversing wannacry part 2 (so hyped) :)
16 likesWow, loved it!
3 likesAll bits explained!
0 likesAm i the only one that finds it weird that the NSA is reporting vulnerabilities in Windows? Isn't that incredibly ironic?
0 likesDoes anyone have a research paper on this POC or anyone have done a research paper on this vulnerability? I have a project report to complete within 2 days. so if you have or if you know a source please let me know. the research paper must contain the POC of CVE-2020-0601 and mitigation techniques as well. This is a really critical moment for me. so please help me and I really appreciate all the supports, as well as I, look forward to supporting you. Thank you.
0 likesvery nice! thanks
1 likeVery Nice Video!!!
1 likeA video on mitm attack with Cain or responder will be interesting (I you have too much time 😂)
0 likesThank you!
0 likesGreat video
1 likeHow does the fix by Microsoft work?
2 likesAny one remembers the 601 error in "The Andromeda Strain" from 1971?
0 likesReplies (1)
what is that?
3 likesТеперь я знаю криптографию на эллиптических кривых ... lol
1 likehow to use dump command in this 8:32. please help
0 likesTo all whitehats at NSA: thank you!
0 likesso deceptively simple
12 likesWhat theme are you usinh for ubuntu there?
0 likesReplies (2)
It’s the default theme :)
0 likes@stacksmashing wierd it doesnt look like it for mey maybe because of my small phone screen, sell thx
0 likesNice
0 likesWhy Am I here, I don't even know how to program in Raptor xD
0 likesi have windous 10 ;-;
0 likesneat
2 likesRuby is beautiful
1 likei dont think you script kiddies realize how big of a vulnerability this is, sigh
2 likesReplies (1)
Okay nsa
1 like