Security Review #245

February 14, 2025

If you're not having fun, you're not learning. There's a pleasure in finding things out.

— Richard Feynman

Starred Articles

Using XSS filters against XSS filters - Unexpected SQL Injection

In this article we identify and exploit a vulnerability in SuiteCRM that allows to bypass application security filter and exploit several SQL injection vulnerabilities (CVE-2024-36408, CVE-2024-36409, CVE-2024-36410, CVE-2024-36411, CVE-2024-36412).

How We Hacked a Software Supply Chain for $50K

This article details an advanced software supply chain attack we found by targeting a subsidiary of a major company. By leveraging poorly secured Docker images and extracting sensitive tokens, we managed to infiltrate the subsidiary's systems and demonstrated the ability to compromise developers, CI/CD pipelines, and production servers.

Hacking Gemini's Memory with Prompt Injection and Delayed Tool Invocation

Delayed Tool Invocation means that the attacker "pollutes" the chat context with instructions and a trigger action. It is a bit of a social engineering/phishing attack but nevertheless shows that an attacker can trick Gemini to store false information into a user's long-term memories simply by having them interact with a malicious document.

Psexec'ing the right way and why zero trust is mandatory

In this blog post, we'll have a glimpse at how PsExec.exe works, we'll write a python script that allows us to act as a legitimate PsExec.exe client and finally, we'll see why zero trust is a core requirement of cybersecurity.

whoAMI: A cloud image name confusion attack

We identified a pattern in the way multiple software projects were retrieving Amazon Machine IDs (AMIs) to create EC2 instances, and discovered how attackers could exploit it. The vulnerable pattern allows anyone that publishes an AMI with a specially crafted name to gain code execution within the vulnerable AWS account.

New Articles

Windows Telephony Services: 2025 Patch Diffing & Analysis - Part 1

In this series, we will look for common patterns for the 20+ heap-based buffer overflows vulnerabilities found in Windows Telephony Services. This first part will focus on understanding TAPI and its underlying architecture.

Jooki - Taking Control of a Forgotten Device

This blog post is about Jooki, an intuitive, screen-free audio player. We will be peeling back the layers of its firmware, finding hidden exploits, a backdoor and unlocking code execution.

Return of the Windows Kernel Stack Overflow

In this tutorial we're going back to Stack Overflow. However, this time we'll be encountering an exploit mitigation known as stack cookies or canaries and see how it can be bypassed.

NanoCore RAT Malware Analysis

is a well-known Remote Access Trojan (RAT) used by threat actors for espionage, data theft, and system control. In this post, I will perform static and dynamic analysis of a sample, and explore its behavior, obfuscation techniques, and deobfuscation process.

Box Cloud Storage Forensic Investigations: Logs, Cached Files, and Metadata Analysis

Box is one of the most forensic-friendly cloud storage applications, offering extensive logging, locally cached files, and SQLite databases that track user activity and file metadata. This makes it a goldmine for forensic investigators looking to analyze user interactions, deleted files, and cloud-stored documents.

Metadata Investigation(Exiftool): A Powerful Tool in Digital Forensics

Metadata is a goldmine of information in digital forensics, offering insights that go far beyond surface-level data. In this article, we will see how tools like Exiftool make it easy to extract and analyze metadata, empowering investigators to solve cases ranging from intellectual property theft to cyberattacks.

CVE-2023-6080: A Case Study on Third-Party Installer Abuse

We exploited flaws in the Microsoft Software Installer (MSI) repair action of Lakeside Software's SysTrack installer to obtain arbitrary code execution (CVE-2023-6080). An attacker with low-privilege access to a system running the vulnerable version of SysTrack could escalate privileges locally.

Using capa Rules for Android Malware Detection

In this blog post, we will describe how we leverage capa behavior-detection capabilities and state-of-art Gemini summarization to detect capabilities observed in Android malware. we will showcase a malware sample analysis, explain how capa rules identify and highlighted malicious behaviors and present how Gemini summarizes the highlighted code for security reviews.

"LegionLoader" exposed !

LegionLoader, also known as Satacom, CurlyGate, and RobotDropper, is an active downloader that has been operating in the shadows. In this post, we'll break down everything we've uncovered so far (including: list of IoCs, phishing url, IDAPython script etc.).

Go Supply Chain Attack: Malicious Package Exploits Go Module Proxy Caching for Persistence

We have discovered a malicious typosquat package in the Go ecosystem, impersonating the widely used BoltDB database module. The malicious package contains a backdoor that enables remote code execution, allowing a threat actor to control infected systems via a command and control (C2) server.

Build Your Own Offensive Security Lab A Step-by-Step Guide with Ludus

In this guide, I'll walk you through my experience with Ludus and demonstrate how to build a red team lab using this tool - the simplest and most efficient method I've discovered so far. The lab will feature an Active Directory environment (using GOAD) integrated with an XDR/SIEM solution (Wazuh).

Endless Exploits: The Saga of a macOS Vulnerability Struck Nine Times

I discovered an interesting logic vulnerability in the PackageKit framework on macOS that allows for escalating privileges to root, circumventing the Transparency Consent and Control (TCC), and bypassing the System Integrity Protection (SIP).

How auto-generated passwords in Sitevision leads to signing key leakage

CVE-2022-35202 is a security issue in Sitevision that allows a remote attacker, in certain (non-default) scenarios, to gain access to the private keys used for signing SAML Authn requests. The underlying issue is a Java keystore that may become accessible and downloadable via WebDAV. This keystore is protected with a low-complexity, auto-generated password.

CVE-2025-0693: AWS IAM User Enumeration

We discovered two username enumeration vulnerabilities in the AWS Web Console. The findings we'll detail here, result from bugs in Amazon's credential verification software and put all console-enabled IAM users at risk of username enumeration.

Fault Injection - Part 2: Looking for a Unicorn

When talking about glitches and fault injection, a theoretical hardware is often hypothesized that, due to its speed and precision, would allow to perform a glitch that affects a single bit, but this model is considered an unattainable unicorn. In this article we will start "looking for such unicorn", and check if this type of attack is feasible in pratice.

Leak HTTP Requests through Service Worker and XSS

By chaining XSS with a malicious Service Worker, an attacker can achieve persistent request interception & data exfiltration. Since Service Workers remain active even after the XSS is removed, this technique can be difficult to detect and mitigate.

Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108)

This is the story of how we discovered a zero-day auth bypass in the PAN-OS management interface (CVE-2025-0108). We will explore a suspicious (and quite common) architecture where authentication is enforced at a proxy later, but then the request is passed through a second layer with different behavior.

5 Ways to hack WordPress targets

In this article, we will cover several ways to identify security vulnerabilities in WordPress targets: enumerating outdated instances, exposed configuration files, misconfigured security settings, weak credentials, and exploiting vulnerable WordPress plugins and themes.

RATatouille: Cooking Up Chaos in the I2P Kitchen

We investigate I2PRAT, a multi-stage RAT (Remote Access Trojan). We cover the various techniques identified during its reverse engineering. These techniques range from defense evasion, to privilege escalation, and include dynamic API resolution. We also analyze how it employs the I2P network to anonymise its final Command and Control (C2).

Still Recent

Decompiling Apps With AI Language Models

This post covers a novel approach for recovering application source code, leveraging AI language models to transform pseudo-disassembly into high-level source code. This method is able to handle complex abstractions introduced in high-level languages SwiftUI or Dart and generates output in popular programming languages like Swift, C#, Kotlin, Java, Python or even Bash.

Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293)

In this article, we explore explores the discovery of a vulnerability in the "Network Configuration Operators" group in Active Directory. This group has excessive permissions, including the ability to create subkeys in sensitive registry keys. By exploiting these permissions and leveraging Performance Counters an attacker could run code with elevated privileges.

The Key to COMpromise - Part 2: Abusing a TOCTOU race to gain SYSTEM

COM hijacking presents an opportunity to load a malicious DLL into the process. This attack vector allows us to exploit the security product's inherent trust in its own processes. In this post, we will delve into how we exploited this trust in AVG Internet Security (CVE-2024-6510) to gain elevated privileges.

Oldies but Goodies

White-box pentesting: How to debug JavaScript

This is a guide to performing white box penetration testing on a JavaScript web application running within a Docker container. In testing a web application vulnerable to prototype pollution, we will demonstrate how to debug JavaScript inside Visual Studio Code in order to track our payloads throughout the code process and learn how security filters can hide vulnerabilities from view.

DDoS Protection Rules

There are different ways of building your own anti-DDoS rules for iptables. We will be discussing the most effective iptables DDoS protection methods in this comprehensive tutorial.