Local Root Exploit in HospitalRun Software

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 150

  • @ismiregalichkochdasjetztso3232
    @ismiregalichkochdasjetztso3232 Рік тому +319

    The sad thing here is that this isn't a joke. It's just Jean Pereira being an infosec fraud.

  • @kinshukdua
    @kinshukdua Рік тому +146

    When the author's comment said- "[This exploit] can change your blood group". I honestly believed this was an April Fool's joke for a second...

    • @СергейМакеев-ж2н
      @СергейМакеев-ж2н Рік тому

      Will melt your face right off your skull,
      And make your iPod only play Jethro Tull,
      And tell you knock-knock jokes while you're trying to sleep,
      And make you physically attracted to sheep,
      Steal your identity and your credit card,
      Buy you a warehouse full of pink leotards,
      Then cause a major rift in time and space,
      And leave a bunch of Twinkie wrappers all over the place!
      - “Virus Alert” by Weird Al Yankovic

  • @leumasme
    @leumasme Рік тому +34

    Thank you for rekindling my disgust towards the LinkedIn community

  • @tercmd
    @tercmd Рік тому +227

    The "it's not an April Fools joke" to "it is" to "it is not" was too good 😂

    • @MartinHaunschmid
      @MartinHaunschmid Рік тому +33

      @@zorkman777 It was not. This guy does this regularly.

    • @ithinuel
      @ithinuel Рік тому +1

      @@MartinHaunschmid So it was neither?

    • @0x1sac
      @0x1sac Рік тому +12

      The joke is that LiveOverflow thought it was an April fools joke due to various reasons. It turns out that the guy on LinkedIn was serious, his report was not an April fool's joke.

  • @BWAC
    @BWAC Рік тому +89

    As someone who installed critical infrastructure around the health care sector for a while here my heart was racing.

    • @BWAC
      @BWAC Рік тому

      ​@@JohannaMueller57 Every request i've forwarded to health care equipment has fallen on deaf ears. Somehow these companies who charge a mint for products have no intentions of fixing life saving equipment running with admin/admin over http, then advocating for it to be put on a corporate WAN.
      As for leaving it's not some "if people start leaving they will fix problems" - It's more they'll replace you with people who don't know or don't care. The people who make products and install them are rarely the same company.
      Sad truth, but hey.

  • @Pokedollar
    @Pokedollar Рік тому +76

    Ive seen Jean Pereira too many times on my linkedin feed and I just have to cringe every single time. I also love how he claims that he has learned everything himself and that he doesnt need any cybersecurity education 😂

  • @wojtek8395
    @wojtek8395 Рік тому +14

    Thank you for your videos and hard work! Your channel covers a lot of technical details and professional knowledge that is really hard to find on the internet (in the approachable way) and which I deeply enjoy!

  • @TheMAZZTer
    @TheMAZZTer Рік тому +54

    Raymond Chen of Microsoft does an irregular blog series called "The other side of the airtight hatchway" meaning that a "security vulnerability" reported would be great if it could actually get you to the other side of the hatch (root/admin). I think in this case using sudo to run an app as root that isn't designed for that counts, since you have to already enter your credentials for sudo. And if you do that, you could just use sudo to run a malicious app directly, no need for hospital run at all.

    • @hyronharrison8127
      @hyronharrison8127 Рік тому +7

      Imagine my vuln writeup:
      You have to beg them to misuse the application but THEN...

    • @codahighland
      @codahighland Рік тому +2

      ​​​@@hyronharrison8127 To be fair, that's the most common way it's done. We call it "social engineering." A lot of applications will actually refuse to run if they detect escalated privileges specifically to protect users from their own misguided misuse.

    • @beeble2003
      @beeble2003 Рік тому

      That's all very well, but there are a lot of cases where people do run apps as root, even though they shouldn't, because it's "easier". And in a case like this one, it's a problem to have even a privilege escalation to whatever user the software is run as. If I can become that user, I can modify patient data, even if I can't take over the machine.

  • @milomoisson
    @milomoisson Рік тому +18

    The mic drop at 11:40 is amazing

  • @scifino1
    @scifino1 Рік тому +19

    "On Mac, like many other Linux-distros, ..." LMAO

  • @chrisconnell2763
    @chrisconnell2763 Рік тому +3

    Dude, changing a physical file is considered a vuln or even a 0-day? WTF.
    Yeah, but the vid you did on leeroy getting kinda fooled by JP made it a bit clearer to me. Big UP and many thanks for this enlightenment!

    • @LiEnby
      @LiEnby 7 місяців тому

      Maybe?? If thr electron binary was run as root but the asar file was world writable itd make sense. But its not ...

    • @DanKaschel
      @DanKaschel 2 місяці тому

      To be clear, he wasn't claiming that the ability to modify the file was the exploit; he was claiming that he could modify the app to perform a privilege escalation. However, in order to do so he would have to run the application as root, which is why it's not actually a vulnerability. This is why LiveOverflow also showed Mulllvad, which does have an executable that runs as root. Modifying that executable really could result in privilege escalation, but since it properly prevents modification by a non-root user, there is no vulnerability.

  • @andrekz9138
    @andrekz9138 Рік тому +4

    Even in a situation like this, I find you inspirational. Thanks for your videos and content

  • @fabiorj2008
    @fabiorj2008 Рік тому +2

    Bingo. Thanks for the video. Its amazing explain a lot about some hype that coming and go in cyber security.

  • @michidk
    @michidk Рік тому +76

    So if I understood it correctly, that guy executed that program as root, then used root access to patch his custom code into the executable which opens up a TCP server. Using netcat he then connected to that server as user and executed privileged commands? This would work in every application which uses a non-compiled JIT language... Basically a really weird flex, probably to get some followers and sell his software?

    • @DFsdf3443d
      @DFsdf3443d Рік тому +42

      not just JIT programs, it literally works on every single executable (its just a bit more complicated to patch binary code into a compiled program but you can still do it)
      basically this guy just claimed "sudo" was a privilege escalation technique lmao

    • @maratmkhitaryan9723
      @maratmkhitaryan9723 Рік тому +3

      liveoverflow also said that there are no privileged processes 11:03

    • @lbgstzockt8493
      @lbgstzockt8493 Рік тому

      He isn't wrong lol@@DFsdf3443d

  • @labsupri6681
    @labsupri6681 Рік тому +40

    So was the original guy just spreading misinformation?

    • @BastiSenf
      @BastiSenf Рік тому

      @@UC1kVaZyvOs39Y it's been two month from your comment, but you hopefully see this. I know people that want to make business with that guy. Can you give me some more detailled information why to not make business with him? appreciate it

  • @DanelonNicolas
    @DanelonNicolas Рік тому +1

    Awesome journey! I literately feel it like a real research! Love the video, thanks!

  • @ET_AYY_LMAO
    @ET_AYY_LMAO Рік тому +9

    > Replace executable with your own modified one.
    > Run as root.
    > Profit 1000 linkedin karma from reactionary dimwits.

  • @VolkerBaier
    @VolkerBaier Рік тому +2

    Einfach nur danke für dieses Video!!

  • @pengrey
    @pengrey Рік тому +6

    The bingo middle finger got me ngl.

  • @MiteBlueRuby
    @MiteBlueRuby Рік тому +21

    and that is why specifying d/m/y or m/d/y is important

    • @Z3rgatul
      @Z3rgatul Рік тому +7

      after working for US customer for 10+ years every time i see date like 06-04-2023 my brain refuses to accept such date format
      I just assume it can be both
      if I need to record a date somewhere I use 2023-06-04

    • @RetoonHD
      @RetoonHD Рік тому +8

      @@Z3rgatul that's totally, fine, either go big to small or small to big. But m/d/y is ludicrous, same goes for most imperial measurements.

    • @AquilaSornoAranion
      @AquilaSornoAranion Рік тому +8

      Always yyyy-mm-dd

    • @berndeckenfels
      @berndeckenfels Рік тому +1

      No matter how you write that date it was not April 1st

  • @Odlabu_22
    @Odlabu_22 Рік тому +3

    Truly an informative, comprehensive and entertaining video + Bingo. One of my favorites, thanks for the great effort. Congratulations pal!

  • @BrotWurst
    @BrotWurst Рік тому +2

    i really like how you've said in the beginning of the video "last time i sadly couldnt find a vulnerability. but this time i do a challenge so we can definitely find one!" and there's still not a real issue :D but still very informative bro! keep it up hacker boy! liebe grüße.

    • @BrotWurst
      @BrotWurst Рік тому

      hätte gleich deutsch schreiben können merke ich gerade ahha

  • @TNothingFree
    @TNothingFree Рік тому +11

    These kind of open sources may be used in testing environments in companies.
    The most useful thing is to use them as 3rd party vendors for integration testing purposes.
    So it may be not viable for production but students and testing teams may find it useful.

  • @rooot_
    @rooot_ Рік тому +8

    4:07 "Now on mac, like many other linux distros," hmmm

  • @konfushon
    @konfushon Рік тому +7

    Wait what...that was a great suspense 😂

  • @ElliotGuy-tp4si
    @ElliotGuy-tp4si Рік тому +11

    0daytoday is an ExploitDB clone and the admin tricks people into buying fake exploits. All of the user accounts are the same person, there are videos about this. Great video LO! Just wanted to warn people of this...

  • @Dvd-Znf
    @Dvd-Znf Рік тому +7

    What>???
    Was the original post a joke or not?
    I am a bit confused by the end bit...
    excerpt:
    "This code, was not prepared ahead of april fools day?
    Bingo!
    You know what else was not an april fools joke but looks like one?
    [...]"
    Very clever video

    • @alvirus594
      @alvirus594 Рік тому +10

      the original post was meant seriously, hence why liveOverflow was blocked, but the exploit shown came from malpractice from the guy that presented the exploit on the 0day site.

  • @PatrickHener
    @PatrickHener Рік тому +3

    Really good Video.

  • @EuphoricPentagram
    @EuphoricPentagram Рік тому +5

    11:46 so Privilege Escalation is more of a Privilege Declaration, on to or via a root daemon.
    It's not user becoming root, it’s user communicating through an already root system.

    • @СергейМакеев-ж2н
      @СергейМакеев-ж2н Рік тому +1

      In a real attack, it could be a program, not a human user. So it's a virus that gets onto the target machine in a non-root way (like in a mail attachment), and then "escalates" itself by forcing the root daemon to... for example, install the command "run this virus as root" into the system's task scheduler, so that it's launched on every system restart.

  • @TheInspctrcat
    @TheInspctrcat Рік тому +4

    Why doesn't Michael Cera act in films? Passionate about hacking apps. Actually just found your channel, very cool content.

  • @cannedwither8494
    @cannedwither8494 Рік тому +9

    First Name: Live
    Last Name: Overflow
    Reason for visit: Brain too big.
    Hahahahahaha nice

  • @maixicek
    @maixicek Рік тому

    Watching this after movie Babylon so finally I get some drama genre 🙂

  • @itech7354
    @itech7354 Рік тому +4

    Please make one amazing hacking video playlists ❤❤❤

  • @ChakaHamilton
    @ChakaHamilton Рік тому +6

    I hope in the future you make more hardware hacking vids

  • @davidifebueme459
    @davidifebueme459 Рік тому +2

    The mic drop at 11:44 😂😂

  • @dylan8736
    @dylan8736 Рік тому +1

    You really look like Christopher Slater as Mr. Robot.

  • @6little6fang6
    @6little6fang6 Рік тому +1

    brilliant piece of media

  • @hanskohl293
    @hanskohl293 Рік тому +4

    I'm just a comment for the algorithm.

  • @Almostbakerzero
    @Almostbakerzero Рік тому +2

    i think it would be fine to call out the fact that this person is obv. attempting to bullshit others. its not a nice thing to do.

  • @UntrackedEndorphins
    @UntrackedEndorphins Рік тому +4

    Grifter gets called out: a video presentation

  • @jonathan-._.-
    @jonathan-._.- Рік тому +4

    🤔 ive seen some apps that check at the start if they are run as root and then stop execution

    • @chri-k
      @chri-k Рік тому

      that’s done by software which by design allows arbitrary code to be executed ( package managers, for example )

    • @hikkamorii
      @hikkamorii Рік тому

      @@chri-k I think they meant other way around. For example, when you install steam on linux, and try to run it as root, it will immediately exit with an error message like "It's not safe to run steam as root, don't do that"

    • @chri-k
      @chri-k Рік тому +1

      @@hikkamorii yes, because steam also allows arbitrary code to be executed on your computer.

  • @im_shirohige
    @im_shirohige Рік тому +1

    Great one!🤣

  • @nosystemissaf3
    @nosystemissaf3 Рік тому +1

    its the best joke to know i laughed very hard in a while

  • @Finnel12
    @Finnel12 Рік тому +3

    I am confusion

  • @olekbeluga314
    @olekbeluga314 Рік тому

    lol @ broadcasthost, love that [3:44]

  • @gokupwn
    @gokupwn Рік тому +1

    😂😂😂 Love youuu

  • @SuperNeon4ik
    @SuperNeon4ik Рік тому +1

    You forgot the end cards :P

  • @Alireza-m8d
    @Alireza-m8d 5 місяців тому

    it was nice Broooooo

  • @AvinashKumar-fe8xb
    @AvinashKumar-fe8xb Рік тому +1

    lol lol lol, loved it

  • @kipchickensout
    @kipchickensout Рік тому

    Bingo!

  • @notthere83
    @notthere83 Рік тому +2

    I know very little about security, stumbled across this randomly. But it seems strange to me that entering the password for a regular user is sufficient to install a root daemon. Shouldn't anything that runs as root require entering the root password?

    • @DanKaschel
      @DanKaschel 2 місяці тому

      Your user is part of the sudo group, so entering your password is sufficient to grant root permissions.

  • @AlphactoryAT
    @AlphactoryAT 8 місяців тому

    I just got a linkedin request from this guy??????? like, what?

  • @tejaskumar9057
    @tejaskumar9057 Рік тому

    ngl he had us in the first 20 mins :D

  • @sand3epyadav
    @sand3epyadav Рік тому

    Tq

  • @tg7943
    @tg7943 Рік тому +1

    Push!

  • @anuzravat
    @anuzravat Рік тому

    Ayi Sabashhh

  • @z-root8955
    @z-root8955 Рік тому +1

    😂😂 great video as always

  • @walturowhite69
    @walturowhite69 Рік тому

    Within 1 hour gang!! So excited to see the video past 3:56!!

  • @rootsudosu
    @rootsudosu Рік тому

    i found you with the Minecraft stuff on your channel, is there any new minecraft stuff upcomming ?

  • @dsharpbb09
    @dsharpbb09 Рік тому +1

    This video isn’t funny the first time through. But it is the second time.

  • @stellabckw2033
    @stellabckw2033 Рік тому +1

    why tho

  • @N1ckdgr8
    @N1ckdgr8 Рік тому +1

    Broo......App sec video or a Christopher Nolan movie ????

  • @ameeratcyber7108
    @ameeratcyber7108 Рік тому

    so cool xD

  • @rosyidharyadi7871
    @rosyidharyadi7871 Рік тому +2

    this is hilarious

  • @taoufikmourtadi909
    @taoufikmourtadi909 Рік тому +1

    What is the name of this phenomenal 😅

  • @Originalimoc
    @Originalimoc Рік тому

    Android does it right, 3rd party VPN need no root.

  • @skylo706
    @skylo706 Рік тому

    Maybe I'm just stupid but why can the vpn install a certain part that runs with root privileges? You only entered your non root user password it seemed. Doesnt that mean we could just write our own installer that asks for user password but puts malicioua code under a root level part?

    • @LiveOverflow
      @LiveOverflow  Рік тому

      what you think is the "non root user password", gives the root permissions. Ever used Linux with sudo? When your user belongs to the sudo group you also enter YOUR user's password to execute a command as root.

  • @prodigysonhiddenforareason1239

    I don't understand, are we expecting a sequel ?

    • @alvirus594
      @alvirus594 Рік тому +4

      the guy that posted the exploit used malpractice and ran the program as root to make it seem like he had a crazy exploit, but its just that: malpractice and a joke at best

  • @netrunner1145
    @netrunner1145 Рік тому +1

    After your video, he removes the post on linkedin lel

  • @vectorflame-f8d
    @vectorflame-f8d Рік тому

    the hacker news bdarija

  • @GermanLc
    @GermanLc Рік тому +1

    what

  • @BourbonCrow.
    @BourbonCrow. Рік тому

    If comic sans made it to the front of goverment buildingfs and coins and stuff i bet your font can get far as well! haha and no nothing is worse then comic sans

  • @zvanmilisavljevic8879
    @zvanmilisavljevic8879 Рік тому

    Hey, i found the liveoverflow smp! And i made a mod for it!

  • @KebabTM
    @KebabTM Рік тому +1

    July Fools

  • @piecaruso97
    @piecaruso97 Рік тому +13

    "on mac like any other linux distro" man have you forgotten that modern macos is based on the xnu kernel?

    • @khill8645
      @khill8645 Рік тому +5

      It seems perfectly cromulent, I don't think any of us have figured out a way to pronounce '*nix' yet

    • @piecaruso97
      @piecaruso97 Рік тому +2

      @@khill8645 well the xnu kernel is basically the mach kernel from Carnegie Mellon university, a BSD subsystem and a lot of custom code added to o it, so it's not related to unix in the strictest sense, however that BSD part was made by actually replacing every source file from the og unix source code release with reimplementations made by the Berkeley University developers that originally made BSD, so it's a compatible program, but it's not actually unix and of course it's not really the base of the xnu kernel, but a subsystem that it's used to provvide an interface for programs to run on and to have compatibility with existing unix/bsd software. So xnu it's actually it's own very wired beast.

    • @tanguysnoeck3166
      @tanguysnoeck3166 Рік тому +2

      🤓

    • @khill8645
      @khill8645 Рік тому

      @@piecaruso97 It isn't about 'custom code' or whatever, it's just about POSIX compliance.

    • @chri-k
      @chri-k Рік тому +1

      that was fully intentional

  • @pitust
    @pitust Рік тому +1

    It seems that on macOS, you don't need root to make a VPN (for example, tailscale doesn't include a root daemon)

    • @okolol
      @okolol Рік тому +1

      but how does it do it exactly?
      I'm thinking maybe there's a way for you to configure the USER SPECIFIC network settings, so no root access required.

    • @TheDuckPox
      @TheDuckPox Рік тому

      @@okolol Maybe something like we have on Android or iOS where a VPN app would consist of a UI and a helper running as an unprivileged daemon, which I assume is able to interface with the operating system's network interface.

    • @pitust
      @pitust Рік тому

      ​@@okololfrom what i understand (which is admittedly not much), you cant screw with other users' settings because there can be at most one concurrent login* so it's fine to let the app overwrite all the settings
      * ssh isnt real!!! /s

    • @okolol
      @okolol Рік тому

      @@TheDuckPox I'm sure while you don't need root access in android, you do need special permission to configure the user vpn settings. and yes, it's per user basis, I've tried it. but I don't know much about ios nor macos.

    • @okolol
      @okolol Рік тому

      @@pitust yea, why would you modify other user settings though? you will only need to modify the current user settings, and if you want to make it system wide, then just use root.

  • @sulochanakharat9033
    @sulochanakharat9033 Рік тому +1

    was it a joke or not ?

  • @Zappexe
    @Zappexe Рік тому +4

    Brain too small LMAO

  • @berndeckenfels
    @berndeckenfels Рік тому

    I don’t get the Joke

  • @a.for.arun_
    @a.for.arun_ Рік тому

    The twist. Lmao hahahaha

  • @foobars3816
    @foobars3816 Рік тому

    9:24 "how [] can look like" -> downvote

  • @KochamShotowac
    @KochamShotowac Рік тому

    Morawiecki na miniaturce

  • @flrn84791
    @flrn84791 5 місяців тому

    zero day exploit 😂

  • @stanislavsmetanin1307
    @stanislavsmetanin1307 Рік тому

    🤪

  • @0x42NaN
    @0x42NaN Рік тому

    lol?

  • @myname-mz3lo
    @myname-mz3lo Рік тому +1

    the software shouldnt allow the user to run it as root. making it a software issue not a user issue .

    • @cjbprime
      @cjbprime Рік тому +7

      There isn't a vulnerability (that we know about) even if you install and run it as root. You would then need to be root to be able to rewrite the ASAR. "Elevating privileges" from root to root doesn't gain you anything.

  • @mapleint997
    @mapleint997 Рік тому +1

    I'm american, have never seen yyyy/dd/mm, we're notorious for going month then day.

  • @alexanderdell2623
    @alexanderdell2623 Рік тому +6

    Hi, please note that 0daydottoday is SCAM, please dont do advertisements for them cause naive ppl still get caught by their “5k for instagram takeover exploit”

    • @chri-k
      @chri-k Рік тому

      what’s that?