Security Review #243

January 31, 2025

Ever failed. No matter. Try again. Fail again. Fail better.

— Samuel Beckett

Starred Articles

World's First MIDI Shellcode

I gained remote code execution via MIDI messages to trick my synth into playing Bad Apple on its LCD. This blog post is about my journey with this reverse engineering project.

Fun with Timing Attacks

In this article, we explain how timing attacks work, using a function that checks if a user input matches a secret as an example. We will demonstrate how an attacker can guess a secret by timing multiple calls to the function and analyzing the results.

Flickr's API Signature Forgery Vulnerability

We describes a vulnerability in the Flickr's signing process that allows an attacker to generate valid signatures without knowing the shared secret. By exploiting this vulnerability, an attacker can send valid arbitrary requests on behalf of any application using Flickr's API.

New Articles

OneDrive Forensics : Investigating Cloud Storage on Windows Systems

Microsoft OneDrive is the most widely used cloud storage service, thanks to its default integration in Windows and its enterprise adoption via Microsoft 365. Understanding OneDrive forensic artifacts is crucial for investigations involving data exfiltration, insider threats, or deleted cloud files.

Investigating OneDrive for Business: Advanced Forensics & Audit Logs

Microsoft OneDrive for Business is a powerful enterprise cloud storage solution, distinct from the personal OneDrive available by default on Windows. With Microsoft 365 integration, extensive logging, and advanced security controls, it provides rich forensic opportunities for investigators.

Yara Rules - Part 4: Malware Detection with YARA

In this fourth part of the series, we will use YARA in order to hunt for malware indicators. We will write basic rules, execute targeted searches and eventually understand the fact that hunting is not done by randomly clicking around but a well thought out, very deliberate process.

Yara Rules - Part 7: Detecting Sandboxes with YARA

By leveraging tools like Sysmon and YARA, cybersecurity analysts can effectively detect and respond to malicious activities, even when attackers use advanced techniques like obfuscation or sandbox evasion.

Seasoning email threats with hidden text salting

In this article, we explain hidden text salting, a simple yet effective technique for bypassing email parsers, confusing spam filters, and evading detection engines that rely on keywords. The idea is to include some characters into the HTML source of an email that are not visually recognizable.

Entra ID Destruction: How Attackers Leverage User.DeleteRestore.All

This blog delves into how attackers can use overprovisioned permissions like User.DeleteRestore.All. By strategically deleting and restoring user accounts, attackers can disrupt operations, evade detection, and establish long-term persistence.

Exploring WinRM plugins for lateral movement

In this blog, we explore how to leverage WinRM plugins to perform lateral movement to other systems. We also take a look at how the CIM_LogicFile WMI class can be used to bypass some tricky detections by Microsoft Defender.

ETW Threat Intelligence and Hardware Breakpoints

In this blog, we will explore which functions create hardware breakpoints abuse ETW events with a kernel debugger, and an alternative method to set up hardware breakpoints to hook functionality without creating the same ETW TI events.

Targeted supply chain attack against Chrome browser extensions

This blog post provides an overview of the supply chain attack, detailing the targeted phishing attacks and the malicious code added to the compromised extensions. Additionally, it shares insights into the adversary's infrastructure, as well as recommendations for remediation and Indicator of Compromise (IoCs).

Understanding ESXi Ransomware: SSH Tunneling and Defense Strategies

ESXi ransomware attacks target virtualized infrastructures using SSH tunneling to remain undetected. In this article, we will detail the techniques, forensic insights, and actionable defense strategies to protect your ESXi appliances from evolving threats.

Clone2Leak: Your Git Credentials Belong To Us

In this article, I write about the series of vulnerabilities that I found on Git-related projects, leading to credentials leak. As we will see, text-based protocols are often vulnerable to injection, and a small architecture flaw can lead to a big security issue.

Get FortiRekt, I Am The Super_Admin Now

A vulnerability resides within the FortiOS' jsconsole functionality, which is a GUI feature to execute CLI commands inside the management interface. Specifically, the weakness in this functionality allowed attackers to add a new administrative account.

Debugging An Undebuggable App

It's not uncommon for iOS apps to include additional protections to keep prying eyes away - like jailbreak detection or code obfuscation. Let's take a look at each of these protections one-by-one, and figure out how to circumvent them.

The J-Magic Show: Magic Packets and Where to find them

We have been tracking the use of a backdoor attack tailored for use against enterprise-grade Juniper routers. This backdoor is opened by a passive agent that continuously monitors for a "magic packet", sent by the attacker in TCP traffic. In this article, we provide technical details of these packets.

CVE-2024-26230: Windows Telephony Service

CVE-2024-26230 is a critical vulnerability found in the Windows Telephony Service (TapiSrv), which can lead to an elevation of privilege on affected systems. In this blog post, we will take an in-depth look at how this vulnerability works, how it can be exploited, and the mitigation strategies that can help defend against it.

SUSCTL: CVE-2024-54507

We detail CVE-2024-54507, a memory leak vulnerability in MacOS kernel, caused by an interger type confusion in XNU kernel at sysctl load.

Process Hollowing on Windows 11 24H2

Process Hollowing (a.k.a. RunPE) is probably the oldest, and the most popular process impersonation technique. Loading of the PE on Windows 11 24H2 gets now interrupted. In this short blog I describe my findings, in hopes that it will help other people who experienced the same issue.

Unmasking SparkRAT: Detection & macOS Campaign Insights

SparkRAT malware provides modular design, web-based user interface, and cross-platform support for Windows, macOS, and Linux systems. In this post, we will share techniques on detecting SparkRAT servers in the wild, and examine an extension of a suspected DPRK campaign targeting macOS users.

Best practices for key derivation

This post covers best practices for using Key Derivation Functions (KDF)s, including specialized scenarios that require careful treatment of key derivation to achieve the desired security properties.

Technical Analysis of Xloader Versions 6 and 7 - Part 1

Xloader is a malware family with information stealing capabilities targeting web browsers, email clients, and File Transfer Protocol (FTP) applications. The malware is also able to deploy second-stage payloads to an infected system. This first part of the series will cover the malware's latest obfuscation techniques to evade detection and hinder analysis.

A Missed Opportunity: Addressing Weak Password Hashing in VxWorks

This blog post covers a recently identified security vulnerability in the Wind River VxWorks operating system. The vulnerability lies in the use of weak password hashing algorithm, prone to collision.

CVE-2024-49138 Windows CLFS heap-based buffer overflow analysis - Part 2

In this second article, we will focus on another heap overflow vulnerability covered by CVE-2024-49138, located in the WriteMetadataBlock() function of Windows clfs.sys. We will also detail the steps to write a functioning PoC.

CVE-2024-46507: Yeti Platform Server-Side Template Injection (SSTI)

Yeti is a Forensic Intelligence platform and pipeline for DFIR teams. In this blog post, I will detail 2 security flaws that, if used in conjunction, could lead to unauthenticated remote code execution on the application server. These vulnerabilities are an SSTI (CVE-2024-46507) and use of static insecure secret (CVE-2024-46508).

Modifying Certipy to Evade Microsoft Defender for Identity PKINIT Detection

In this article we provide a detailed walkthrough of modifying the PKINIT implementation in Certipy to evade Microsoft Defender for Identity (MDI) detections by changing the encryption types advertised in the AS-REQ messages.

Jigsaw RDPuzzle: Piecing Attacker Actions Together

The RDP bitmap cache can provide valuable context to a investigation. Reconstructed screen fragments can uncover concrete actions that are not logged or directly evident from the analysis of other sources (e.g., Windows event logs).

DOMPurify 3.2.3 Bypass (Non-Default Config)

I found a bypass in DOMPurify which allows for sanitized HTML to cause XSS. It relies on a trick that makes it possible to have both comments and HTML elements in the <style> tag to mutate the anchor tag in.

Monitor For New Actions In Sentinel And MDE

This blog will explain and share a solution to get weekly reports on all the newly logged actions in Sentinel and Defender For Endpoint that are found in your tenant. This proactive approach helps to understand your data and enables organizations to identify patterns, anomalies, and potential indicators of compromise.

CVE-2024-46506: Unauthenticated RCE in NetAlertx

The NetAlertX web component is developed in a combination of PHP and Python and can be deployed in a docker container. In this blog post, I will be discussing 2 vulnerabilities: an unauthenticated command injection (CVE-2024-46506) and an unauthenticated file read (CVE-2024-48766).

Custom bloodhound queries for Active Directory

This blog post has given you a short overview of how custom queries can be used to get the most out of BloodHound. We will specifically focus on finding specific configurations such as inactive objects, cross domain group memberships, local admin rights, protected users and path to untagged Tier Zero.

ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator

In this blog post, we present our in-depth analysis of the ScatterBrain obfuscator, which has led to the development of a complete stand-alone static deobfuscator library independent of any binary analysis frameworks.

Still Recent

LOLBIN / LOLBAS - WinGet execute PowerShell script

In this article, I will provide a brief overview of the Windows Package Manager - WinGet. Following that, I will demonstrate how to use WinGet as a transit station to execute living off the land PowerShell scripts.

Make Bloodhound Cool Again: Migrating Custom Queries from Legacy BloodHound to BloodHound CE

Migrating custom queries from the legacy BloodHound to the new BloodHound Community Edition (CE) can seem daunting, but with the right steps, it can be a smooth process. In this post, we'll walk through the steps to download, transform, and upload your custom queries to BloodHound CE.

Exploring Heap Exploitation Mechanisms: Understanding the House of Force Technique

By exploring concepts like chunk metadata manipulation, wraparound calculations, and malloc hook exploitation, we highlight the foundational principles of heap exploitation. Although techniques like the House of Force are no longer effective in many modern systems, they serve as a stepping stone for understanding more advanced and creative exploitation methods.

Testing JavaScript files for bug bounty hunters

This article is all about the importance of testing and examining JavaScript files for bug bounty hunters. We will guide you on what exactly to look for and provide examples of the most common vulnerabilities (and patterns that lead to vulnerabilities) in JavaScript files.

Abusing AD-DACL: AddSelf

In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the AddSelf permission in Active Directory environments. By exploiting this misconfiguration, attackers can escalate privileges by adding themselves to privileged groups like Domain Admins or Backup Operators.

Oldies but Goodies

Brainstorm Tool Release: Optimizing Web Fuzzing With Local LLMs

We introduce Brainstorm, a web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery. It combines traditional web fuzzing techniques (as implemented in ffuf) with AI-powered path generation to discover hidden endpoints, files, and directories in web applications.

Unveiling Rhino's Blind Spot: Exploiting Custom Code Execution in Apigee

We detail a vulnerability in Apigee, a Google API management platform. The vulnerability lies in how Apigee manages custom code execution across different policies, as it creates an unexpected path to bypass sandbox restrictions. Exploitation of the vulnerability can lead to system compromise or data exfiltration.

Bluetooth Auracast - Part 1: a Security Researcher's Perspective

The goal of this first of two blog posts is to provide a general technical overview of Bluetooth Auracast. As we are mainly interested in the security of the protocol, the post will be from a security researcher's perspective.