Security Review #265

July 04, 2025

Code reviews are like mirrors - the longer you look, the more flaws you find.

— Anonymous

Starred Articles

Practical HTTPS Interception

An attacker can trick Let's Encrypt (LE) to issue new TLS certificates for any domain that the attacker intercepts traffic for. The attacker can then decrypt the TLS traffic. This one thing that TLS is supposed to prevent from happening. The fault is that LE uses cleartext HTTP to verify the ACME-challenge (which the attacker can intercept).

New Malware Embeds Prompt Injection to Evade AI Detection

In this write-up we present a malware sample found in the wild that boasts a novel and unusual evasion mechanism - an attempted prompt injection ("Ignore all previous instructions…") aimed to manipulate AI models processing the sample.

Becoming the trainer: Attacking ML training infrastructure

This blog outlines how to take advantage of the integrations between the components of ML training environments and infrastructure to facilitate privilege escalation and lateral movement, as well as how to conduct ML model theft and poisoning.

Yet another ZIP trick

We delve into the details of a schizophrenic ZIP, an archive file that can be seen - when using two different programs - as having two different sets of files within. The actual behaviour can range from having totally different sets of files, to having extra or missing some files. One way or another, the content would be different.

Netexec Workshop Active Directory Lab Writeup

This writeup of the netexec workshop details all the steps of a typical AD-based intrusion scenario, from initial reconnaissance to post-exploitation via Kerberoasting, MSSQL misconfiguration abuses, GMSA password extraction and so on.

I made my VM think it has a CPU fan

Some malware samples are known to do various checks to determine if they are running in a virtual machine. One of the common is to look for the CPU fan. In this article, we will see how to set custom SMBIOS data simulating the presence of a CPU fan in Xen and QEMU/KVM.

New Articles

Requesting Entra ID Tokens with Entra ID SSO Cookies

In this post, I'm going to cover a method for requesting Entra ID access tokens using a browser Single Sign-On (SSO) cookie. This is especially useful in scenarios where you’ve compromised a host that isn’t cloud-joined or hybrid-joined.

Sudo chroot Elevation of Privilege

We discovered two local privilege vulnerabilities in Sudo. These vulnerabilities can result in the escalation of privileges to root on the impacted system. This blog explores how the Sudo chroot option can be leveraged by any local user to elevate privileges to root, even if no Sudo rules are defined for that user.

We're going the wrong way! How to abuse symlinks and get LPE in Windows

Symbolic links have been present in Windows systems almost since birth and have great potential, because with luck you can get LPE. This article will tell you in detail about symbolic links, the specifics of working with them, and will also clearly show you the logic of abuse to obtain LPE.

Critical RCE in Anthropic MCP Inspector (CVE-2025-49596) Enables Browser-Based Exploits

A critical Remote Code Execution flaw in Anthropic's MCP Inspector exposes AI developers to browser-based attacks via 0.0.0.0 and DNS rebinding. When a victim visits a malicious website, the vulnerability allows attackers to run arbitrary code on the visiting host running the official MCP inspector tool that is used by default in many use cases.

BOF Linting for Accelerated Development

Creating Beacon Object Files (BOFs) allows operators to extend the functionality of a C2 framework, though their development may sometimes involve hidden complexities that only become apparent after the BOF is executed. In this article, we introduce a BOF linting tool to address some of the common pitfalls.

How I Scanned all of GitHub's "Oops Commits" for Leaked Secrets

GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. In this article, we detail how deleted commits can be accessed to recover deleted secrets.

All Together Now: iOS Unified Logs - Part 1

In this post, I introduce iOS unified Logs, describe them in relation to other data structures and talk about how they can be acquired using Unified Log Acquirer and Parser tool.

Decrement by one to rule them all: AsIO3.sys driver exploitation

We uncovered and analyzed two critical vulnerabilities in ASUS' AsIO3.sys driver: a stack-based buffer overflow (CVE-2025-1533) and an authorization mechanism bypass (CVE-2025-3464) for which we developed a fully working exploit that escalates local user privileges to "NT SYSTEM".

My Emulation Goes to the Moon..

In this blog post, we propose an implementation of Scatterbrain's obfuscation techniques in the context of adversary emulation. We reproduce it using LLVM, demonstrate its limitations and critical issues, and validate our work with the Mandiant de-obfuscator. Finally, we propose improvements to evade its recovery by the automated tool.

HOW attackers evade your phishing defenses

The objective of this blog post is to showcase and explain known techniques used by attackers to evade phishing restrictions. Two common approaches are specifically explained in this post: open redirects, URL shortening.

When Backups Open Backdoors: Accessing Sensitive Cloud Data via "Synology Active Backup for Microsoft 365" / modzero

We discovered a leaked credential that allowed anyone unauthorized access to all Microsoft tenants of organizations that use Synology's "Active Backup for Microsoft 365". This flaw could be leveraged by malicious actors to obtain potentially sensitive information - such as all messages in Microsoft Teams channels. It was reported to Synology and tracked as CVE-2025-4679.

C4 Bomb: Blowing Up Chrome's AppBound Cookie Encryption

In this blog post, we will explore the newly introduced AppBound Encryption and introduce our C4 Attack (Chrome Cookie Cipher Cracker), which allowed us to decrypt the cookies as a low-privileged user, and abuse Google's new security feature to get access to data that should typically only be available to the privileged SYSTEM user.

Selenium CAPTCHA Bypass with Tokens

In this article, we compare two methods of bypassing Google reCAPTCHA v2 using Selenium: Token-based method using the recaptcha_v2 module and click-based method using the selenium-recaptcha-solver-using-grid module.

Aim Labs

We identified a critical zero-click AI vulnerability, dubbed "EchoLeak", in Microsoft 365 (M365) Copilot. The chains allow attackers to automatically exfiltrate sensitive and proprietary information from M365 Copilot context, without the user's awareness, or relying on any specific victim behavior.

The Attack Vector: Database Triggers as Persistence Mechanisms

A compromised backup, often taken after an initial breach, may contain hidden triggers that reactivate the attacker’s access upon restore. This post explores how malicious triggers in compromised backups can serve as persistence mechanisms for attackers and how to mitigate this threat.

Hunting Fileless Malware in the Windows Registry

This post will cover methodology for hunting fileless malware techniques that leverage the Windows Registry for staging payloads and persistence. The analytics presented are for Microsoft Defender for Endpoint (MDE) using KQL.

SCTP Protocol Attack Risks on Linux

The SCTP protocol on Linux provides reliable communications largely for the telecommunications sector. While it has legitimate uses, it also can be a stealthy way to access Linux and avoid detection. In this article we're going to demonstrate a simple SCTP backdoor and how it can be missed by security teams. Then, we'll show you how to look for this kind of activity.

Nonce CSP bypass using Disk Cache

This writeup will describe a way to bypass a nonce-based Content Security Policy (CSP) in a pretty realistic scenario. You can get the nonce reused with bfcache falling back to Disk Cache after leaking it, then cause the HTML-Injection to be re-fetched by altering and requesting it uncached in between.

Sudo Host Option Elevation of Privilege

We discovered two local privilege vulnerabilities in Sudo. These vulnerabilities can result in the escalation of privileges to root on the impacted system. The research focused on infrequently used command-line options. This blog explores how the host option in Sudo can be exploited to execute commands on unauthorized hosts.

Supper is served

In this article, I aim to explain clearly how Supper works. Supper is a 64-bit Windows backdoor and tunnelling utility that operates as both a Remote Access Trojan (RAT) and a SOCKS5 proxy, offering threat actors persistent access to infected systems and the ability to route arbitrary traffic through victim environments.

How to Investigate Suspicious SaaS User Activity

With data and identities distributed across different SaaS platforms, security teams face an increasingly difficult task: identifying and investigating suspicious user behavior that spans multiple systems. In this post, we’ll outline practical strategies security teams can use to investigate cross-SaaS threats, prioritize real risks, and keep incident response efforts efficient and consistent.

How I Chained Directory Traversal and CSV Parser Abuse for RCE in a Django App

While testing a web application as part of a bug bounty program, I uncovered a critical RCE vulnerability by chaining directory traversal with a subtle CSV parsing abuse. The exploit chain involved a combination of directory traversal and subtle abuse of how the application used the pandas CSV parser, ultimately allowing me to overwrite the wsgi.py file and execute arbitrary code server-side.

Prompt to Heap Overflow: Pwno's Debut CVE

We showcase CVE-2025-52566, a subtle integer overflow bug in llama.cpp’s tokenizer leading to heap-overflow, quietly hiding in plain sight for over a year.

Azure Service Command and Control HTTP traffic forwarding - Part 2

In this second part of the series, I will be discussing another Azure native service we can leverage to to provide high reputation redirectors for command and control HTTP/S implant traffic: Azure Front Door.

Understanding and Detecting Windows Services: A Deep Dive for Blue and Red Teams

Windows Services are a fundamental component of the operating system, running crucial applications in the background, independent of a logged-in user. This post explores what Windows Services are, how they function, and - most critically - how Blue Teams can detect their abuse, and how Red Teams can evade detection.

Microsoft Entra ID OAuth Phishing and Detections

This article explores OAuth phishing and token-based abuse in Microsoft Entra ID. Through emulation and analysis of tokens, scope, and device behavior during sign-in activity, we surface high-fidelity signals defenders can use to detect and hunt for OAuth misuse.

Warhead: A Deep Dive into Payload Execution through Atom Tables

In the world of offensive security, stealth and evasion are paramount. Warhead is a project that explores an unusual and underutilized Windows feature: the Atom Table, repurposed for payload storage, retrieval, and execution. This blog post will serve as a complete deep dive into Warhead, its various capabilities, execution options, and practical use cases.

PowerShell loads SectopRAT & HijackLoader

During routine malware analysis, I discovered a PowerShell-based dropper script being delivered from a malicious C2 domain: This script disables security controls, fetches 2 payloads (SectopRAT, HiJack Loader), exfiltrates data, and removes all traces of its execution.

Still Recent

How to build a high-performance network fuzzer with LibAFL and libdesock

We explain how we built a fuzzer for network applications that we tried to make as efficient and as effective as possible. We utilized custom mutators and input passing over shared memory and found that it gave us a huge speed and coverage boost compared to other network fuzzers.

SonicDoor

This blog post details 5 vulnerabilities I discovered in SonicWall SMA 500: a heap overflow (CVE-2024-40763), a stack overflow (CVE-2024-45318), an authentication bypass (CVE-2024-45319), an insecure randomness (CVE-2024-53702), and a stack overflow in an Apache module (CVE-2024-53703).

Azure Service Command and Control HTTP traffic forwarding - Part 1

Using cloud provider native services provides high reputation redirectors for command and control HTTP/S implant traffic. In this post we will look at how we can use Azure Functions to forward implant traffic.

Log4Shell (Log4J): Advanced Exploitation Guide

In this article, we'll uncover what makes Log4Shell so dangerous and walk you through the techniques to identify, exploit, and weaponize them effectively. We'll also explore advanced and unique exploitation scenarios where bypassing Web Application Firewall (WAF) is necessary.

Oldies but Goodies

AWS Service Command and Control HTTP traffic forwarding

I've been looking into options for abusing AWS services to forward HTTP Command and Control (C2) traffic. This post will talk about a number of approaches I found.

Unexplored LOLBAS Technique: Wevtutil.exe

In this post, we’re taking a closer look at a lesser-known use of wevtutil.exe, a utility built for managing Windows Event Logs, and how it can be leveraged as a powerful LOLBAS tool.

Tunneling Havoc C2 with Microsoft Dev Tunnels

We investigate misuse of Microsoft Dev Tunnels, stealthily establishing Havoc C2 (Command & Control) connections. This abuse allows attackers to operate within trusted Microsoft infrastructure, bypassing many security controls.

A Network Threat Hunter’s Guide to C2 over QUIC

In this guide, we'll examine C2 over QUIC through a network threat hunter's lens with the goal of deriving concrete detection patterns. We'll kick off with a brief overview of the key QUIC concepts essential, then dive into practical analysis using RITA, Wireshark, Zeek, and custom Python applications to examine real C2 over QUIC traffic to identify detection opportunities.

Unearthed Arcana

A Deep Dive Into XXE Injection

One of my favorite attack types is XML External Entity (XXE) Injection. In an effort to demystify this exploit, I'm going to break down how XXE works, some ways to exploit XXE vulnerabilities, and cover two real-world XXE attacks submitted by the SRT (with redacted data to protect client and SRT identities).