Security Review #208

May 17, 2024

If you aren't sure which way to do something, do it both ways and see which works better.

— John Carmack

Starred Articles

POST to XSS: Leveraging Pseudo Protocols to Gain JavaScript Evaluation in SSO Flows

In this post, we will dive into specification inaccuracies regarding the use of dangerous pseudo-schemes (JavaScript-URIs) in combination with POST-based SSO flows such as the OAuth 2.0 Form Post Response Mode2 and the SAML POST-Bindings3, resulting in a protocol-level Cross-Site Scripting (XSS) vulnerability pattern.

Deterring Attackers with HoneyTrail: Deploying Deception in AWS

In this article, I introduce HoneyTrail. Designed specifically for AWS users, HoneyTrail adds a layer of deception without a complicated setup process. It includes S3, Lambda and RDS lures to help detecting suspicious activity.

Pivot to the Clouds: Cookie Theft in 2024

In this article, I revisit the state of the remote debugging feature of browsers for grabbing sensitive information, including cookies.

New Articles

Abusing MS Windows printing for C2 communication

We discuss how an attacker can abuse the operating system's printing system to add and remove printers and create and manipulate printing jobs to achieve full C2 communication.

Code Interoperability: The Hazards of Technological Variety

This two-part blog series dives into two critical vulnerabilities in the remote desktop gateway Apache Guacamole. This first article will explain how Guacamole's architecture connects a Java component with a C backend serve. We will determine how Java's internal processing of Unicode strings can lead to unexpected behavior, which results in a severe vulnerability an attacker can exploit.

Big Vulnerabilities in Next-Gen BIG-IP

We provide details about remotely exploitable vulnerabilities in F5's Next Central Manager that can give attackers full administrative control of the device, and subsequently allow attackers to create accounts on any F5 assets managed by the Next Central Manager.

Techniques Learned from the XZ Backdoor

Several articles analyzing the CVE-2024-3094 vulnerability have already been published online. Here, let's learn about the techniques used to hide the backdoor in this incident.

Lumma Stealer Analysis

This analyzis the infamous Lumma Stealer malware will provide an understanding of how it works. Developers of this malware are big trolls, they left a lot of funny strings and comments within the binaries of their executable which was quite fun to find.

Hacking Apple - SQL Injection to Remote Code Execution

We stumbled upon several entry points for exploitation in Masa/Mura CMS, including a critical SQL injection flaw that we were able to exploit within Apple's Book Travel portal. In this blog post, we aim to share our insights and experiences, detailing how we identified the vulnerability sink, linked it back to its source, and leveraged the SQL injection to achieve Remote Code Execution (RCE).

SocGholish Sets Sights on Victim Peers

We identified and traced hands-on-keyboard activity to a SocGholish infection initiated by a fake browser update. It used obfuscated JavaScript to evade detection and establish a foothold in the environment. Attackers used LoL to collect sensitive credentials and notably, configured web beacons in both email signatures and network shares to map out local and business-to-business relationships.

Agent Tesla Malware Analysis

This article is a technical analysis of the famous Agent Tesla malware. It is broken in 2 parts: static analysis and dynamic analysis.

LLMjacking: Stolen Cloud Credentials Used in New AI Attack

We detail a recently observed new attack that leveraged stolen cloud credentials in order to target ten cloud-hosted large language model (LLM) services, known as LLMjacking.

SUM UAL - Investigating Server Access with User Access Logging

System Usage Monitor (SUM) User Access Logging (UAL) is used by Windows servers to aggregate client usage data by role and products on a server. In this article, we will see how they can be leveraged in the case where Windows Event Logs are no longer available.

Systemd Timers

Systemd continues its ongoing scope creep and has added timers. Systemd timers are a new task scheduling system that provide similar functionality to the existing cron (Vixie cron and anacron) and atd systems in Linux. And so this creates another mechanism that attackers can leverage for malware activation and persistence.

Emerging Identity Threats: The Muddy Waters of Residential Proxies

In this blog post, we'll explore the unique aspects of the increased use of residential proxies in identity phishing attacks. We'll go over some IOCs you can check in your own environment and cover some strategies for detecting current and new trends in these attacks.

Linux Event Logs and Its Record Types

Every Linux audit log will have a field named "Type" that can be used to quickly identify the type of the activity. In this article, we provide a list to identify the type of activity in the Linux audit log.

Abusing Azure Logic Apps - Part 1

In this blog, we will cover a few scenarios on how we can leverage our privileges on our storage account linked with a logic app to gain access on Logic Apps and create our new workflow, upload code that will allow us to execute system commands, and more.

Marshal Like a Boss With Reflective Loading in C#

In efforts of finding a way to circumvent c# marshaling and interop features limitations, we worked on a new marshaling technique that allows for using C++ dlls with C# entirely from memory without the need to drop anything on disk.

Lethal Injection: How We Hacked Microsoft's Healthcare Chat Bot

We have discovered multiple security vulnerabilities in the Azure Health Bot service, a patient-facing chatbot that handles medical information. The vulnerabilities, if exploited, could allow access to sensitive infrastructure and confidential medical data.

Schneider Electric APC Easy UPS RCE

We detail a deserialization vulnerability against Schneider APC UPS on the application level within an exposed RMI method. So when a non-primitive type is used as one of the parameters of an exposed RMI method, we can abuse that for arbitrary deserialization and might leverage this for RCE.

Poisoning Pipelines: Azure DevOps Edition

This blog summarises some of our thinking with regards to compromising DevOps pipelines on your red team engagements. For now we will be focusing on Azure DevOps. That being said, the philosophy behind compromising CI/CD and attack scenarios mentioned in this article are common across the board.

Malicious Go Binary Delivered via Steganography in PyPI

We a provide analysis of a suspicious publication on PyPI. The package was called requests-darwin-lite and appeared to be a fork of the ever-popular requests package with a few key differences, most notably the inclusion of a malicious Go binary packed into a large version of the actual requests side-bar PNG logo, which the author purported to be.

Attacking Rust

We delve into the intricacies of identifying and mitigating security vulnerabilities within Rust codebases. Despite Rust's reputation for strong memory safety and thread concurrency, no programming language is immune to potential exploits. This article navigates through common attack vectors such as buffer overflows, race conditions, and injection attacks, illustrating how they can manifest within Rust applications.

DYLD - Do You Like Death? Part X

In this 10th article ,we will introduce ExternallyViewableState, which holds information about the state of externally viewable objects in the system that we are loading, such as dyld, executable, and all dylibs.

Introducing Meta-Detector

In this blog post, I'm going to discuss a new Open-Source Intelligence (OSINT) tool I created to assist with collecting information about target organizations during penetration testing engagements. I call it, Meta-Detector.

Response Filter Denial of Service (RFDoS): shut down a website by triggering WAF rule

In this article, we explain how one can prevent a website from showing its content to any users with a single request, like a Denial of Service with minimal effort. This happens because the overly inclusive response rules of the WAF try to prevent SQL error leakage or web shells.

Relative Path File Injection: The Next Evolution in RPO

I discovered a sibling to the well-known Relative Path Overwrite (RPO) technique, which I have named Relative Path File Injection (RPFI). It is my hope that this new technique opens up new possibilities and sheds light on previously unexplored avenues for exploitation.

Mallox ranomware affiliate leverages PureCrypter in MS-SQL exploitation campaigns

This blogpost report aims at presenting a comprehensive technical analysis of the techniques used to compromise the MS-SQL honeypot we deployed. Additionally, it delves into the behaviour observed, with a focus on Mallox ransomware and its affiliates. Finally, we offer insights into detection opportunities to mitigate such threats in the future.

Foxit PDF "Flawed Design" Exploitation

In this article, we discuss a PDF exploitation, mainly targeting users of Foxit Reader. This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands. Run by careless users, it is able to execute malicious commands that appear highly leveraged by threat actors.

JS-Tap - Part 2: Now with C2 Shenanigans

JS-Tap is a tool intended to help red teams attack web applications. In this blog post I introduce version 2.0, with refined usability and scalability of the application and add the ability to execute custom JavaScript payloads on JS-Tap clients.

Still Recent

Windows Admin-to-Kernel Elevation of Privilege (CVE-2024-21338)

We detail the CVE-2024-21338 vulnerability that presents a significant elevation of privilege threat in Windows systems, exploited to bypass conventional security measures such as EDRs and antiviruses.

Uncovering potential threats to your web application by leveraging security reports

In this blog post, we'll share how to use the Reporting API to detect potential issues and identify the actual problems causing them. We'll also introduce an open source solution, so you can easily replicate our approach to processing reports and acting on them.

Examining the Deception infrastructure in place behind code.microsoft.com

The domain name code.microsoft.com has an interesting story behind it. Today it's not linked to anything but that wasn't always true. This is the story of one of my most successful honeypot instances and how it enabled Microsoft to collect varied threat intelligence against a broad range of actor groups targeting Microsoft.

How i Manage to Get Sensitive Informations via docker image

In this article i will show you how to find sensitive information that accidentally exposed to internet as passive attack, that is finding vulnerabilities without interacting to the services by only browsing & crawling on the internet.

Oldies but Goodies

What are random numbers and how they are managed on Linux?

In this article, we will deep dive into the major concepts behind random numbers and learn how to work with them on a Linux system. But first, we will try to understand what are random numbers and why they are so important for computing (especially cryptography).

Opening Critical Infrastructure: The Current State of Open RAN Security

The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem.

Attacks on 5G Infrastructure From Users' Devices - Part 1

Crafted packets from cellular devices such as mobile phones can exploit faulty state machines in the 5G core to attack cellular infrastructure. This entry describes CVE-2021-45462 as a potential use case to deploy a denial-of-service (DoS) attack to private 5G networks.