Security Review #203

April 12, 2024

Why are video games so much better designed than office software? Because people who design video games love to play video games. People who design office software look forward to doing something else on the weekend.

— Ted Nelson

New Articles

Unsecure time-based secret and Sandwich Attack

In this article, I detail my research into time-based secrets. Starting from on some vulnerabilties found in common frameworks, I will theorize and implement a generic approach: the Sandwich attack.

Malware Development with C

In this short blog we will leverage the power of C programming, and uncover how simple yet powerful techniques can be employed to manipulate registry keys, ensuring that our desired configurations persist across system reboots and updates.

Exploring IPv6 Zone Identifier

This article is dedicated to a series of tricks utilizing the modern capabilities of IPv6 and the shortcomings of address parser implementations in standard libraries of popular programming languages.

Orphan Processes in Linux

In this short blog we will see that ps is not giving us the full story, but with additional info from /proc we can differentiate orphaned processes with PPID one from processes that were actually started by systemd.

Preventing DCSync Attacks

This article will delve into the details of DSync attacks and provide different approach and techniques to mitigate them.

500ms to midnight: XZ / liblzma backdoor

In this article, we provide an initial analysis of the XZ Utility backdoor, including YARA rules, osquery, and KQL searches to identify potential compromises.

XZ BackDoor (CVE-2024-3094): a Multi-Year Effort by an Advanced Threat Actor

With this post I would like to provide a technical dive and considerations about the recently disclosed XZ BackDoor vulnerability (CVE-2024-3094). This vulnerability, which affects the XZ Utils library, a widely used data compression utility in Linux distributions, had the potential for severe consequences, including remote code execution (RCE) and unauthorized access to impacted systems.

Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies

During analysis of an Ivanti Connect Secure appliance compromised by UNC5221, we discovered four distinct malware families that work closely together to create a stealthy and persistent backdoor on an infected appliance. We assesses that these malware families are designed to enable long-term access and avoid detection.

Persistent Magento backdoor hidden in XML

Attackers are using a new method for malware persistence on Magento servers. We discovered a cleverly crafted layout template in the database, which was used to automatically inject malware.

Attacking Azure

This article summarizes main attack vectors against Azure and demonstrate how to increase security of common operations.

InSpectre Gadget

We present InSpectre Gadget, an in-depth Spectre gadget inspector that uses symbolic execution to accurately reason about exploitability of usable gadgets. Our tool performs generic constraint analysis and models knowledge of advanced exploitation techniques to accurately reason over gadget exploitability in an automated way.

BatBadBut: You can't securely execute commands on Windows

Several programming languages that allowed an attacker to perform command injection on Windows when the specific conditions were satisfied. In this blog, I am documenting the details to provide more information about the vulnerabilities and minimize the confusion regarding the high CVSS score.

A Hitch-hacker's Guide to DACL-Based Detections (Part 4) - Addendum

In this last post, we will review a few additional attributes that we thought had value, particularly regarding detection and baselining opportunities. For each of them we will detail the background, the attack and the related detection queries.

Dissecting Windows Malware Series - Part 1: Beginner To Advanced

This article will mainly focus on the Advanced Static Analysis stage, once we performed Basic Static Analysis (extracting information without running the malware) and Basic Dynamic Analysis (execute the malware to see how it runs "live").

Havoc C2 Framework - A Defensive Operator's Guide

The Havoc command and control (C2) framework is a flexible post-exploitation framework. This article aims to empower defenders to detect the presence of Havoc, analyze its proprietary agents, known as Demons, and enhance organizational resilience against modern post-exploitation attack flows.

Advanced Frida Usage Part 7 - Frida Memory Operations

In this blog post, we will discuss how to use Frida for memory manipulation operations using Javascript API and analysis of Native Android libraries. In this tutorial, we will focus on some of the API's used for scanning, reading and writing, copying, and patching process memory.

Tracking Malicious Infrastructure With DNS Records - Vultur Banking Trojan

In this blog, we will use passive DNS tooling to cross-examine historical domains and identify common infrastructure and patterns in Vultur banking trojan infrastructure naming schemes. We will leverage these as pivot points to identify 13 new domains in use by the Vultur developers.

Still Recent

Phishing investigation

This article provides guidance on identifying and investigating phishing attacks within your organization. The step-by-step instructions help you take the required remedial action to protect information and minimize further risks.

Pivoting from Microsoft Cloud to On-Premise Machines

This article will demonstrate one situation that allows to pivot from a Microsoft cloud environment to on-premise machines via PSRemoting.

Passkeys - Under The Hood

In this blog we want to dig deeper into Passkeys technology and see how some of the existing solutions work in practice and to compare them to hardware security keys.

PHP deserialization attacks and a new gadget chain in Laravel

Without pretension this article reintroduces the already known concept of Property Oriented Programming chain (POP chain) or gadget chain in PHP. The first part of the article explains the basic ideas associated with gadget chain whereas the second part details how we were able to identify a new one within Laravel.

Wishing: Webhook Phishing in Teams

Microsoft Teams, contains a webhook feature that is susceptible to abuse. The end result for attackers is a variety of ways to abuse Teams for post-exploitation, mainly to send phishing messages. This article will explore these vulnerabilities in detail, discussing their implications for organizations.

Oldies but Goodies

Threat Hunting with MITRE's ATT&CK Framework - Part 1

In this blog posts series, we will describe how to best leverage MITRE's Attack Framework for threat hunting. This first part will provide a basic overview of the techniques.

Threat Hunting with MITRE's ATT&CK Framework - Part 3

In the final part of the series, we will focus on some of the more critical threat signatures that can be used for hunting retroactively in your environment. These particular techniques I'd consider to be higher fidelity and should ultimately be constructed into alarms for immediate response.

Bypassing anti-reversing defences in iOS applications

This blog post provides a walktrough on dynamically bypassing anti-debugging and anti-reversing defences in iOS applications. Furthermore, this blog post is using resources from OWASP MASTG and provides a comprehensive guide that discusses about mobile applications security testing and reverse engineering.