Security Review #201

March 29, 2024

It is not the language that makes programs appear simple. It is the programmer that make the language appear simple!

— Uncle Bob

New Articles

Curious Serpens' FalseFont Backdoor: Technical Analysis, Detection and Prevention

This article reviews the recently discovered FalseFont backdoor. This article focuses on analysis of the backdoor and its capabilities. Lastly, we'll discuss ways to detect and prevent this targeted backdoor.

5 Advanced Ways Test For File Upload Vulnerabilities

Assuming that most of you are hackers that already familiar with testing upload functions in the "traditional ways" (file extensions, content-type, magic number, etc), this writeup will cover the less traditional upload vulnerabilities.

Poisoned Pipeline Execution Attacks: A Look at CI-CD Environments

In this blog we examine the three types of poisoned pipeline execution (PPE) attacks, explore methods to exploit these vulnerabilities, and discuss preventive measures for such misconfigurations. We will also dive into real-world scenarios where attackers used PPE attacks to achieve remote code execution (RCE) on CI/CD environments and explain how those attacks could have been prevented.

Achieving DLL Side-Loading in the Original Process

In this article, I detail a method to successfully implement DLL side-loading in the original process while always avoiding DllMain and its deadlock limitation.

(Anti-)Anti-Rootkit Techniques - Part 1: UnKovering mapped rootkits

This blog post is the first part of a series, where I plan to showcase various anti-rootkit techniques, known through anti-rootkits or anti-cheats, and their implementations in unKover - a small anti-rootkit tool, that implements some techniques to detect rootkits, especially those manually mapped to memory.

AsukaStealer: The Next Chapter in ObserverStealer's Story

This is a technical analysis of AsukaStealer malware, that includes capabilities to deploy additional payloads on infected computers, configure FileGrabber settings, and facilitate log delivery via Telegram, among other features.

Hunt of the Month: Detecting AsyncRAT Malware Over HTTPS

Through the example of AsyncRAT we show that all is not lost when malware uses HTTPS to communicate with its C2 server. In some cases, a default SSL certificate is used, and this server literally announces itself as a component of the malware framework.

TeamCity Vulnerability Exploits Lead to Jasmin Ransomware, Other Malware Types

In this post, we detail how threat actors can exploit CVE-2024-27198 to perform a variety of malicious operations, such as dropping the Jasmin ransomware, deploying the XMRig cryptocurrency miner, Cobalt Strike beacons, SparkRAT backdoor or executing domain discovery and persistence commands.

Attacking Docker

This article details the potential attack vectors and security risks associated with Docker environments. This includes involves exploiting vulnerabilities, misconfigurations, and weaknesses in various components of the Docker ecosystem, including Docker Engine, container images, orchestration platforms, and the underlying host system.

How to validate Sigma rules with GitHub Actions for improved security monitoring

This blog post introduces a new GitHub Action that automates the validation of Sigma rules against a previously developed JSON Schema. We'll delve into the tool's history and how it came to be, and then walk through how to integrate it into your GitHub Actions' workflows.

Latrodectus Loader Analysis

This post will dive into a Latrodectus loader that leverages junk comments and wmi commands to obfuscate functionality and download a remote .msi file.

Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit

This blog post aims to present an in-depth analysis of Tycoon 2FA and the recent developments we spotted in the phishing kit. Additionally, this report provides tracking opportunities to actively monitor the infrastructure and mitigate risks associated with Tycoon 2FA.

Frida on Java applications and applets in 2024

This article discusses how I used Frida to instrument the code and call Java classes arbitrarily while investigating serialized objects used in a Java applet communication.

Local Privilege Escalating my way to root through Apple macOS filesystems

In this post, I detail how I found and built an exploit for CVE-2023-42931, a local privilege escalation allowing anyone with an access to a local account (including the "guest") to elevate his privilege to root.

"CVE-2024-21388"- Microsoft Edge's Marketing API Exploited for Covert Extension Installation

This article discusses how we discovered a vulnerability in the Microsoft Edge browser, designated CVE-2024-21388. This flaw could have allowed an attacker to exploit a private API, initially intended for marketing purposes, to covertly install additional browser extensions with broad permissions without the user's knowledge.

Turnstiles from a hacker perspective - Part 2

In this second part, we will explore the use of implants in turnstiles for conducting replay attacks, a method that allows a malicious individual to gain unauthorized access by impersonating another person.

New Go loader pushes Rhadamanthys stealer

In this blog post, we describe a malvertising campaign with a new loader. The program is written in the Go language and uses an interesting technique to deploy its follow-up payload, the Rhadamanthys stealer.

Dissecting a complex vulnerability and achieving arbitrary code execution in Ichitaro Word

In this article, we deep dive into the complex reverse engineering process that lead to the discovery of several vulnerabilities in JustSystems' Ichitaro Word Processor. CVE-2023-35126 and its peers (CVE-2023-34366, CVE-2023-38127, and CVE-2023-38128) were each assessed as exploitable with the possibility of achieving arbitrary code execution.

Abusing MiniFilter Altitude to blind EDR

If you gain local admin privilege access to a host with an EDR solution, you can potentially exploit a vulnerability by abusing a minifilter driver, such as Sysmon driver, to evade detection. This method blinds the EDR solution, which relies on kernel callbacks.

SeeSeeYouExec: Windows Session Hijacking via CcmExec

In this blog post, we delve into how the CcmExec service can be utilized for session hijacking and introduce CcmPwn, a tool designed to facilitate this technique. Finally, we will discuss detection strategies for security teams.

Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu

This post discusses a use-after-free vulnerability, CVE-2024-0582, in io_uring in the Linux kernel. It describes the data-only exploit strategy that we implemented, allowing a non-privileged user (and without the need of unprivileged user namespaces) to achieve root privileges on affected systems.

Azure Site Recovery Services: Elevating Privileges

We discovered a cleartext Azure Access Token for a privileged Managed Identity. In this blog, we'll share the technical details around how we found and reported this vulnerability to Microsoft. Additionally, we'll cover how the finding was remediated.

From ChatBot To SpyBot: ChatGPT Post Exploitation

We delve into the security implications that come with the integration of AI into our daily routines. This examination is particularly focused on how attackers could exploit OpenAI's ChatGPT to gain persistent access to user data and manipulate application behavior.

VMware ESXi Forensic with Velociraptor

This article will show how to leverage Velociraptor features in order to perform forensic analysis of a VMware ESXi hypervisor.

MySQL2: Dangers of User-Defined Database Connections

I encountered an automation system that utilized the node-mysql2 library to connect to user databases and execute queries controlled by them. In this article, I want to discuss the issues it causes and provide you with their solutions.

Malware Development Essentials Part 1

For Malware development and security professionals, understanding the inner workings of Windows is crucial. Windows internals, the hidden world beneath the user interface, can harbor vulnerabilities if not properly secured. Let's dissect the key components and their security implications.

Introducing SharpConflux

In this post, we introduce SharpConflux, a .NET application built to facilitate Confluence exploration. It allows Red Team operators to easily investigate Confluence instances with the goal of finding credential material and documentation relating to objectives without having to rely on SOCKS proxying.

Still Recent

Unpacking Flutter hives

The goal of this blogpost is to obtain the content of an encrypted Hive without having access to the source code. We will create a Flutter app, understand the internals of the Hive framework, create a generic Hive reader, obtain the password of the encrypted Hive and recover deleted items.

Network Scanning: Uncovering Cybersecurity Threats

In this article, we will study three GUI-based network scanners: NetScan, Angry IP Scanner & Advanced Port Scanner, with the aim of discovering forensics artifacts. The focus will be on the type of data they generate and how to exploit this data to find out how these tools have been used on an infrastructure.

Crumbled Security: Unmasking the Cookie-Stealing Malware Threat

This blog post will provide a general overview of malware that steals cookies (infostealer) and the prominent infostealer malware families. We'll cover common infection techniques and impacts as well as take a look at some examples.

Inside the LogoFAIL PoC: From Integer Overflow to Arbitrary Code Execution

In this blog post, we prove the severity of the bugs we identified while researching LogoFAIL by developing a PoC on a real device with modern firmware security features enabled (i.e. Intel Boot Guard and Secure Boot). In particular, we demonstrate how we turned one of the crashes found by our fuzzer into arbitrary code execution during the DXE phase.

XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT

In this blog post, I'll walk you through my discovery of two cross-site scripting (XSS) vulnerabilities in ChatGPT and a few other vulnerabilities. When chained together, these could lead to account takeover.

MutationGate

Considering inline hook is a major detection utilized by EDR products, bypassing them is an interesting topic to me. In this article I describe a new approach to bypass hook, hopefully, it can bring some improvements or advantages.

Oldies but Goodies

Persistence via App Registration in Entra ID

In this blog post, I'll explain how to Persist in Application Registration, how to create a Backdoor (kind of), and the potential of Privilege Escalation. I'll show you how the attack primitive works and show the PowerShell scripts that can be part of this persistence.

A Practical Tutorial on PCIe for Total Beginners on Windows (Part 1)

In this first blog of the series, we discuss ECAM and how configuration space accesses looked in both software and on the hardware packet network. We introduce the concepts of TLPs (Transaction Layer Packets) and how these packets move similar to Ethernet networks.

Unearthed Arcana

Introduction to Low Level Bit Hacks

This article is an overview of Bit Hacks, some ingenious little programming tricks that manipulate integers in a smart and efficient manner.