Security Review #193

February 02, 2024

The number one skill required for learning any complex system is patience.

— Kelsey Hightower

New Articles

Hunting for File Deletion Artifacts in Google File Stream Data

Google Drive File Stream exposes persistent records of USB device connections with volume guids, a database with the complete Google Drive file and folder metadata for synced drives, logged in user information, and more. In this article, we will focus on the deleted files records, and especially the permanent ones.

The Active Directory Access Control List Explained

In this post, I will explain the Active Directory Access Control Lists, how they control rights/permissions, and how others inherit rights. This blog post serves as a reference point for other blogs exploring specific Active Directory attacks, like a DCSync Attack.

Evidence of Program Existence

Another fantastic Windows intrusion analysis artifact! Shimcache! Although this artifact is heavily used in intrusion analysis cases, it is also one of the most misunderstood. Lets break this down and talk all things Shimcache!

Bootloader Unlocking a Google Pixel 6

This is a step-by-step guide to booloader unlocking for Android devices in general and specifically Google Pixel 6

Creating Quick and Effective Yara Rules: Working with Strings

This is a quick post to outline a few ways to extract and identify useful strings for creating quality Yara rules. This post focuses on Windows executable files, but can be adapted to other files types.

Dependency Confusions in Docker and remote pwning of your infra

In this article, we will get into dependency confusion, a supply chain attack where an attacker is able to poison the build by forcing the build system to retrieve his malicious dependency somewhere on the internet instead of the legitimate internal dependency.

SOAPHound - Tool to collect Active Directory data via ADWS

We introduce SOAPHound, a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.

Roles Allowing To Abuse Entra ID Federation for Persistence and Privilege Escalation

Microsoft Entra ID (formerly known as Azure AD) allows delegation of authentication to another identity provider through the legitimate federation feature. However, attackers with elevated privileges can abuse this feature, leading to persistence and privilege escalation.

Ransacking your password reset tokens

I this article, we detail how the the "Ransack" library in its default configuration poses a major security risk that can likely be exploited to extract sensitive information or fully compromise the application.

A Practical Guide to PrintNightmare in 2024

Although PrintNightmare and its variants were theoretically all addressed by Microsoft, it is still affecting organizations to this date, mainly because of quite confusing group policies and settings. In this blog post, I want to shed a light on those configuration issues, and hopefully provide clear guidance on how to remediate them.

secureCodeBox

A Comprehensive Review of secureCodeBox - an Open-Source Platform for Continuous Security Utilizing Popular Testing Tools. Presenting architecture, configuration, example usage and potential uses cases of the platform.

Phishing Microsoft Teams for initial access

In this article, we will highlight a number of spoofing and phishing strategies that can be employed by external attackers to target an organization using Teams in the initial access phase of the kill chain.

Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours

This report details operations of threat actors exploiting a publicly exposed Remote Desktop Protocol (RDP) host, leading to data exfiltration and the deployment of Trigona ransomware.

Analysis Of Multiple Vulnerabilities In Ofbiz

CVE-2023-51467 is an authentication bypass in Ofbiz. Unfortunately, the initial mitigation efforts proved ineffective as they did not address the root cause, resulting in a new bypass with different CVE numbers and techniques. This analysis explores Ofbiz, focusing on the main root cause behind CVE-2023-49070, CVE-2020-9496, and CVE-2023-51467.

Is Your SAP Cloud Connector Safe? The Risk You Can't Ignore

SAP Cloud Connector (SAP CC) is a critical part of any SAP company's infrastructure as it enables secure interoperability between SAP systems on the platform within the enterprise and in the cloud. In this article, we will discuss security issues and provide recommendations to mitigate the risks associated with using SAP CC on the Windows platform.

Burrowing a Hollow in a DLL to Hide

In this post about common malware techniques, we are still talking about hollowing - but this time, instead of hollowing a newly created process, we will make a process load a new DLL and then overwrite part of that DLL with our malicious code.

Persistence - Disk Clean-up

In this article, we explain how, from the perspective of Red Teaming, it is feasible to utilize the disk clean-up utility to establish persistence by executing arbitrary code when the utility is initiated.

moxa ioLogik E1212 Vulnerabilities

We uncovered critical vulnerabilities in the Moxa ioLogik E1212 series that pose significant risks to the security of the system. These vulnerabilities encompass various attack vectors, including Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), cryptographic failures, and broken access control mechanisms.

Ransomware's PLAYing a Broken Game

In this blog post, we will cover some of the anti-analysis techniques used by Play and look at the process the malware uses to encrypt network drives and how that can cause the malware to crash.

Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits Martini Driver

n this blog, we detail our investigation of the Kasseika ransomware and the indicators we found suggesting that the actors behind it have acquired access to the source code of the notorious BlackMatter ransomware.

Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection

In this article, I would like to discuss a rather unconventional but very interesting detection mechanism used in conjunction with EDR, based on a combination of process environment block (PEB) modification, the use of fake DLLs and guard pages, and the use of vectored exception handling.

Hunting for Unauthenticated n-days in Asus Routers

We analyzed a vulnerable ASUS firmware to possibly write an n-day exploit. While we identified the vulnerable piece of code and successfully wrote an exploit to gain RCE, we also discovered that in real-world devices, the "Unauthenticated Remote" property of the reported vulnerability doesn't hold true.

WebSockets - The Beginner's Guide

This blog post summarizes what I learned about WebSockets in hope that other people like me that used to avoid them will understand them better.

Introducing PoIEx - Points Of Intersection Explorer

We are releasing a previously internal-only tool to improve Infrastructure as Code (IaC) analysis and enhance Visual Studio Code allowing real-time collaboration during manual code analysis activities. We're excited to announce that PoIEx is now available on Github.

Evolution of UNC4990: Uncovering USB Malware's Hidden Depths

We provide technical analysis and IoCs for UNC4990 tools. Despite relying on the age-old tactic of weaponizing USB drives, UNC4990 continues to evolve. The actor has moved from using seemingly benign encoded text files to hosting payloads on popular websites such as Ars Technica, GitHub, GitLab, and Vimeo.

Python's Byte: The Rise of Scripted Ransomware

Of late, there has been a spurt in ransomware attacks across the globe causing great concern for organizations and individuals alike. This blog gets into the nuances of how Python is used by threat actors to write ransomware.

Frog4Shell - FritzFrog Botnet Adds One-Days to Its Arsenal

We provide details about a new variant of the FritzFrog botnet, which abuses the 2021 Log4Shell vulnerability. We have included indicators of compromise (IOCs) and additional mitigation measures in this blog post to assist in the prevention of FritzFrog infection.

PowerShell: How to ping multiple Computers at once

In this post I'll show you a few examples of how you can ping multiple computers. We will use the Test-Connection cmdlet for this task.

Still Recent

Deobfuscate PowerShell using subtract

In this quick blog post, we'll explore the various combination of CyberChef operations e.g Generic code Beautify, Subsection, Fork, Subtract etc. to deobfuscate the second-stage PowerShell script used in the RedLine stealer infection chain.

Oldies but Goodies

Secure Software Supply Chain for OCI Artifacts on Kubernetes

The importance of securing the software supply chain is emphasized in this article, especially in the context of cloud-native development and the utilization of OCI artifacts on Kubernetes. It discusses various vulnerabilities and potential attacks that can occur throughout the supply chain, including dependency confusion, the insertion of malicious code, and the compromise of update servers.

JS-Tap - Part 1: Weaponizing JavaScript for Red Teams

Custom applications often have unknown functionality and require a generic payload. To address this challenge I have written JS-Tap, which provides a generic JavaScript payload. This payload does not require prior knowledge of the application, and does not require an authenticated user to run the payload.

Unearthed Arcana

Strange Attractors and TCP/IP Sequence Number Analysis - One Year Later

The goal of this follow-up is to evaluate any subsequent security measures implemented by the vendors in this field since the release of the original publication, and to evalute several systems that were not covered earlier. For the purpose of this document, we assume that the reader has read the original publication, and has an understanding of the methodology and terminology used.

Strange Attractors and TCP/IP Sequence Number Analysis

This is an attempt to evaluate TCP/IP sequence number generators in several mainstream operating systems by mapping the dynamics of the generated sequence numbers into a three-dimensional phase space. We demonstrate how this approach can be used to find many non-trivial correlations, and discuss why the results can be directly used to perform actual ISN prediction.