Security Review #241

January 17, 2025

Beware of bugs in the above code; I have only proved it correct, not tried it.

— Donald Knuth

Starred Articles

First Tokens: The Achilles' Heel of LLMs

The article explores the concept of Assistant Prefill, a feature offered by many LLM providers that allows users to prefill the beginning of a model's response to guide its output. While designed for practical purposes, such as enforcing response formats like JSON or XML, it has a critical vulnerability: it can be exploited to bypass safety alignments.

The Art of Linux Kernel Rootkits

In this article, we detail the concepts and techniques used by kernel rootkits for hooking, hiding and getting persistence. We also review the available detection techniques for defenders.

Detecting Abuse of VSCode Remote Tunnels

In this post we'll take a look at Microsoft VSCode Remote Tunnels, how they're abused by threat actors, and how you can detect their usage.

Silencing the EDR Silencers

One of the most common ways to "blind" EDRs is to apply firewall rules against the desired EDR applications. In this blog, I'll touch on this technique and discuss how products can protect themselves from this attack.

New Articles

Hijacking Azure Machine Learning Notebooks

We will cover a method to abuse excessive Storage Account permissions to get code execution in notebooks that run in the Azure Machine Learning service. We will also review a vulnerability in the service that allowed for privilege escalation from the Reader role to code execution in the notebooks.

Argo Workflows - Uncovering the Hidden Misconfigurations

Misconfigured Argo Workflows may result in a massive supply chain attack. In this blog post, we'll explore the root cause of these misconfigurations, the potential impact and how to deal with them.

Exploiting SSTI in a Modern Spring Boot Application (3.3.4)

We were able to achieve unauthenticated Remote Code Execution (RCE) via Server-Side Template Injection (SSTI) in a Spring Boot application. In this article we'll be diving into both the Thymeleaf templating engine and into the method we used to exploit SSTI in a modern Spring Boot application, specifically focusing on bypassing defenses in newer versions of Spring Boot.

Gayfemboy: A Botnet Deliver Through a Four-Faith Industrial Router 0-day Exploit.

The Gayfemboy botnet recently evolved, leveraging a 0-day vulnerability in Four-Faith industrial routers and unknown vulnerabilities in Neterbit routers and Vimar smart home devices to spread its payloads. This discovery prompted us to conduct an in-depth analysis of this botnet.

FunkSec - Alleged Top Ransomware Group Powered by AI

In this report, we provide an in-depth analysis of the group's tools. In a surprising discovery, our findings indicate that the development of the group's tools, including the encryptor, was likely AI-assisted, which may have contributed to their rapid iteration despite the author's apparent lack of technical expertise.

Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

We discovered a new macOS vulnerability that could allow attackers to bypass Apple's System Integrity Protection (SIP) in macOS by loading third party kernel extensions. In this blog post, we detail the connection between entitlements and SIP and explain how CVE-2024-44243 could be used to bypass SIP security measures.

7 Overlooked recon techniques to find more vulnerabilities

Reconnaissance is an important phase in bug bounty and in pentesting in general. In this article, we will be covering 7 overlooked reconnaissance techniques that you can apply to gather more useful data and find more security vulnerabilities.

Analyzing iOS Kernel Panic Logs

In this blog, we will be talking about analyzing iOS Kernel panic logs. By carefully extracting and analyzing these logs, you can gain valuable insights into the root cause of the Kernel panic. Patterns in crashes and backtraces may help uncovering subtle issues that could lead to security exploits or performance bottlenecks.

CVE-2024-54527: MediaLibraryService Full TCC Bypass, Dive Deep into AMFI

I will share with you a new TCC bypass vulnerability in the XPC service: CVE-2024-54527. I'm also going to dive into AppleMobileFileIntegrity.kext to correct some misconceptions in the minds of many and talk about the improvements Apple has made to it.

Linux Live Analysis - Part 1: An Overview

This article provides an overview of the key forensics data for a live analysis of a compromised Linux system.

Linux Live Analysis - Part 3: System Profiling

System profiling is the introduction to investigation. It's the step where you learn everything you can about the system: its users, software, hardware, and current state. In this post, I'll walk you through essential profiling commands that will make you feel like the Linux equivalent of a CSI investigator.

Linux Live Analysis - Part 4: Hunting for Processes

From a forensics point of view, finding out what processes are running on the suspected host and narrowing down the odd-looking ones is crucial. This step helps understand what's happening in the system.

Linux Live Analysis - Part 5: Persistence: Establishing Foothold

After exploiting and gaining initial access, attackers often focus on maintaining a hidden and continuous foothold to extend their control. This post delves into techniques used by attackers to achieve persistence on Linux systems and provides guidance on how to detect these activities effectively.

linux File System Analysis - Part 2: Users, Groups, Directories, and Files

In the process of analyzing a compromised Linux system, a critical step involves examining users, groups, directories, and files. This analysis can reveal evidence of lateral movement, privilege escalation, or persistence mechanisms used by an attacker to maintain unauthorized access.

Linux File System Analysis - Part 3: Binaries, Executables, and Rootkits

In analyzing compromised Linux systems, focusing on binaries, executables, and rootkits is crucial. Attackers often create or manipulate these elements to maintain access, escalate privileges, or exploit permission misconfigurations. In this article, we delve into key techniques for identifying and analyzing these artifacts.

Intune Attack Paths - Part 1

This blog post hopefully sets some foundational knowledge to understand Intune attack paths which are also are compelling for the attack paths that emerge connecting Entra/Azure to on-premises Active Directory and vice versa.

Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

In this blog, we will explain how we used QEMU to emulate the relevant system components of Planet Technology Corp's WGS-804HPT Industrial switch, and how it was used to uncover three vulnerabilities that could allow an attacker to remotely execute code on a vulnerable device. The vulnerabilities include separate buffer and integer overflow vulnerabilities and an OS command injection flaw.

Memory-related CVEs Exploited in kernelCTF

There are two vulnerability whose root causes lie in the internal memory subsystem implementation exploited in kernelCTF: a race condition vulnerability between remapping and memory advising, and a UAF during stack expansion.

Still Recent

Encrypt Methods, Using DynamicMethods - Part 1

This is a two-part journey to understanding DynamicMethods, and how to leverage them to hide code. In this first part, we will learn how .NET methods are built and executed, and how to create a simple DynamicMethod.

Encrypt Methods, Using DynamicMethods - Part 2

In this second post of the series, we'll explore common problems when dealing with metadata tokens, and how to overcome them and "convert" any method into a DynamicMethod.

Oldies but Goodies

Tales from the Call-Gate: An SMM Supervisor Vulnerability

In this article, we detail a Call-Gate issue in ARM architecture: an SMM Supervisor vulnerability that allows privilege escalation to Ring0.

Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409)

In this blog post, we will analyze CVE-2024-45409, a critical vulnerability impacting Ruby-SAML, OmniAuth-SAML libraries, which effectively affects GitLab. This vulnerability allows an attacker to bypass SAML authentication mechanisms and gain unauthorized access by exploiting a flaw in how SAML responses are handled.

Spring View Manipulation in Spring Boot 3.1.2

In this article, we'll dive into a comprehensive explanation of Spring View Manipulation attacks, dissecting their nature and detailing how we successfully bypassed the defense mechanism in the latest version of Thymeleaf within Spring Boot integrations.

How to Configure Passkeys in Microsoft Entra ID

A passkey is a simple and secure way to sign in without having to enter a username or password. It also adds an extra layer of security to protect your account. In this article, you will learn how to configure passkeys in Microsoft Entra ID with Microsoft Authenticator.

Microsoft Dev Tunnels: Tunnelling C2 and More

In this post, we take a look at Microsoft Dev Tunnels, how they're abused by threat actors, and how you can detect their usage