Security Review #229

October 25, 2024

The best thing about a boolean is even if you are wrong, you are only off by a bit.

— Anonymous

Starred Articles

SELinux bypasses

This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.

SQL Injection Polyglots

We detail how to build a SQL Injection polyglot step by step. We end up with queries that demonstrate how this polyglot achieves a true result with no quotes, single quotes and double quotes.

Concealing payloads in URL credentials

This article details how the ability to conceal payloads through credentials, manipulate the username and password properties within anchor elements, and potentially combine this with DOM clobbering can be used for more advanced exploitation.

Unmasking Hidden Threats: Using Velociraptor for Process Hollowing Analysis

In this blog, we will explore how to identify and analyse process hollowing techniques using Velociraptor. This tool provides powerful capabilities for hunting and detecting Process Hollowing malware, enabling security analysts to dig deeper into suspicious processes, memory dumps, and hidden behaviours within infected systems.

New Articles

Unmasking CVE-2024-38178: The Silent Threat of Windows Scripting Engine

CVE-2024-38178 is a type confusion vulnerability caused by the JIT engine in JScript9.dll performing incorrect optimizations on variables initialized with the usual arithmetic conversion exception operator, which can be used to bypass the CVE-2022-41128 patch

Attacking APIs using JSON Injection

I detail an attack on Samsung's Smart Hub relying on JSON injection and leading to a complex chain of vulnerabilities, from SQL injection to remote code execution.

bedevil: Dynamic Linker Patching

In this blog post, we will conduct an in-depth analysis of the patching technique used by the bedevil rootkit, exploring how it works and the advantages that dynamic linker patching offers to attackers.

Unraveling the clues: RDP artifacts in incident response

In this blog, we will explore what RDP digital artifacts entail, where they are located, how they can be interpreted, and illustrate their use in an incident response case example.

Mastering Live Volatile Data Collection on Macs

Volatile data plays a pivotal role in forensic investigations, particularly in cases involving live systems. This guide is designed to equip forensic examiners with the skills to collect and analyze volatile data on macOS.

Malicious PowerShell Script Execution

We analyze a PowerShell script that employs multiple malicious techniques, such as DNS cache clearing, scheduled jobs for persistence, remote code execution, and clipboard manipulation.

Malicious Processes Creating Network Traffic

Hunting malicious processes generating network traffic using Wireshark involves tracking abnormal traffic patterns initiated by suspicious processes. We provide specific filters, such as for non-standard ports or unusual DNS queries, Wireshark helps identify command-and-control (C2) traffic, data exfiltration, and other malicious network activities.

Detection of "EDRSilencer"

We provide a simple technique to detect EDRSilencer, a tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

The Power of Taint Analysis: Uncovering Critical Code Vulnerability in OpenAPI Generator

We discovered a complex taint flow vulnerability in OpenAPI Generator, that propagates user-controlled data via 28 steps to a dangerous sink. In this blog post, we will explain the technical details behind this taint flow vulnerability, which became CVE-2024-35219, a critical arbitrary file read and deletion vulnerability in the OpenAPI Generator.

I hate you COM

We discuss challenges with using COM object activation APIs like CreateInstance and CoCreateInstance, which can fail if the COM object is incompatible with the CLR version loaded in the target .NET application.

Fake attachment: Roundcube mail server attacks exploit CVE-2024-37383 vulnerability.

This article details CVE-2024-37383, a vulnerability that was discovered in the Roundcube Webmail email client. This is a stored XSS vulnerability in the code that processes SVG elements in the email body markup that allows an attacker to execute JavaScript code on the user's page.

Hardening Entra ID

In this blog post, I go over each setting-menu and list the settings I would change. I will also provide a short explanation for why I would change the setting, as well as what the setting is by default.

Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575)

We provide exploitation details, Yara detection rules and IoC for the vulnerability CVE-2024-47575 that allows a threat actor to use an unauthorized, threat actor-controlled FortiManager device to execute arbitrary code or commands against vulnerable FortiManager devices.

Embargo ransomware: Rock'n'Rust

We have discovered new Rust-based tooling leading to the deployment of Embargo ransomware. The new toolkit consists of a loader and an EDR killer, we named MDeployer and MS4Killer. MS4Killer is particularly noteworthy as it is custom compiled for each victim's environment, targeting only selected security solutions.

Using Nix to Fuzz Test a PDF Parser - Part 1

I created a Nix configuration that kicks off a fuzz testing workflow with a single command. The only dependencies are Nix and git. I used my Nix workflow to find an unpatched bug in a PDF renderer, even though I'm a beginner at both Nix and fuzz testing.

Tricks and Treats: GHOSTPULSE's new pixel-level deception

The updated GHOSTPULSE malware has evolved to embed malicious data directly within pixel structures, making it harder to detect and requiring new analysis and detection techniques.

Still Recent

Enhancing YARA Rule Performance: Best Practices and Techniques

As the complexity of malware evolves, so must the efficiency and effectiveness of YARA rules. This article outlines key strategies for optimizing YARA rule performance, focusing on leveraging specific constructs and techniques.

Oldies but Goodies

MyBB Admin Panel RCE CVE-2023-41362

This blog post explores a critical vulnerability in MyBB's admin panel, leading to authenticated Remote Code Execution (RCE).