Security Review #222

September 06, 2024

Sometimes the elegant implementation is a function. Not a method. Not a class. Not a framework. Just a function.

— John Carmack

Starred Articles

Linux Detection Engineering - Part 2: A Sequel on Persistence Mechanisms

In this second part, we'll dive deeper into the world of Linux persistence and how to hunt these techniques. We'll set up the persistence mechanisms, analyze the logs, and observe the potential detection opportunities.

Ghost in the PPL Part 3: LSASS Memory Dump

Following my failed attempt to achieve arbitrary code execution within a protected LSASS process using the BYOVDLL technique and an N-day exploit in the KeyIso service, I took a step back, and opted for a less ambitious solution: a (not so) simple memory dump.

Why bother with argv[0]?

Making the case against argv[0], this post demonstrates how it can be used to deceive security analysts, bypass detections and break defensive software, across all main operating systems.

The X-Correlation between Frans & RCE

Correlation headers like X-Request-ID or X-Correlation-ID are more than just debugging tools. They can expand the attack surface of a target by potentially interacting with various contexts within the application, from CI pipelines to internal logging, making them prime targets for exploitation.

New Articles

Understanding Stealer Logs and Its Role in Security Testing - Part 1

In this article, we will explore the fundamental concepts of stealer logs, the types of data they capture, and how they can be used to analyze the initial IoC in some cases. Additionally, we will present a case study to illustrate how testers can effectively leverage stealer logs in security testing.

Using Veeam metadata for efficient extraction of Backup artefacts - Part 2

In this article, we create a Velociraptor pipeline to remotely access relevant forensic artefacts in backed up data. This aims to enable DFIR analysts to extend the time horizon in their investigations using Veeam backups and Velociraptor, while minimizing network bandwidth usage and extensive recovery operations.

Obfuscated PowerShell leads to Lumma C2 Stealer

This report delves into a new sample of LummaC2. Our analysis covers the different stages of the malware's execution, from the initial PowerShell command to the subsequent payload decryption and execution, providing insights into the tactics, techniques, and procedures (TTPs) used by the threat actor(s).

Evil MSI. A story about vulnerabilities in MSI Files

There may be various vulnerabilities inside MSI files, most of which will lead to privilege escalation. We have developed a tool called MyMSIAnalyzer that will make it easier to find vulnerabilities inside MSI files. You should read this article if you want to learn more about the insides of the MSI format and how the tool works.

CVE-2024-37079: VMware vCenter Server Integer Underflow Code Execution Vulnerability

We detail a recently patched code execution vulnerability in the VMware vCenter Server. Successfully exploiting this vulnerability could lead to a heap buffer overflow, which could result in the execution of arbitrary code in the context of the vulnerable service.

WiFi auth with OsmoHLR/SIM cards

This article details how to use WPA-Enterprise with EAP-SIM to authenticate against a network using SIM cards.

4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways

This post will go over 4 exploits of a buffer overflow, starting with the simplest version (no stack canaries, no ASLR, corrupted return address) all the way up to an exploit written for the wappd binary shipped on the Netgear WAX206, where multiple mitigations are enabled and we go from x86-64 to arm64.

Unmasking the Bears' Chrome Data Thief: The Android Cookie-Stealer Payload

We analyze a piece of malware designed for stealthy data exfiltration, targeting Android devices and specifically focusing on sensitive information stored within the Chrome browser. It employs a range of techniques to evade detection and analysis, including anti-debugging measures, dynamic library loading, and obfuscation of the command-and-control (C2) server's address.

Next-Level Reversing: Binary Ninja+TTD

One of the most slept-on techniques I know of is "reversible debugging", or time-travel debugging (TTD). Binary Ninja TTD integration is somewhat new, so it seemed like it'd be worth going over the basic setup process and getting started with this feature.

The state of sandbox evasion techniques in 2024

There's a lot of sandbox evasion techniques, some are simple: query WMI, some are cool: parsing SMBIOS tables, most try to detect sandbox artifacts. I wanted to know if these techniques are still effective for detecting sandboxes, or if the sandboxes have since been updated to counter them.

Linux Kernel taprio OOB

This article describes an out-of-bound access vulnerability for TyphoonPWN 2024 in the Linux PE category.

Analysis of two arbitrary code execution vulnerabilities affecting WPS Office

We discovered a code execution vulnerability in WPS Office for Windows (CVE-2024-7262). Upon analyzing the root cause, we subsequently discovered another way to exploit the faulty code (CVE-2924-7263). In this blogpost, we provide technical details.

Fuzzing uC/OS protocol stacks, Part 1: HTTP server fuzzing

This is the first post of a three-part series, where we will be delving into the intricacies of fuzzing uC/OS protocol stacks. In this post, I will detail code modifications necessary for developing a fuzzing harness tailored for the uC/HTTP-server.

AWS vs Azure: A "Secure by default" comparison

Let's take a closer look at the Security differences between AWS and Azure by reviewing the design choices, default settings and vulnerabilities that have been exploited over the years.

When on Workstation, Do as the Local Browsers Do!

This post will seek to provide organizations with high-fidelity template detections based on classic Splunk SPL queries to assist with detecting browser abuse.

Exploiting Misconfigured GitLab OIDC AWS IAM Roles

In this article, we will explain a potential misconfiguration of AWS IAM roles when using GitLab OpenID Connect (OIDC), walk through how to exploit them step-by-step, and explain how the AWS Console causes this misconfiguration by default.

CVE-2024-37084: Spring Cloud Remote Code Execution

CVE-2024-37084 is a critical security vulnerability in Spring Cloud Skipper, specifically related to how the application processes YAML input. This flaw could be exploited by an attacker providing malicious YAML data, potentially leading to remote code execution.

Peeling Back the Layers of an Onion

In this post I detail an alternative method for searching assembly instructions at runtime. Back tracing from a supervisor call and attempting to locate the MOV instructions associated with the access system call.

Revival Hijack - PyPI hijack technique exploited in the wild

This blog details a PyPI supply chain attack technique we discovered. This attack technique involves hijacking PyPI software packages by manipulating the option to re-register them once they're removed from PyPI's index by the original owner; a technique we've dubbed "Revival Hijack".

Getting "in tune" with an enterprise: Detecting Intune lateral movement

Intunes is a prime target for attackers to abuse for conducting lateral movement and code execution. We will give a background on Intune, how it is being used within organizations and show how to use this cloud-based platform to deploy custom Windows applications to achieve code execution on user devices.

A Security Analysis of Azure DevOps Job Execution

This post will break down what happens on the server when an Azure pipeline is triggered and address security risks. We'll especially focus on how someone could potentially escalate their access or discover sensitive information if they can manipulate the pipeline code.

CVE-2020-27786 ( Race Condition + Use-After-Free )

This blog post describes how to exploit a use-after-free vulnerability due to a race condition in MIDI devices in Linux Kernel 5.6.13. This vulnerability is identified as CVE-2020-27786.

BlackSuit Ransomware

We observed an intrusion that started with the execution of a Cobalt Strike beacon and ended in the deployment of BlackSuit ransomware. The threat actor leveraged various tools, including Sharphound, Rubeus, SystemBC, Get-DataInfo.ps1, Cobalt Strike, and ADFind, along with built-in system tools.

Still Recent

CVE-2023-41111: Samsung Baseband RLC Data Re-Assembly Buffer Overflow

We have identified a new buffer overflow vulnerability in Samsung's baseband implementation (mainly used in Exynos chipsets). The vulnerability can be exploited to achieve arbitrary code execution in the baseband runtime.

Backdooring SSH p0c Code

This article provides a comprehensive analysis of backdoored SSH (CVE-2024-6387) exploits.

Oldies but Goodies

Using Veeam metadata for efficient extraction of Backup artefacts - Part 1

In a remote incident response, where efficient data access is key, Veeam metadata files can be used to list and search for Backup objects. This article explores the structure of Veeam metadata and how to use a Velociraptor artifact to restructure this data.

Exploiting Public WIFI Networks via MAC Spoofing

In this research article, we'll take a deep dive into how WIFI networks authenticate a user's internet connection using MAC addresses are inherently vulnerable.

From a glpi patch bypass to rce

In this post I will describe how I found a patch bypass to re-exploit a SQL injection vulnerability, along with how to take it further to achieve RCE on a vulnerable GLPI instance.

Compromising ByteDance's Rspack using GitHub Actions Vulnerabilities

We identified several critical Pwn Request vulnerabilities within GitHub Actions used by the Rspack repository. These vulnerabilities could allow an external attacker to submit a malicious pull request and compromise NPM Deployment Token as well as GitHub Personal Access Token.

Unearthed Arcana

Chromium Session Storage and Local Storage

We tackle the data structures behind a further two mechanisms that websites can use to persist information: Session Storage and Local Storage.

Netcat for Pentester

In this article we will be exploring one of the most commonly used network utility and will learn how the other frameworks reinforce "Netcat" in order to generate a session.

Domain Escalation: PetitPotam NTLM Relay to ADCS Endpoints

An inherent vulnerability in the web interface of CA server allows an attacker to relay the requests from the web interface to request the Domain Controller machine account's (DC$) certificate and gain escalation+persistence. PetitPotam a tool that can coerce or persuade a windows host to authenticate against DC which can be used to request certificates and gain escalation.

Windows Server Hardening with PowerShell DSC

A solution for more efficient OS hardening is using configuration management tools such as Ansible, Puppet or PowerShell Desired State Configuration (DSC). We have created PowerShell DSC code to automate several hardening guidelines.