Security Review #220

August 23, 2024

We adore chaos because we love to produce order.

— M.C. Escher

Starred Articles

Privilege Escalation via AWS Signer to Sign Code using Unauthorized ACM Certificate

AWS ACM has a missing security boundary that allows users with AWS Signer permissions - but without ACM permissions - to sign code using any ACM certificate within the same account. This bypasses critical security checks, enabling unauthorized code to be signed and potentially distributed as legitimate software.

Web Browser Stored Credentials

Browsers such as Chrome and Edge utilize DPAPI to encrypt credentials prior to storage. The master key is stored locally and can be decrypted with the password of the user, which then is used to decrypt DPAPI data blobs. In this article, we review some tools that can be used to retrieve this master key.

New Articles

App Sandbox startup

This article will introduce how and when a process is Sandboxed on macOS. The main point is to show what is necessary for the sandbox to be enforced on the app on launch, which system component uses it, and where it is used during the execution flow.

CVE-2024-41660: A Critical Vulnerability in OpenBMC

During review of the OpenBMC source code, we discovered a critical vulnerability in the slpd-lite sub-component. Successful exploitation of this vulnerability would allow a network-resident (or remote attacker, depending upon the deployment) to fully compromise a BMC.

SSH Tunnelling to Punch Through Corporate Firewalls

SSH.exe has been bundled with Windows 10, 11 & Windows Server since late 2017 and signed by Microsoft. The reverse dynamic proxy is very powerful and there are a number of tricks that can be used to punch through corporate firewalls to get a reliable tunnel for offensive tooling to compromise entire AD domains.

Writing a PE Loader for the Xbox in 2024

This post details how an initially LPE vulnerability revealed to be a sandbox escape, and how it was ported to Xbox One to write a PE loader.

Hacking a Secure Industrial Remote Access Gateway

In this blog post, we describe the security analysis and the found vulnerabilities in the industrial remote access solution Ewon Cosy+, allowing unauthenticated attackers to gain root access to the device.

CVE-2024-7646: Ingress-NGINX Annotation Validation Bypass

A new Kubernetes vulnerability was uncovered (CVE-2024-7646) that affects the popular ingress-nginx controller. It allows malicious actors to bypass annotation validation and potentially gain unauthorized access to sensitive cluster resources.

Plaso Super Timelines and CloudTrails

Plaso is an open-source tool designed for efficient log file parsing and timeline creation. Given the limited information at this time on how Plaso processes CloudTrail logs, this article aims to provide insights and useful information on using Plaso with CloudTrail logs.

Understanding and Simulating SSH Backdoors

In this blog post, we'll explore two methods of simulating a backdoor in the SSH configuration or authentication process. This simulation is intended for educational purposes in a controlled environment, ensuring that all actions are logged, auditable, and reversible.

Strategies Used by Adversaries to Steal Application Access Tokens

In this blog post, we discuss how adversaries can adopt the Steal Application Access Token technique to manipulate application account API tokens in cloud and containerized environments. This can lead to privilege escalation and further compromise of the environment, all aimed at achieving their malicious objectives.

Click Bait and Switch: Malicious Traffic Distribution Systems

By collectively overlooking malicious TDSs over the years, the cybersecurity community has allowed them to flourish. This article pull back the curtain and shine a light on these networks.

Windows Event ID

This article provides a rundown of some of the most important Windows Event IDs that every cybersecurity analyst should be familiar with.

Staying Ahead: Understanding the Latest Email Evasion Tactics

This blog explores emerging trends in email-based malware evasion, focusing on the latest strategies used by cybercriminals. By examining case studies, understanding common evasion techniques, and discussing the future of malware evasion, we aim to equip readers with the knowledge necessary to protect themselves and their organizations from these stealthy threats.

Connect Operational Technology and ICS with ATT&CK Techniques

We present an overview of the "Defending OT with ATT&CK" project, that aims at identifying and defending against adversarial techniques that impact operations on critical infrastructure. We created resources to identify assets and technologies in complex IT/OT environments and present an approach to comprehensively identify adversarial behaviors targeting those systems.

Critical SSRF vulnerability in Microsoft Copilot Studio

We discovered a critical information-disclosure vulnerability in Microsoft's Copilot Studio via a server-side request forgery (SSRF), which allowed access to potentially sensitive information regarding service internals with potential cross-tenant impact.

CVE-2022-22265 Samsung npu driver

In this post, I explain a generic technique I used to write an exploit for CVE-2024-22265, a double free vulnerability in Samsung npu driver.

0-click Full Account Takeover

This article details a technique I used to take over an application account by bypassing the OTP mechanism used in the "forgot password" function.

Enumerating Private TLDs

This article discusses a technique I use to enumerate private TLD.

The Hidden Treasures of Crash Reports

This research, a crash course on crash reports, will highlight how these often overlooked files are an invaluable source of information, capable of revealing malware infections, exploitation attempts, or even buggy (exploitable?) system code. Such insights are critical for defense and offense, empowering us to either protect or exploit macOS systems.

My Methodology to AWS Detection Engineering - Part 1: Object Selection

In this first part of the series, I will describe what most approaches are likely doing to detect threats. Then, I'll expand on the two fields - source IP and user - I believe are incorrectly used when aggregating or assigning them as the sole risk objects. I will use the example of an AWS IAM User being created in your environment.

NGate Android malware relays NFC traffic to steal cash

A technical analysis of an Android malware that relays NFC data from victims' payment cards, via victims' mobile phones, to the device of a perpetrator waiting at an ATM

C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza

This blog entry describes an overlooked source of information in C++ programs that can make manual and automated type reconstruction more efficient. More information about the data types used within a function is hiding in plain sight; we can exploit it if we simply know where to look and how to interpret it.

CVE-2024-22263: Spring Cloud Dataflow Arbitrary File Writing

Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing in Cloud Foundry and Kubernetes, is vulnerable to an arbitrary file write issue to any location on the server's filesystem, potentially leading to a complete server compromise.

BLUUID: Firewallas, Diabetics, And... Bluetooth

In this blog you will learn about how to build a database of Bluetooth Low-Energy (BTLE) Generic Attribute (GATT) Universally Unique Identifiers (UUIDs) capable of remotely identifying Bluetooth Low-Energy devices for the purposes of vulnerability research, exploitation, and quantifying impact.

Still Recent

Hacking a Virtual Power Plant

In this article I explain how I gained control over a virtual power plant comprised of tens of thousands of grid connected batteries.

Oldies but Goodies

Exploiting HuggingFace's Assistants to Extract Users' Data

In this blog post we will examine the resilience of the new Hugging Chat Assistance to a combination of two techniques: Sleepy Agent and Image Markdown Rendering vulnerability. We used these techniques in order to publish a smart and deceptive malicious assistant that extracts email addresses of users, on the HuggingFace Chat platform.