Security Review #246

February 21, 2025

Very Beta: if you run this and it eats your dog, it's still not my fault

— Mike Loss

Starred Articles

The Art of Breaking AI: Exploitation of large language models

In this post, we will see how attackers can manipulate LLM inputs, exploit logic flaws, or abuse AI features to gain unauthorized access, steal data, or compromise systems. We will focus on prompt injection, excessive agency, sensitive information disclosure and improper output handling vulnerabilities.

Reinventing PowerShell in C/C++

In this blog post, I demonstrate how every single security feature of PowerShell can be defeated using native code instead of the higher-level .NET framework. I provide examples showing the proof-of-concept on a machine running a top-tier EDR agent with no detection of the memory patching.

RANsaked

We discover 119 vulnerabilities in LTE/5G core infrastructure, each of which can result in persistent denial of cell service to an entire metropolitan area or city and some of which can be used to remotely compromise and access the cellular core. Our research covers seven LTE implementations (Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC, srsRAN) and three 5G implementations (Open5GS, Magma, OpenAirInterface)

GymTok: Breaking TLS Using the Alt-Svc Header

This article explores how the Alt-Svc header can be abused to setup a man-in-the-middle, first step of a cross-protocol attack leveraging compression and certificate reuse between different protocols (HTTP and FTP) to eventually break TLS encryption.

New Articles

Writing a Ghidra processor module

In this article we will create a Ghidra processor module for the iRISC processors, these processors are embedded in the ConnectX series of NICs from NVIDIA/Mellanox.

ROPing our way to RCE (CVE-2022-45460)

In this article, we develop an exploit for an RCE vulnerability in XiongMai's uc-httpd, a lightweight web server used in countless IP cameras worldwide (CVE-2022-45460).

Being Overlord on the Steam Deck with 1 Byte

This blog post aims to showcase a couple of bugs affecting Valve's Steam Deck and generally various devices running on AMD. Some of the primitives induced by these bugs are very limited and offer a good playground to work on exploitation techniques.

Exploiting LibreOffice (CVE-2024-12425 and CVE-2024-12426)

This is a write-up of CVE-2024-12425 and CVE-2024-12426, two vulnerabilities in LibreOffice which respectively allow an attacker to write to a semi-arbitrary file in the filesystem, and remotely extract values from environment variables and from INI-like files in the filesystem.

NVIDIA AI vulnerability: Deep Dive into CVE 2024-0132

We detail a critical security vulnerability, tracked as CVE-2024-0132, in the widely used NVIDIA Container Toolkit. The vulnerability enables attackers who control a container image executed by the vulnerable toolkit to escape from the container's isolation and gain full access to the underlying host.

Baseline Analysis in Memory Forensics: A Practical Guide

This article will discuss baseline analysis, a crucial technique in memory forensics, enabling rapid identification of suspicious activity by filtering known good artifacts. We will also see how Memory Baseliner simplifies this process, providing efficient comparisons between suspect and clean memory images.

MFTECmd-MFTexplorer: A Forensic Analyst's Guide

When it comes to forensic tools, MFTECmd.exe is one of my go-to choices. It's part of the KAPE suite and an incredibly efficient tool for parsing NTFS artifacts like $MFT, $J, $Boot, $SDS, and $I30. While I've always relied on it, many have requested a detailed guide, so here we are.

Revisiting ShellBags in Windows 11

In this post, I want to explore if there are any specifics in how Windows 11 records ShellBags for common user operations within Windows Explorer, with a specific focus on timestamps that indicate user interactions with directories, i.e. "FirstInteracted" and "LastInteracted" fields.

Exposing Hidden Malware Persistence Created by SharpHide

Malware persistence remains one of the most challenging aspects of cybersecurity. In this article, I explore how threat actors have leveraged a modified version of SharpHide to create hidden registry values which takes advantage of Windows registry redirection, complicating detection and deletion efforts.

Advanced KQL for Threat Hunting: Window Functions - Part 1

Window functions are one of the powerful methods for data analysis. In this post, I will briefly explain two KQL (Kusto Query Language) window functions, prev() and next(), and how to use them for threat hunting.

Shadow Credentials Attack

In this post, we explore the exploitation technique known as the Shadow Credentials attack. This attack leverages the mismanagement or exploitation of Active Directory Certificate Services (AD CS) to inject custom certificates into a user account, granting attackers persistent access.

Further insights into Ivanti CSA 4.6 vulnerabilities exploitation

We share a detailed root causes analysis for CVE-2024-8963 (likely covering CVE-2024-9381 as well), as a path traversal vulnerability in Ivanti CSA, enabling remote unauthenticated attacker to access restricted functionality.

Defying tunneling: A Wicked approach to detecting malicious network traffic

We will delve into the world of tunneling techniques commonly used by adversaries to identify exactly how common some of the major tunneling providers are for various threat actors. We'll also explore another technology often used alongside tunnels: dynamic DNS hostnames.

Don't Ghost the SocGholish: GhostWeaver Backdoor

In this article, we will cover the infection chain observed with SocGholish, also being tracked as FakeUpdates. Detection rules and indicators of compromise will be included at the end of the article.

How Overflow in wtoi leads Attackers to bypass AV/EDR

I came across a technique that allows bypassing Windows Defender's detection mechanisms specifically designed to identify LSASS (Local Security Authority Subsystem Service) dumps. My investigation aims to shed light on its implications and understand why it has not been addressed in the current iteration of the operating system.

PowerShell Exploits - Modern APTs and Their Malicious Scripting Tactics

This blog will go through the methods to bypass AMSI, both theoretically in detailed and practically, with three simple yet effective PowerShell command lines. We'll also cover how to abuse .NET capabilities to run PowerShell commands without actually using PowerShell itself, as well as how to evade detection using tools like Invoke-Obfuscation.

ChatGPT Operator: Prompt Injection Exploits & Defenses

ChatGPT Operator is a research preview agent from OpenAI that lets ChatGPT use a web browser. This post explores how it can be hijacked through prompt injection exploits on web pages, leading to unauthorized data leakage of personal information.

Microsoft Edge Developer VM Remote Code Execution

I found a way to execute any code on the VirtualBox Windows 10 variant of the Microsoft Edge Developer VM, an image that Microsoft published to test out your website with different versions of Edge or Internet Explorer.

Arechclient2 Malware Analysis (sectopRAT)

Arechclient2, also known as sectopRAT, is a Remote Access Trojan (RAT) written in .NET. This malware is highly obfuscated using the calli obfuscator, making its analysis challenging. Despite attempting deobfuscation using calliFixer, the code remained obfuscated but was still somewhat readable using dnSpy.

Achieving RCE in famous Japanese chat tool with an obsolete Electron feature

In this article, I detail a remote code execution vulnerability that chains multiple problems in Chatwork, a popular communication tool in Japan. Specifically, I explain how I leveraged an obsolete feature of Electron to escalate to the preload context.

Ivanti Endpoint Manager Vulnerabilities: Critical CVEs & Exploit Details

We discovered four critical vulnerabilities in Ivanti Endpoint Manager (EPM) allowing an unauthenticated attacker to coerce the Ivanti EPM machine account credential to be used in relay attacks, potentially allowing for server compromise.

The Cat and Mouse Game: Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions

We describe, in very general terms, how we were able to evade detection by taking advantage of statistical anomalies in the human interaction modules of several sandbox solutions. We provide an alternative algorithm for simulated mouse human interaction, including its specifications, parameters, source code, and several visual demonstrations.

Exploring NTDS.dit - Part 1: Cracking the Surface with DIT Explorer

NTDS.dit is the file housing the data for Windows Active Directory (AD). In this blog post, I'll be diving into how the file can be accessed nd how it is organized. I will also walk through DIT Explorer, an open-source tool used to search NTDS.dit and show how it makes sense of this database to present a view of the directory.

LSA Secrets: revisiting secretsdump

secretsdump.py allows retrieving specific secrets in the registry from a targeted computer, but it also allows performing DCSync operations when targeting a domain controller. This blogpost will focus only on the remote registry part, without using the vssadmin approach.

Dropping a 0 day: Parallels Desktop Repack Root Privilege Escalation

I am disclosing a 0-day vulnerability that bypasses the patch for CVE-2024-34331, a vulnerability abusing Parallels Desktop's trust in macOS installers, gaining local privilege escalation. I have identified two distinct methods to circumvent the fix.

Don't Touch That Object! Finding SACL Tripwires During Red Team Ops

This article introduces SACL_Scanner, a tool designed to aid in identifying the configured trip flares so we can avoid them. Currently, it will scan for SACLs on three local Windows securable objects and AD: registry keys, services, files/directories, and AD objects.

Still Recent

We are ARMed no more ROPpery Here

In this blog post, we will delve into the design and functionality of ARM Pointer Authentication, exploring how it mitigates a variety of attack vectors, such as buffer overflows and control flow hijacking. We will also discuss its practical applications and the unique advantages it offers in environments that demand a balance between performance, size, and robust protection.

Oldies but Goodies

Mastering Windows Access Control: Understanding SeDebugPrivilege

SeDebugPrivilege is a special privilege that when assigned gives a token high integrity. This privilege is often used in offensive tooling because it is known to pass over certain Windows access checks. Let's dive into this a bit more in-depth.

Detecting AiTM Phishing and other ATO Attacks

Detecting cloud account takeover (ATO) and adversary in the middle (AiTM) attacks can sometimes be difficult. In this blog, I'll explain how we can develop a generic detection that covers almost any, if not all, methods for Entra ID (Azure AD). The method can be applied to other identity providers, too.

Mitigating Attack Vectors in GitHub Workflows

This document provides an overview of the most common attack vectors on GitHub workflows and recommendations on how to secure them. In particular, it covers: running untrusted code in privileged workflows, code injections, vulnerable actions, malicious releases, tag-renaming attacks, imposter commits, and unsafe use of caches.

Make a COFFee relax and bypass AMSI

This blog post presents a development method that can be leveraged by malicious actors in order to create and execute payloads. We will analyse the COFF file and how a COFF loader works through an example of AMSI byte patching technique which implemented as a COFF object.

Unearthed Arcana

Malware Detection Using Yara And YarGen

Malware can often be detected by scanning for a particular string or a sequence of bytes that identifies a family of malware. Yara is a tool that helps you do that. In this article, we will see how to generate Yara rules used to search for specific patterns in files that might indicate that the file is malicious.

SassyKitdi: Kernel Mode TCP Sockets + LSASS Dump

This post describes a kernel mode payload for Windows NT called "SassyKitdi" (LSASS + Rootkit + TDI). This payload is of a nature that can be deployed via remote and local kernel exploits, and is universal from (at least) Windows 2000 to Windows 10, and without having to carry around weird DKOM offsets.