Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Weaponizing Rsync 0Day Vulnerability

Hack in Paris via YouTube

Overview

Explore a critical 25-year-old vulnerability in the widely-used Rsync file transfer utility that enables code execution on connecting peers, potentially leading to silent lateral movement within networks. Dive into the discovery and weaponization of this "worm-able" remote code execution (RCE) vulnerability, which allows for writing or overwriting arbitrary files on connected systems. Learn about the Rsync tool's architecture, its delta transfer algorithm, and how the PRODAFT Threat Intelligence Team uncovered this long-standing security flaw during source code analysis. Gain insights into the implications of this vulnerability for network security and understand the technical details behind its exploitation.

Syllabus

Weaponizing Rsync 0Day Vulnerability by Ege BALCI

Taught by

Hack in Paris

Reviews

Start your review of Weaponizing Rsync 0Day Vulnerability

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.