Security Review #250

March 21, 2025

Theory is when you know something, but it doesn't work. Practice is when something works, but you don't know why. Programmers combine theory and practice: Nothing works and they don't know why.

— Unknown

Starred Articles

Process Herpaderping - The Road Less Travelled

This article details process Herpaderping, a powerfull security bypass technique that disguises malicious execution by making the process appear different in memory than on disk, confusing security software.

Off the Beaten Path: Recent Unusual Malware

We analyze several new malware samples with unique characteristics: a passive Internet Information Services (IIS) backdoor, a bootkit that uses an unsecured kernel driver to install a GRUB 2 bootloader, and a Windows implant of a cross-platform post-exploitation framework.

ADCS. So u got certificate. Now i've got nine ways to abuse it.

You are more likely to get a certificate during ADCS exploitation. However, what are the options for using it? My article about it. Besides the basic ways to get a TGT ticket, you will learn about the ability to intercept encrypted HTTPS traffic, code signing, and even SSH authentication.

New Articles

CVE-2025-1767 - Another gitrepo issue

CVE-2025-1767 is a Kubernetes security vulnerability in the gitRepo volume type. It can allow users who can create pods with gitRepo volumes to get access to any other git repository on the node where the pod is deployed.

Firefox Cache: A Forensic Perspective include parsing

Firefox cache can be a goldmine of evidence. This cache stores web pages, images, and files locally to improve browsing speed, providing forensic investigators with a window into the user's browsing history and downloaded content.

Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts

In this article, we provide a detailed analysis of Windows Sandbox. We explore its features, abusing techniques, forensic investigation methods, and defence strategies.

AnyDesk - Investigating Threat Actors Favorite Tool

AnyDesk is a Remote Monitoring and Management (RMM) tool that Threat Actors love to abuse. This article discusses what AnyDesk is, why Threat Actorss love to use it, and how to investigate artifacts associated with the tool.

Detecting attacks based on TCP Flags (DDOS, SYN Flood, and others)

This article details the different flags that are available in TCP packets and summarizes the different detections that can be made based on their usage by malicious tools.

AWS SNS Abuse: Data Exfiltration and Phishing

This article will dive into both how threat adversaries (TA) leverage AWS' Simple Notification Service (SNS) and how to hunt for indicators of abuse using that data source.

Introduction to YARA

YARA is an essential tool for security professionals looking to identify and classify malware samples based on textual or binary patterns. This article details what makes YARA so powerful, and how can you start leveraging it in your security workflows.

New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects

We uncovered a new variant of XCSSET, a sophisticated modular macOS malware that infects Xcode projects. This variant features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies. In this blog, we discuss how this variant's different modules work together in achieving the malware's goals.

GitHub Action tj-actions/changed-files supply chain attack

A supply chain attack on popular GitHub Action tj-actions/changed-files caused many repositories to leak their secrets. Discover how it unfolded and the steps to mitigate the risk.

SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries

We detail the SAMLStorm, a vulnerability that affects the xml-crypto Node.js library (CVE-2025-29775 & CVE-2025-29774). This flaw allows attackers to forge SAML authentication responses. If exploited, this vulnerability could enable full account takeovers across organizations relying on SAML-based single sign-on (SSO).

Bypassing Authentication Like It's The '90s - Pre-Auth RCE Chain(s) in Kentico Xperience CMS

We found 3 vulnerabilities in Kentico's Xperience CMS: two autentication bypasses, and a post-authentication remote code execution. In this article, we'll take you on our journey that allowed us to build exploit chains to achieve Remote Code Execution against (at the time) fully patched Kentico Xperience CMS deployments.

CVE-2025-24016: Unsafe Deserialization Vulnerability in Wazuh Leading to Remote Code Execution

CVE-2025-24016 is a critical remote code execution (RCE) vulnerability affecting Wazuh, a widely used open-source security information and event management (SIEM) platform. This vulnerability stems from unsafe deserialization of DistributedAPI (DAPI) parameters, allowing an attacker with API access to execute arbitrary Python code on the Wazuh server.

CVE-2025-25599: A Cautionary Tale of Insecure Temporary Files

Investigating Bolt, an open-source content management system, we found that temporary files are used insecurely when uploading an avatar from a URL, leading to arbitrary file disclosure (CVE-2025-25599).

Domain-Level RCE in Veeam Backup & Replication (CVE-2025-23120)

In this blog post, we will show you 2 Remote Code Execution vulnerabilities in the Veeam Backup & Response solution, which are based on deserialization gadgets existing in the Veeam codebase. These vulnerabilities can be exploited by any user who belongs to the local users group on the Windows host of your Veeam server.

SAML roulette: the hacker always wins

In this post, we'll show precisely how to chain round-trip attacks and namespace confusion to achieve unauthenticated admin access on GitLab Enterprise by exploiting the ruby-saml library.

ClearFake's New Widespread Variant: Increased Web3 Exploitation for Malware Delivery

ClearFake is a malicious JavaScript framework deployed on compromised websites to deliver malware through the drive-by download technique. This article aims to provide a technical analysis of ClearFake's latest variant, focusing primarily on the interactions with the Binance Smart Chain

OpenResty/lua-nginx-module HTTP Request Smuggling in HEAD requests - CVE-2024-33452

In this blog post, I'll break down the technical details of CVE-2024-33452, an HTTP request vulnerability in the OpenResty module of Nginx. I will a review its impact, and the attack scenarios it enables, such as XSS distribution to all web clients, front-end proxy protection bypass, or theft of other users data.

Pre-authentication SQL injection to RCE in GLPI (CVE-2025-24799/CVE-2025-24801)

The inventory feature in GLPI is vulnerable to an unauthenticated SQL injection (CVE-2025-24799). By exploiting this vulnerability, it is possible to obtain a valid GUI session, then exploit a local file inclusion vulnerability using the PDF export feature and achieve remote code execution on vulnerable instances (CVE-2025-24801).

Bypassing Windows Defender Application Control with Loki C2

We successfully bypassed Windows Defender Application Control (WDAC) and executed our Stage 2 Command and Control (C2) payload using the following techniques: use a known LOLBIN, DLL side-load a trusted application with an untrusted DLL, exploit custom exclusion rule, and finally find a new execution chain in a trusted application that allows C2 deployment.

CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File

When a specially crafted .library-ms file containing an SMB path is compressed within a RAR/ZIP archive and subsequently extracted, Windows Explorer automatically parses the contents of this file. Attackers exploit this implicit trust and automatic file processing behavior to leak credentials, which can then be utilized for pass-the-hash attacks or offline NTLM hash cracking.

StilachiRAT analysis: From system reconnaissance to cryptocurrency theft

We provide a technical analysis of a novel remote access trojan (RAT) we named StilachiRAT that demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data.

Are Attackers "Passing Though" Your Azure App Proxy?

This article details how Azure app proxy pre-authentication set to Passthrough may unintentionally expose private network resources.

Privilege Escalation in Plantronics Hub

The blog post describes how an unquoted search path vulnerability in the Plantronics Hub could result in OpenScape being used to execute arbitrary files under C:\, if incorrect permissions are assigned to that path. This attack also escalates privileges to the local administrator if an administrator starts the OpenScape application.

!exploitable - Part 3: Devfile Adventures

We will dive into the exploitation of CVE-2024-0402 in GitLab. Like an onion, there is always another layer beneath the surface of this bug, from YAML parser differentials to path traversal in decompression functions in order to achieve arbitrary file write in GitLab.

Linux kernel hfsplus slab-out-of-bounds Write

We provide technical analysis of CVE-2025-0927, an out-of-bounds write vulnerability in the HFS+ driver of the Linux kernel that achieves local privilege escalation. We also define the exploitation strategy and provide a PoC exploit.

Leaking Passwords (and more!) on macOS

This article discusses CVE-2024-54471, a vulnerability in MacOS. It allows unauthorized processes to exploit a specific service, NetAuthAgent, to access sensitive credentials like file server passwords stored in the macOS Keychain.

Diving Into JumpServer: Attacker's Gateway to Internal Networks - Part 1

Jumpserver is an open-source Privileged Access Management (PAM) tool. In this article, we will focus on the authentication bypass vulnerabilities (CVE-2023-43650, CVE-2023-43652, CVE-2023-42818, CVE-2023-46123), which allow attackers to impersonate users and pave the path for exploiting subsequent vulnerabilities.

CVE-2024-53991 - Discourse Backup Disclosure: Rails send_file Quirk

In this blog, we explore CVE-2024-53991, a vulnerability due to a subtle yet impactful interaction between Rack/Rails and Nginx that can inadvertently expose restricted endpoints. Specifically, we examine how the send_file method, when paired with certain Nginx configurations, can bypass access controls under specific conditions, turning a security feature into a potential attack vector.

From Zero to Hero: Hunting High-Paying Open Redirect Bugs in Web Apps

Open Redirect vulnerability is a common security flaw that allows attackers to redirect users to malicious websites. This vulnerability occurs when a web application accepts user input for URLs without proper validation or control. This is a step-by-Ssep guide to discover and exploit such bugs.

Still Recent

Domain Generation Algorithms (DGA): Definition and Impact

DGAs generate many domain names dynamically to be communication points for malware, and are a big challenge to cybersecurity. This article explains how DGAs work and how they can be mitigated using advanced detection methods such as DNS traffic analysis, entropy analysis, and machine learning.

Ungarble: Deobfuscating Golang with Binary Ninja

In this blog post we explore using Binary Ninja and emulation to address obfuscation implemented by an open source obfuscator named Garble that is used by red team operators and malware authors to inhibit reverse engineering efforts.

C2 Beaconing Detection with MDE Aggregated Report Telemetry

Microsoft has recently introduced a new telemetry feature in Defender for Endpoint: Aggregated Reports. This new telemetry provides new opportunities for detecting malicious activities. In this post, I will demonstrate how we can leverage Aggregated Reports to identify C2 beaconing activity.

Oldies but Goodies

Evading Microsoft Defender by Embedding Lua into Rust

We are going to create a basic shellcode loader in Lua and embed it into a Rust program. We will then create the same basic shellcode loader in Rust and see how they fair against each other in terms of detection.

Compromising Threat Actor Communications

This blog post highlights how we as defenders, or cyber-threat intelligence analysts, can exploit certain pitfalls in the way Telegram-based malware operates - in order to compromise C2 communications and disrupt adversaries.

Creative UAC Bypass Methods for the Modern Era

In this article, we're going to be revisiting a tried and true UAC Bypass method that still works just fine, relying on path traversal. We will also review some older ones, now fixed but still interesting to know about: DLL sideloading, trusted folders mocking, and UI access tokens duplication.

Unearthed Arcana