{"uuid": "9e4b3ebb-7ce3-43d7-82da-5d94e9436716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-9273", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/5837", "content": "\ud83d\udcda Phrack is written by hackers, for hackers!\n\n\u2022  \u0421\u0435\u0433\u043e\u0434\u043d\u044f \u0432\u044b\u0448\u0435\u043b \u043d\u043e\u0432\u044b\u0439 \u0432\u044b\u043f\u0443\u0441\u043a \u043b\u0435\u0433\u0435\u043d\u0434\u0430\u0440\u043d\u043e\u0433\u043e \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0436\u0443\u0440\u043d\u0430\u043b\u0430 Phrack, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043e 15 \u043d\u043e\u0432\u044b\u0439 \u0441\u0442\u0430\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b \u043e \u0432\u0437\u043b\u043e\u043c\u0435 \u043e\u0434\u043d\u043e\u0433\u043e \u0438\u0437 \u0443\u0447\u0430\u0441\u0442\u043d\u0438\u043a\u043e\u0432 \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u043e\u0439 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b Kimsuky. \n\n\u2022  \u041a\u0441\u0442\u0430\u0442\u0438, \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 Phrack \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f 40 \u043b\u0435\u0442. \u041e\u0447\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0434\u0430\u0442\u0430, \u043d\u043e \u043e\u043b\u0434\u0441\u043a\u0443\u043b \u0435\u0449\u0435 \u0436\u0438\u0432 \u0438 \u043d\u0435 \u043f\u0435\u0440\u0435\u0441\u0442\u0430\u0435\u0442 \u0443\u0434\u0438\u0432\u043b\u044f\u0442\u044c \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u043e\u043c:\n\n\u27a1The Art of PHP - My CTF Journey and Untold Stories!\n\u27a1Guarding the PHP Temple;\n\u27a1APT Down - The North Korea Files;\n\u27a1A learning approach on exploiting CVE-2020-9273;\n\u27a1Mapping IOKit Methods Exposed to User Space on macOS;\n\u27a1Popping an alert from a sandboxed WebAssembly module;\n\u27a1Desync the Planet - Rsync RCE;\n\u27a1Quantom ROP;\n\u27a1Revisiting Similarities of Android Apps;\n\u27a1Money for Nothing, Chips for Free;\n\u27a1E0 - Selective Symbolic Instrumentation;\n\u27a1Roadside to Everyone;\n\u27a1A CPU Backdoor;\n\u27a1The Feed Is Ours;\n\u27a1The Hacker's Renaissance - A Manifesto Reborn.\n\n\u27a1 https://phrack.org/issues/72/1\n\n#Ezine #Phrack", "creation_timestamp": "2025-08-19T19:27:59.000000Z"}