{"uuid": "a2d3573a-1d12-4266-b846-08e907e57aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-37152", "type": "published-proof-of-concept", "source": "https://t.me/D4RKW0R1D/93", "content": "Red Team Tactics\nLeveraging a 0-day vulnerability in Zoom\ud83d\ude01\nhttps://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e\n\nexploit\nCVE-2021-37152:\nhttps://github.com/lhashashinl/CVE-2021-37152\n// Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack\n\nThreat Research\n1. CVE-2021-35523:\nLPE in Securepoint SSL VPN Client 2.0.3\nhttps://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30\n2. Detailed overview of tactics, techniques and procedures (TTPs) of the most active REvil partners\nhttps://blog.group-ib.com/revil_raas\n\nWLAN Security\nRealtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology\nhttps://8051enthusiast.github.io/2021/07/05/002-wifi_fun.html", "creation_timestamp": "2021-07-06T07:06:05.000000Z"}