BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
BTC $55865.7639
ETH $3222.4858
BNB $400.6682
SOL $110.6842
XRP $0.5548
ADA $0.6230
AVAX $39.2767
DOGE $0.0896
TRX $0.1404
wstETH $3751.1765
LINK $19.0474
DOT $8.0594
WETH $3236.9354
MATIC $1.0625
UNI $10.5983
WBTC $55965.3668
IMX $3.3901
ICP $13.0143
BCH $300.6764
LTC $74.8911
CAKE $3.2355
FIL $8.1517
ETC $28.1561
RNDR $7.4096
KAS $0.1718
DAI $0.9979
HBAR $0.1117
ATOM $11.3293
VET $0.0491
INJ $36.5642
TON $2.1072
OKB $51.3395
LDO $3.5443
FDUSD $1.0015
STX $3.0723
ARB $1.9162
NEAR $4.0168
XMR $131.7677
TIA $17.0755
XLM $0.1186
GRT $0.2823
ENS $22.2643
THETA $2.1117
MKR $2155.4331
WEMIX $2.1023
APEX $2.4575
BEAM $0.0357
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • New Sh1mmer exploit unlinks ChromeBook from organization


    Laptops with proprietary software from Google, called Chromebooks, are very popular in American educational institutions. Many schools and colleges give out these devices to everyone for educational purposes. Of course, such devices have many software restrictions set by the administrator when registering for the enterprise. For example, third-party applications cannot be installed on such devices, many system settings cannot be changed, etc. In addition, it is not possible to unregister a device by yourself, only an administrator can do this.

    The new exploit allows users to unregister enterprise-registered Chromebooks, allowing them to install whatever apps they want, bypass restrictions, and even do a factory reset.

    Security researchers from the Mercury Workshop team have developed an exploit under the funny name "Shady Hacking 1nstrument Makes Machine Enrollment Retreat", abbreviated as "Sh1mmer". The tool, as the name suggests, allows non-admin users to unenroll their Chromebooks from Enterprise Management. Especially enterprising comrades can thus untie their Chromebook and use the entire academic year as their personal one, without any restrictions.

    For the exploit to work on a particular Chromebook, there must be an RMA shim that has been leaked to the dark web for public access. Sh1mmer changes its parameters and gives extended access. The researchers listed the boards on which the exploit would work correctly. You can find out the board model on a particular device through the “chrome://version” command in the address bar, and the “board-name” field should contain one of the following values:

    brask, brya, clapper, coral, dedede, enguarde, glimmer, grunt, hana, hatch, jacuzzi, kukui nami, octopus, orco, pyro, reks, sentry, stout, strongbad, tidus, ultima, volteer, zork.

    RMA shims are disk images stored on USB devices. They contain the ChromeOS components needed to reinstall the operating system, as well as the manufacturer's tools used to repair and diagnose the device.

    To use this exploit, you need to download an RMA shim for the desired Chromebook board, use a dedicated online builder from the exploit developer to inject Sh1mmer into it, and then run the Chrome Repair Utility.

    Using the steps detailed on the Sh1mmer website, you can download the modified RMA shim and launch the exploit menu.

    From this menu, you can unregister or re-register the device, enable USB boot, allow root access to the operating system, open a bash shell, and more.

    One Reddit user tested the exploit on his Acer ChromeBook and stated that it was fully functional. The device can be unpaired and reset to factory settings. Another user warned that using this exploit is likely to violate the student code of conduct and could lead to serious consequences.

    Google representatives have already said that they are aware of the exploit and are working on fixing the vulnerability.

    Author DeepWeb
    Chemists unraveled the biosynthetic pathway for cocaine and forced tobacco to synthesize it
    Killnet DDoS attacks on the US medical sector had little effect

    Comments 0

    Add comment