Security Review #251

March 28, 2025

Memory leaks are like water leaks: they happen when you least expect it, take hours to locate and make you wish you had spent more time protecting your valuables.

— Fred Heath

Starred Articles

Canary in the Code: Alert()-ing on XSS Exploits

This article detail how a canary can be setup to detect XSS attacks on a victim's browser.

Remote Code Execution Vulnerabilities in Ingress NGINX

We discovered CVE-2025-1097, CVE-2025-1098, CVE-2025-24514 and CVE-2025-1974, a series of unauthenticated Remote Code Execution vulnerabilities in Ingress NGINX Controller. Exploitation of these vulnerabilities leads to unauthorized access to all secrets stored across all namespaces in the Kubernetes cluster by attackers, which can result in cluster takeover.

Bypassing Detections with Command-Line Obfuscation

Defensive tools like AVs and EDRs rely on command-line arguments for detecting malicious activity. This post demonstrates how command-line obfuscation, a shell-independent technique that exploits executables' parsing "flaws", can bypass such detections.

Fileless lateral movement with trapped COM objects

Distributed COM (DCOM) remoting technology can be abused by trapping COM objects that can be used to execute .NET managed code in the context of a server-side DCOM process. We will leverage this technique to develop a proof-of-concept fileless lateral movement technique by abusing trapped COM objects.

New Articles

VanHelsing, new RaaS in Town

VanHelsingRaaS is a new and rapidly growing ransomware-as-a-service (RaaS) targeting Windows, Linux, BSD, ARM, and ESXi systems. We provide a technical analysis of the Windows variant.

Next.js and the corrupt middleware: the authorizing artifact

We explore a critical vulnerability discovered in the Next.js. This vulnerability (CVE-2025-29927) stems from the x-middleware-subrequest header, which can override middleware rules. It allows bypassing middleware security checks, including authentication and authorization.

Investigating Firefox Browser Forensics: A Forensic Guide/Browser analysis Book

Firefox stores extensive user activity data, making it possible to determine browsing history, downloads, bookmarks, and even synchronized data. This guide will walk you through a detailed forensic analysis of Firefox, covering history tracking, filling in evidence gaps, and deep-dive analysis techniques.

Browser Credential Storage and Forensic Password Recovery

Web browsers store credentials and other sensitive data for user convenience, but this also introduces security risks. Understanding how browsers manage credential storage, encryption mechanisms like DPAPI, and forensic recovery techniques is crucial for security professionals and incident responders.

Forensic Analysis of Microsoft Edge Collections and IE Mode

Microsoft Edge introduced Collections, a unique feature that enhances how users organize and save web content. Unlike traditional bookmarks, Collections allow users to group URLs, images, text snippets, and notes in a structured way. This makes it an invaluable tool for research, productivity, and forensic investigations.

Understanding Microsoft Edge Synchronization: A Forensic Perspective

For anyone dealing with Edge synchronization, whether from a security, privacy, or forensic analysis perspective, knowing how data is handled is key to making informed decisions about digital traces and potential vulnerabilities.

Investigating Edge-Based Browsers: A Forensic Guide/Browser analysis Book

We detail the steps, cybersecurity investigators and digital forensic analysts should follow to uncover a comprehensive picture of user activities and potential security threats. Browser data analysis is a powerful tool in the fight against cybercrime, providing invaluable insights that can make or break an investigation.

Electron Application Forensics and Analyzing LevelDB in Digital Forensics: A Simple Guide

Electron is a game-changer in the world of app development. From a forensic perspective, Electron apps are interesting for two main reasons: Electron is Chromium-based, and each Electron app maintains its own browser-like database. If you're investigating a system, chances are you'll find multiple Electron applications, each leaving behind valuable forensic artifacts.

Cracking the Vault: Exposing the weaknesses of encrypted apps

In this article, we illustrate how encrypted applications may not always be as secure as they appear and demonstrates methods that other experts can utilise to gain access to the application's data.

From Access to Encryption: Dissecting Hunters International's Latest Ransomware Attack

We provide a full attack chain analysis of a ranswomware achieving initial access through CVE-2024-55591, an authentication bypass vulnerability affecting FortiOS and FortiProxy. Threat actors executed various reconnaissance commands, created user accounts, and attempted to exfiltrate data. Then the ransomware was deployed to encrypt files.

BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique

The threat of BitM attacks emphasizes the importance of robust authentication and access-control mechanisms. By adopting a multi-layered defense strategy incorporating client certificates, hardware-based MFA solutions such as FIDO2-compatible security keys, and compensating controls, organizations can significantly enhance their resilience against these sophisticated threats.

Threat hunting case study: RMM software

Threat actors are increasingly leveraging legitimate remote monitoring and management (RMM) applications to infiltrate and move through networks. This article is a tutorial on threat hunting for RMM software abuse.

Red Teaming with ServiceNow

This blog post aims to highlight how access to ServiceNow can be abused to perform a range of attacks: custom actions, discovery, orchestration, LDAP listener, and relaying.

Rilide: An Information Stealing Browser Extension

Rilide is an example of an information stealer masquerading as a browser extension. In this article, we will learn about its delivery methods, and intrusion chain.

Palo Alto Cortex XDR bypass

CVE-2024-8690 is a vulnerability in Palo Alto's Cortex XDR. This article provides the technical details outlining how this could be exploited by an Administrator-level user account to disable Cortex XDR.

How to Route Traffic from WSL to Burp Suite on Windows: A Step-by-Step Guide

If you're using Kali Linux on WSL (Windows Subsystem for Linux) and want to capture or analyze its traffic in Burp Suite, you may run into challenges. In this guide, we'll walk you through the complete process of proxying Kali WSL traffic through Burp Suite installed on your Windows machine.

Windows LNK - Analysis & Proof-of-Concept

We rely on the different techniques related to Windows shortcut exploitation to build a proof-of-concept of LNK file embedding a malicious payload.

CVE-2024-55963: Unauthenticated RCE in Default-Install of Appsmith

This post details 3 vulnerabilities in Appsmith Enterprise platform, including technical breakdowns, proof-of-concept exploits, and detection methods: CVE-2024-55963, which allows unauthenticated remote code execution, CVE-2024-55964 and CVE-2024-55965 that enable unauthorized access to sensitive data and application denial of service.

Rust for Malware Development

This blog explores the advantages of using Rust over C for malware development, highlighting Rust's evasive characteristics and challenges for reverse engineering. Through a hands-on example of a simple shellcode dropper, it demonstrates how Rust can better simulate modern adversarial tactics.

Understanding Windows Kernel Pool Memory

This blog covers Windows pool memory from scratch, including memory types, debugging in WinDbg, and analyzing pool tags. We'll also use a custom tool to enumerate pool tags effortlessly and explore the segment heap.

What not to do with on prem virtualization

This posts main topic revolves around one idea: Broken Tiering. We will see here examples showing how to exploit common misconfigurations in virtualized environments such as storing unencrypted VM backups, managing hypervisors and EDR consoles within Active Directory or lack of integrity check on disk images, user profiles or backups.

CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)

This blogpost discusses the journey of finding and exploiting CVE-2024-26170, a kernel 0day in Windows 11 Composite Image File System driver (cimfs.sys) leading to Local Privilege Escalation.

MindshaRE: Using Binary Ninja API to Detect Potential Use-After-Free Vulnerabilities

This blog post explores the usage of Binary Ninja's Medium Level Intermediate Language (MLIL) to establish a data flow graph by tracing interactions between a specific memory allocation and other memory regions. Building on the data flow graph, it is further utilized in context-insensitive reachability analysis across functions to identify potential Use-After-Free (UAF) vulnerabilities in binaries.

Still Recent

Linux kernel Rust module for rootkit detection

This article covers the development of a Linux kernel module written in Rust aimed at detecting rootkits.

Something From Nothing - Breaking AES encrypted firmwares

We explore the complexities of breaking AES-encrypted firmware. We will see how we detected patterns in highly encrypted firmware files and leveraged XOR properties, machine learning, and reinforcement learning to recover approximately 65% of the original firmware content.

Gone Phishing: Installing GoPhish and Creating a Campaign

GoPhish provides a nice platform for creating and running phishing campaigns. This blog will guide you through installing GoPhish and creating a campaign.

Oldies but Goodies

Blasting Past Webp

We provide an analysis of the BLASTPASS iMessage exploit chain, a zero-click exploit relying on a buffer overflow in ImageIO (CVE-2023-41064), and an arbitrary code execution through attachments (CVE-2023-41061).

Escalating your privileges via open signups in popular services

In this post, we'll go over three popular third-party software services that most (internal) software teams make use of. We'll explain thoroughly how they can lead to data theft, service disruption, or even financial damage when access to them is left incorrectly configured.

Unearthed Arcana

Data Source Analysis and Dynamic Windows RE using WPP and TraceLogging

Both Windows software trace preprocessor (WPP) and TraceLogging were designed primarily for debugging purposes but potentially offer reverse engineers, vulnerability researchers, and detection engineers an opportunity to peer inside Windows binaries all without requiring a debugger.