Security Review #260

June 02, 2025

Your code will eventually have its assumptions challenged and stop working.

— /u/the7key

Starred Articles

XSSing TypeErrors in Safari

In this article, we leverage some Safari's specificity to combine TypeError XSS and eval() in error handler to execute arbitrary code in the targeted browser.

Hijacking the Windows "MareBackup" Scheduled Task for Privilege Escalation

The built-in "MareBackup" scheduled task is susceptible to a trivial executable search order hijacking, which can be abused by a low-privileged user to gain SYSTEM privileges whenever a vulnerable folder is prepended to the system's PATH environment variable (instead of being appended).

The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling

In this paper I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and AWS' application load balancer including the creation of a novel detection technique that combined the recently popularized "Single-Packet Attack" with our ever-trusty HTTP desync techniques.

Understanding & Mitigating BadSuccessor

Understanding the impact of the BadSuccessor AD attack primitive and mitigating the abuse via targeted Deny ACEs on Organizational Units.

CloudTrail Logging Evasion: Where Policy Size Matters

We uncovered a subtle yet critical logging evasion vulnerability within AWS environments - mainly the differing size limitations of individual AWS CloudTrail logs versus the actual content being logged. By exploiting whitespace and other syntactic quirks, an attacker can create valid IAM policies that effectively bypass CloudTrail logging.

New Articles

SSD Advisory

Multiple Foscam X5 vulnerabilities have been discovered, the vulnerabilities allow a remote attacker to trigger code execution vulnerabilities in the product.

BadSuccessor: Abusing dMSAs for AD Domination

In this post I provide an overview of the BadSeccessor vulnerability; how I stood up a Windows Server 2025 DC in my existing GOAD domain lab; my .NET-based proof-of-concept development; the Kerberos ticketing challenges I encountered and how I resolved them; and finally detection and mitigation strategies that defenders can adopt to guard against BadSuccessor.

Understanding Integer Overflow in Windows Kernel Exploitation

In this blog post, we will explore integer overflows in Windows kernel drivers and cover how arithmetic operations can lead to security vulnerabilities. We will analyze real-world cases, build a custom vulnerable driver, and demonstrate how these flaws can impact memory allocations and system stability.

tachy0n

We discuss the tachy0n exploit, a notable 0-day jailbreak for iOS 13.0 through 13.5. Starting from the origin of the exploit, we will dive into technical details and develop our exploitation strategy.

Threat Hunting C2 over HTTPS Connections Using the TLS Certificate

We break down different certificate acquisition methods attackers use, their pros and cons, and how defenders can identify suspicious HTTPS traffic. Key detection techniques include analyzing certificate transparency logs, hunting for anomalies in certificate fields, and using certificate repositories to track domain and IP history.

LDAP enumeration in 2025

We examine the viability of LDAP enumeration in 2025, considering modern detection mechanisms like Microsoft Defender for Identity (MDI) and Microsoft Defender for Endpoint (MDE), and review various techniques, including obfuscated PowerShell queries, Cobalt Strike's ldapsearch Beacon Object File (BOF), and using Microsoft Excel's OleDB provider for stealthy LDAP queries.

The DarkForge Labs Blog

CefSharp is widely embedded in .NET-based Thick-Clients, often without proper hardening or awareness of its security implications. For researchers and red teamers, this creates opportunities for stealthy exploitation, persistence, and even RCE if misconfigurations are identified. In this post, we explore common misconfigurations and attack vectors encountered during testing.

The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools

We investigate Impacket, a tool that enables users to craft custom packets and perform operations at the protocol level, which makes it incredibly useful for tasks like remote command execution, credential harvesting, relay attacks, and Kerberos ticket manipulation.

Android Analysis

Dive deep into the Android OS and learn how to examine from a forensics point of view.

Bypassing MTE with CVE-2025-0072

In this post, I'll look at CVE-2025-0072, a vulnerability in the Arm Mali GPU, and show how it can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.

The Underrated Technique to Discover High-Impact Leaks in Bug Bounty

In this article, I'll walk you through manual and automated techniques to extract valuable data from GitHub. We'll use filters, dorks and tools everything you need to perform impactful recon using only open-source intelligence (OSINT).

ViciousTrap

We analyze ViciousTrap, a newly identified threat that is turning edge devices into honeypots, leveraging mass-exploitation of CVE-2023-20118 vulnerability which affects several Cisco SOHO routers.

Ghosts in the Endpoint: How Attackers Evade Modern EDR Solutions

We explore how attackers ghost past EDR defenses. We start with a brief overview of major evasion categories (perfect for a quick read by IT managers), then dive deep into the technical rabbit hole of each evasion technique. Along the way, we’ll mention real-world tools, malware, and threat actor tactics.

Finding SSRFs in Azure DevOps - Part 2

We have found another SSRF vulnerability in Azure DevOps. We then bypassed Microsoft's fix of the vulnerability using DNS rebinding. This blog post outlines how these new SSRFs were identified by analyzing the Azure DevOps source code.

De-obfuscating ALCATRAZ

The objective of this post is to walk through various obfuscation techniques employed by ALCATRAZ, while highlighting methods to combat these techniques as malware analysts. These techniques include control flow flattening, instruction mutation, constant unfolding, LEA constant hiding, anti-disassembly tricks and entrypoint obfuscation.

Remote Prompt Injection in GitLab Duo Leads to Source Code Theft

A hidden comment was enough to make GitLab Duo leak private source code and inject untrusted HTML into its responses. In this blog post, we break down how the attack works - from prompt injection to HTML injection - and walk through a real-world end-to-end exploit scenario.

Entra Connect Sync

I will describe a handful actions that should be taken to protect Entra Connect Sync, a neuralogic point of hybrid Microsofty infrastructures, and give some audit and monitoring option.

Security Advisory: Remote Code Execution on Evertz SDVN (CVE-2025-4009)

The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.

Threat of TCC Bypasses on macOS

This article discusses Apple's Transparency, Consent, and Control (TCC) framework on macOS. We detail why TCC isn't just an annoying prompt, but the last line of defense between malware and your private data.

Cisco IOS XE WLC File Upload Vuln CVE-2025-20188

We explore CVE-2025-20188, a hard-coded JWT vulnerability in Cisco IOS XE WLC that enables unauthenticated file upload and potential RCE, and how to mitigate it.

Detecting device code phishing in Google Security Operations

Device codes were originally designed to be used to authenticate on TV’s, printers or IoT devices. In this article, we will create a YARA-L detection rule for device code phishing, an attack that involves threat actors abusing the device code authentication flow to trick users and gain unauthorized access.

AI ClickFix: Hijacking Computer-Use Agents Using ClickFix

We discuss how real-world tactics, techniques, and procedures (TTPs) apply to computer-use systems, specifically, we'll look at ClickFix attacks, having Claude launch a malicious script.

The Windows Registry Adventure Part 7: Attack surface analysis

In this blog post, I will describe the various areas that are important in the context of low-level security research, from very general ones, such as the characteristics of the codebase that allow security bugs to exist in the first place, to more specific ones, like all possible entry points to attack the registry, the impact of vulnerabilities and the primitives they generate.

Decoding TCP SYN for Stronger Network Security

Analyzing transmission control protocol (TCP) SYN segments can reveal patterns and anomalies in network traffic, providing insights into potential threats. By focusing on packet headers we explore trends and demonstrate how even limited packet data can yield actionable intelligence without delving into payloads or complex attack patterns.

Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE

In this blog post, we take a closer look at a pre-auth Remote Code Execution (RCE) vulnerability affecting vBulletin. The bug stems from the misuse of PHP’s Reflection API within vBulletin's API controller logic. We'll walk through how this API design flaw enables attackers to directly call internal methods that were never meant to be exposed.

Attacking EDRs - Part 4: Fuzzing Defender's Scanning and Emulation Engine (mpengine.dll)

Multiple out-of-bounds read and null dereference bugs were identified in Microsoft Defender by using Snapshot Fuzzing with WTF and kAFL/NYX. The bugs can be used to crash the main Defender process as soon as the file is scanned. Most are unpatched, but none appear exploitable for code execution.

Revisiting COM Hijacking

I’m going to walk through Component Object Model (COM) hijacking. It’s a method that strikes a good balance between stealth and reliability and, as a bonus, you can use it for more than just persistence. I’ll show how I identify opportunities for this technique, as well as how you can use it to load a callback into a process of interest such as Chrome or Edge.

The Ultimate Double-Clickjacking PoC

Combing a lot of browser tricks to create a realistic Proof of Concept for the Double-Clickjacking attack. Moving a real popunder with your mouse cursor and triggering it right as you're trying to beat your Flappy Bird high score.

Master Wireshark tool Like a Pro:

This article is all about getting comfortable with Wireshark’s GUI and some key features that make your job easier and your analysis sharper.

How to automate incident response for Amazon EKS on Amazon EC2

In this post, we walk through the differences of Amazon Elastic Cloud Compute (Amazon EC2) and EKS clusters on EC2 when responding to security events. By understanding the differences between the two AWS resource types, you can enhance your existing EC2 incident response (IR) automation to include EKS.

Bypass SharePoint Restricted View to exfiltrate data using Copilot AI and more...

We often find information in SharePoint that can be useful for us in later attacks. As part of this we regularly want to download copies of the file, or parts of their contents. In this blog post we will discuss how the Restricted View privilege on SharePoint hampers our goals, and cover some methods at our disposal to circumvent these controls.

Detecting Malicious Security Product Bypass Techniques

"defendnot" bypasses Windows Defender using undocumented APIs. In this article, we review detection strategies and setup robust defenses against this sophisticated evasion technique.

Forensic Analysis of SQLite Databases

Forensic analysts often encounter SQLite databases during investigations, making it essential to understand their structure and the tools available for analyzing them.

Still Recent

CVE-2025-4427/4428 : Ivanti EPMM Remote Code Execution

When blackbox testing web apps and APIs, you're often met with the frustrating 401 or 403. However, in a recent analysis of Ivanti EPMM's CVE-2025-4427 and CVE-2025-4428 , this very flow of execution inadvertently paved the way to an unauthenticated Remote Code Execution vulnerability in an Ivanti EPMM/Mobileiron.

A guide to path traversal and arbitrary file read attacks

In this article, you'll learn how to detect and exploit path traversal in APIs, bypass sanitisation filters using encoding tricks, and escalate to internal path traversal by abusing server-side request forgery (SSRF) vulnerabilities or misconfigured proxies.

Alt Syscalls for Windows 11

Learn how to implement and reverse-engineer Windows 11's undocumented Alternate Syscalls mechanism in the kernel using Rust. Step-by-step guide covers thunk generation, PspServiceDescriptorGroupTable patching, generic vs. fast paths, and HyperGuard considerations.

Disclosure: Input Validation Vulnerabilities in Microsoft Bookings

We discovered vulnerabilities in Microsoft Bookings that arises from a lack of proper validation, filtering, and sanitization of user-supplied input in the meeting creation and update APIs. This blog post outlines our technical analysis of the vulnerability, including proof-of-concept details.

Hunting Hidden Threats in WSL: Key Artifacts & Automated Extraction Script

While WSL was designed to empower developers by bringing Linux to Windows, it also opens up new avenues for attackers - and often, these pathways remain undetected by traditional security tools. In this article, I highlight key WSL artifacts that are essential for forensic analysts when investigating such hybrid environments.

Be careful of your UDP service: Remote DoS on Windows Deployment Service

In this blog, we examine a ​​denial-of-service (DoS) vulnerability pattern​​ in UDP-based remote services, using ​​Windows Deployment Service (WDS)​​ as a case study. We will demonstrate an remote DoS in WDS, which attacker can crash your WDS network without authentication or user interaction (0-click).

FriendlyFire BOF: Selective Process Freezing

We want to find a way to suppress Microsoft Teams' ability to display new messages. The approach taken involved analyzing the process tree, identifying dependencies, and selectively suspending non-essential threads. This document outlines the methodology used, the technical findings, and the final implementation of a proof-of-concept tool that achieves this functionality.

Etherhide Technique Using Blockchain as C&C Infrastructure

Recently, there have been cases of threat actors utilizing the anonymity and censorship resistance of blockchain technology. This post will examine Etherhide, a technique that uses smart contracts as C&C infrastructures, and introduce cases of its abuse.

Bypassing kASLR via Cache Timing

I explain a method for bypassing Kernel Address Space Layout Randomization (kASLR) using a cache timing side-channel attack. It explains the Prefetch Side-Channel technique, which takes advantage of speculative execution and processor cache behaviors.

Digging Tunnels

This article explores how adversaries use Cloudflared, a legitimate tunneling tool, to maintain unauthorized access in compromised environments, and how these tunnels can be utilized as a strong indicator of compromise when examined at-scale.

Stealth Syscall Execution: Bypassing ETW, Sysmon, and EDR Detection

This article details the Stealth Syscall Execution technique used to bypass ETW, Sysmon, and EDR detection. This technique relies on call stack spoofing, API hooking, execution in isolated kernel thread and hidden from debuggers.

Can You Turn a Normal USB into a Bad KB? Exploring the Limits and Cybersecurity Uses

I'm shedding light on a small yet critical piece of the hacking puzzle: the potential and limitations of USB-based attacks. This article uncovers the truth behind these techniques, exploring whether a normal USB can become a hacking weapon and how it fits into the broader landscape of cybersecurity.

Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT

We analyze Remcos RAT, a well-known remote access trojan recognized for its persistence and stealth. It provides attackers with full control over compromised systems, making it a preferred go-to tool for cyber espionage and data theft. In a recent campaign, threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents.

Fast Flux Technique for Concealing Command and Control (C&C) and Evading Detection

Fast-Flux takes advantage of the operation of the existing domain-based infrastructure to make it difficult for threat actors to detect their C2 infrastructure. This post will examine the operation of Fast-Flux technology and how threat actors configure it, along with actual cases of its exploitation.

Oldies but Goodies

Game Hacking - Part 3: Hooking Direct3D EndScene()

This part of the series is about hooking a specific function of the Direct3D library with the goal to cause Counter Strike: Global Offensive to draw additional things on the screen.

WMI Research and Lateral Movement

In this article, we will go over the WMI technology, the potential attack vectors it opens, some detection pitfalls (from an attacker's perspective), and how we can enumerate the technology for useful capabilities. We will close up with an example of escalating a remote registry write primitive into remote execution.

Game Hacking - Part 4: Cheating in Unity Games

Among Us is based on the Unity engine. I thought it would be a great idea to identify the impostors right away and without having to guess. We will see how this can be done by injecting code in the engine.

Gaining kernel code execution on an MTE-enabled Pixel 8

In this post, I'll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I'll show how this vulnerability can be exploited even when Memory Tagging Extension (MTE), a powerful mitigation, is enabled on the device.

Game Hacking - Part 1: Developing Hacks for idTech3 Based Games

The idTech3 game engine is most known for being used in games like Quake III Arena, Wolfenstein: ET and Star Wars: Jedi Knight - Jedi Academy. This post teaches you how to create hacks for games that are based on this game engine.

Finding SSRFs in Azure DevOps - Part 1

We found three SSRF vulnerabilities in Azure DevOps. This blog post outlines the way we identified these vulnerabilities, and demonstrates exploitation techniques using DNS rebinding and CRLF injection.

Sliver EDR Bypass: Customizing Open Source Tools

In this post, we'll explore how minor code modifications can significantly boost evasion and help sliver bypass EDR, highlighting both the benefits and pitfalls of standing on open source shoulders versus forging your own.

Attacking EDRs - Part 2: Driver Analysis Results

This second part describes the process and results of the EDR driver security analysis of Palo Alto Cortex using manual analysis and Sophos Intercept X using snapshot fuzzing.

Attacking EDRs - Part 3: One Bug to Stop them all

This post describes a DoS vulnerability affecting most Windows EDR agents. The vulnerability is an issue in the handling of already existing objects in the Object Manager's namespace.

Game Hacking - Part 0: Runtime Function Patching

When it comes to patching certain functions of a binary on ASM level, it’s often performed by modifying the binary itself. This post shows a different approach to accomplish the same thing: Removing game cheat protections using runtime function patching.

Game Hacking - Part 2: Coding A CS:GO Hack

This post covers creating a hack for the game Counter Strike: Global Offensive. The hack I've developed works in combination with the Linux version of the game - coding a windows-based hack can however be done with the same methodology and tools.

Unearthed Arcana

What is DPAPI: Unveiling the Decline of a Top Secret Weapon

In this post, we demonstrate for the first time how defenders can replace their DPAPI backup key, to better defend their organization during or following an Active Directory compromise event. Replacing this key enables defenders to eliminate the ability of threat actors to indefinitely exploit a compromised key, and decrypt users' secrets.

DPAPI-in-depth with tooling: standalone DPAPI

This article will go in depth on how Stand Alone DPAPI works: only local Windows accounts (so no Active Directory nor Microsoft Live) and no TPM. This article will exclusively focus on local User and System DPAPI encryption and provides some in depth cryptographical insights.