Security Review #252

April 04, 2025

Study hard what interest you the most in the most undisciplined, irreverent and original manner

— Richard Feynman

Starred Articles

MCP: An Introduction to Agentic Op Support

In this post, we'll explore how to implement a straightforward agent that leverages the capabilities of LLMs. We will be using Model Context Protocol (MCP) to synergise with Mythic C2 and automate Conti replication, by building a simple agent that uses various tools such as ldapsearch, smbclient, nslookup, and ping to discover domain controllers on a network.

Exploiting IngressNightmare: A Deep Dive

IngressNightmare is an unauthenticated remote code execution (RCE) vulnerability in the Ingress NGINX admission controller. I found the exploit chain particularly intriguing and decided to recreate it for a deeper understanding.

Harnessing the power of Named Pipes

This post provides a simple methodology for identifying, monitoring, and exploiting named pipes. It also offers some insight into how custom tooling can be made to instrument Windows applications.

Anatomy of an LLM RCE

In this post, we will investigate the risk of manipulated LLMs by examining the anatomy of an LLM Remote Code Execution (RCE) vulnerability. We'll start by understanding how large language models are capable of executing code, and then we'll dive deep into a specific vulnerability we uncovered.

New Articles

Leakymetry: circumventing glpi authentication

We create a full exploit chain allowing the hijacking of a high-privilege user on GLPI, an open-source software used to create a mapping of a network through an inventory plugin and gather users' issues through a ticket system.

Pwning Millions of Smart Weighing Machines with API and Hardware Hacking

Hardware and web security are two halves of modern smart device security, and learning to hack both can yield impressive and scary results. This blogpost goes through the basics of hacking connected smart devices from end-to-end, focusing on the critical workflow of user-device association.

CVE-2025-29927 - Next.js

We discuss CVE-2025-29927, a vulnerability that affects the Next.js framework, and that enables attackers to bypass authorization mechanisms implemented via Next.js middleware, potentially granting unauthorized access to sensitive resources.

SSH Artifacts in Windows 11 - Part 1

In this series, we are testing for SSH artifacts when connecting to a Windows 11 OpenSSH Server. In this first part, we will identify the relevant event IDs.

Windows Log Analysis: From Raw Data to Forensic Insights

Understanding raw log locations in Windows and efficiently extracting and structuring them is crucial for forensic investigations and incident response. EZ Tools provide a powerful way to process these logs, making them more accessible and actionable.

Identifying Malicious Software: A Guide for Incident Responders

Rapid identification of suspicious and malicious software involves analyzing files, performing live response (examining a system while it's running), and conducting temporal analysis (also known as timelining) to trace malicious activity.

The Long and Short(cut) of It: KoiLoader Analysis

We analyse an intrusion attempt involving the use of a shortcut file leading to the loading of a new version of KoiLoader, a malware loader that facilitates Command and Control (CnC), and downloads/executes Koi Stealer, an information stealer written in C# with advanced information stealing capabilities.

PhaaS actor uses DoH and DNS MX to dynamically distribute phishing

We have discovered a phishing kit that creatively employs DNS mail exchange (MX) records to dynamically serve fake, tailored, login pages, spoofing over 100 brands. We analyze the consistent tactics, techniques, and procedures (TTPs), as well as continuous use of core resources, across attacks that used the kits within the last five years.

Stealing user credentials with evilginx

Evilginx can be used to steal usernames, passwords, and session tokens, allowing an attacker to potentially bypass multifactor authentication (MFA). In this post, we'll demonstrate how evilginx works and what information it is able to acquire; we also have advice for detecting this tool in use, as well as potential mitigations against its use.

Sinister SQL Queries and How to Catch Them

This blog explores the offensive capabilities built into SQL Server and provides defenders with practical detection strategies. We'll examine how attackers can abuse stored procedures, CLR assemblies, modify the registry, and maintain persistence - all while potentially evading common monitoring controls.

A Deep Dive into Water Gamayun's Arsenal and Infrastructure

We discuss the delivery methods, custom payloads, and techniques used by Water Gamayun abusing a zero-day vulnerability in the Microsoft Management Console framework (CVE-2025-26633) to execute malicious code on infected machines.

Auto-color - Linux backdoor

This article provides a technical analysis of Auto-color, a Linux backdoor that acts as be benign color-enhancement tool. It encrypts its strings to prevent easy extraction of its functionality, uses multiple evasion techniques to avoid detection and receives remote commands to execute on the infected machine giving the attacker full control over the compromised system.

CrushFTP Authentication Bypass - CVE-2025-2825

A critical vulnerability (CVE-2025-2825) was discovered in CrushFTP, a widely used multi-protocol file transfer server. In this research, we explore how seemingly minor implementation details in authentication mechanisms - particularly the reuse of authentication flags for multiple purposes - can lead to severe security implications.

Client-side RCE via symlink following in Google Web Designer for macOS/Linux: CVE-2025-1079

I've discovered a vulnerability in Google Web Designer that exposed its users on macOS and Linux to the possibility of client-side remote code execution via improper symbolic link resolution (CVE-2025-1079). Attackers could take control over client computers after victims interacted with a specially crafted malicious file using the app.

ZendTo NDay Vulnerability Hunting

In this article, I detail 2 vulnerabilities I found in ZendTo filesharing software: a Remote Code Execution (RCE) and an authentication bypass.

React Router and the Remix'ed path

I found a vulnerability (CVE-2025-31137) in React Router, a library used to manage multi-strategy routing in React applications. It allows URL manipulation through the Host/X-Forwarded-Host header and affects all users of Remix 2, as well as, more generally, React Router 7. This could potentially lead to several exploits, as we will demonstrate in this brief article.

Still Recent

Core Application Security for Java Developers

This article covers Java security measures that can be implemented internally after the service receives a request from an external client, focusing on areas such as securing resource access, input validation, symmetric and asymmetric encryption, hashing, secure configuration of secrets, logging, and deserialization vulnerabilities.

Detecting Supply Chain Attacks with Falco Actions

The recently discovered CVE-2025-30066 for the GitHub action tj-actions/changed-files brought to light a topic that is really critical for companies: supply chain attacks. With that, we want to discuss and show a bit about how Falco can help your organization detect this kind of attack and other suspect behaviors inside your CI/CD pipeline.

ELK Stack Setup - Part 1: Installing and Configuring ELK Stack

In this article, I will provide you with a step-by-step guide for installing and configuring the ELK Stack, a popular open-source solution for managing and analyzing logs, consisting of ElasticSearch, LogStash, and Kibana.

Oldies but Goodies

Code Execution in IDA MCP Servers

In this article, I detail my journey to abuse an IDA MCP plugin and have it execute arbitrary command planted in the code of the file to be analyzed.

Unearthed Arcana

Process Injection - Part 1: The Theory

Process injection is a defence evasion technique that any skilled penetration tester needs in their arsenal. In this first part of the series I'll be breaking down some of the theory behind how and why process injection works.

How to craft an XSS payload to create an admin user in Wordpress

We will see how to capitalize on a particular (old) WordPress plugin vulnerability to deliver a persistent XSS injection (not logged into WordPress) that will later be executed by someone logged into WordPress with higher privileges, such as an administrator.