Security Review #266

July 11, 2025

Each problem that I solve becomes a rule which serves afterwards to solve other problems

— Rene Descartes

Starred Articles

Complete Guide: On How to Evaluate an EDR

This guide provides the key evaluation criterias for EDR solutions, including core telemetry features, integration capabilties, UI, storage, detection and resistance to evasion techniques.

VNC Honeypot Setup

I decided to setup a VNC honeypot. My goal was to essentially spin up an Ubuntu server and configure it in such a way, where when someone connected, it would start a recording of the active VNC session, and once disconnected, would save that recording into a file which i could retrieve at a later date.

Red Team Tactics: Evading EDR on Linux with io_uring

In this article, I will explore the use of io_uring, a legitimate Linux kernel feature designed for high-performance asynchronous I/O, but which can be adapted to evade traditional syscall-based detection mechanisms. We will see how modern techniques can enable stealthy and silent operations, bypassing EDR and other monitoring mechanisms, and what this means for both attackers and defenders.

From cheap IoT toy to your smartphone: Getting RCE by leveraging a companion app

As IoT adoption continues to grow, we explored the idea that instead of directly compromising IoT devices, an attacker could target the applications controlling them. In this article, we will go through some vulnerabilities we found in an Android drone control application, allowing us to take control of a recent smartphone by faking the drone itself.

Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients

We detail CVE-2025-6514, a critical vulnerability in the mcp-remote project used by Model Context Protocol (MCP) clients. By abusing the authorization mechanism, a malicious remote MCP server can trigger remote code execution on the client.

New Articles

Antivirus Evasion Techniques

We detail how timed mutexes can be leveraged to evade anti-virus sleep detection.

Fooling the Sandbox: A Chrome-atic Escape

We analyze CVE-2024-30088, a double-fetch race condition bug in the Windows Kernel Image ntoskrnl.exe, and chain the exploit to escape the Chrome Renderer Sandbox, achieving EoP from Untrusted Integrity Level to SYSTEM.

MemorySnitcher and the power of NtReadVirtualMemory

Creating vulnerable (on purpose) programs to leak the NtReadVirtualMemory address for stealthier API resolution (no GetProcAddress, GetModuleHandle or LoadLibrary in the IAT).

FileFixed

The FileFix technique rely on priming the target user's clipboard with a malicious command, achieved via JavaScript in an HTML attachment or hosted site. In this short blog, we'll talk about methods for detecting and preventing the FileFix technique.

Insecure Boot: Injecting initramfs from a debug shell

Linux hardening guides often overlook a subtle but serious attack vector: the ability to drop into a debug shell via the Initial RAM Filesystem (initramfs). In this post, it is demonstrated how this attack works on modern Linux distributions, such as Ubuntu and Fedora, and explained why existing guidance often fails to mention it.

AWS Delegated-Admin Exploit & Org Takeover Risk

We investigate AWS Organizations cross-account pivoting and compromise by abusing misconfigured delegation mechanisms, uncovering how attackers can abuse legitimate features to persist, move laterally and escalate privileges across all accounts in a multi-account AWS environment.

Linux kernel pipapo set double free LPE

A critical double free vulnerability in the pipapo set module of the Linux kernel’s NFT subsystem has been discovered. An unprivileged attacker can exploit this vulnerability by sending a specially crafted netlink message, triggering double-free error with high stability. The attacker can take advantage of kernel exploitation techniques to achieve local privilege escalation.

When too much access is not enough: a story about Confluence and tokens

In this article, we demonstrate the ability of a user accessing a Confluence database with read and insert privileges to forge and insert a rogue token for any user, achieving access to the Confluence instance with the highest privileges. The token can then be used in existing tooling to dump and search Confluence content.

Caught in the FortiNet: How Attackers Can Exploit FortiClient to Compromise Organizations - Part 3

In this last article of the series, we will showcase a vulnerability enabling the attacker to go the last mile. Despite compromising all endpoints, an attacker would still be executing code under the same low-privileged user as FortiClient's UI. However, during our research on FortiClient, we discovered a local privilege escalation affecting macOS machines running FortiClient.

Shellcode injection using MessageBox

We explore a lesser-known Windows code injection technique using the MessageBoxIndirect API and its callback mechanism. It’s a creative method for executing shellcode by exploiting the MSGBOXPARAMSW structure.

Uncovering Privilege Escalation Bugs in Lenovo Vantage

This post details several privilege escalation vulnerabilities we identified in Lenovo Vantage, a common management platform bundled with Lenovo laptops. We'll detail Vantage's architecture and its implications in the impact, and mitigation of, the logic bugs identified. The following CVEs were assigned to track the described issues: CVE-2025-6230, CVE-2025-6231, CVE-2025-6232

Azure's Front Door WAF WTF: IP Restriction Bypass

The Azure Front Door Web Application Firewall (WAF) has an "IP restriction" option that can be bypassed with the inclusion of an X-Forwarded-For HTTP header.

Extracting Sensitive Information from Azure Load Testing

The Azure Load Testing service supports Locust configuration files which are just Python code and can be executed in the Load Testing environment. This allows us to query the resource's metadata service endpoint, generate reverse shell connections and extract Key Vault secret and certificate references.

Buried in the Log

In this article I would like to detail an exploitation showcase of vulnerability in Windows NTFS implementation. This vulnerabilty, CVE-2025-49689, is reachable through specific crafted virtual disk (VHD). We will review the root-cause leading to multiple corruptions, and how it can be exploited in order to achieve Escalation of Priveleges.

How Much More Must We Bleed?

In this blog, we'll focus on CVE-2025-5777, an insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server.

Identity Is A Bitchat Challenge (MITM Flaw)

We illustrate issues raised by the intersection of vibe coding and security by reviewing the security design of BitChat, a decentralized messaging protocol. We identify and detail a critical identity flaw that enables trivial man-in-the-middle (MITM) attacks.

Yet Another ZIP Trick Writeup

A detailed walkthrough of a technique to create schizophrenic ZIP file - a file that appears different depending on how it's parsed.

CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe

While digging into the internals of my new Lenovo ThinkPad, I came across an unexpected discovery that quickly escalated from curiosity to a viable privilege escalation vulnerability (CVE-2025-1729).

RedirectionGuard: Mitigating unsafe junction traversal in Windows

Filesystem redirection attack is a persistent vector for privilege escalation. This blog outlines how RedirectionGuard proactively prevents unsafe junction traversal, reinforcing our commitment to secure-by-design-principles and reducing the burden on developers and defenders.

Applocker bypass on Lenovo machines

This blogpost is about a minor discovery I made regarding a writeable file inside the Windows folder that is present on Lenovo machines and can be abused as an AppLocker bypass.

Workload identities; from Attack to Defense with Microsoft Security

We delve into how Microsoft Entra Workload Identities can be abused and what defenses are available to protect them. We will review what Workload Identities are, the Oauth App consent abuse and service principal credential theft attack vectors, and the different defense strategies that can be deployed.

Windows Registry Forensics 2025

An overview into Windows Registry Forensics and how to leverage data for your investigations.

Kharon Agent: Demonstration of Advanced Post-Exploitation

Presentation of a new project: an agent for C2 (Mythic) that has advanced post-exploit capabilities and evasion features. The agent is highly flexible, and most of its behavior can be configured at runtime using the Config command. It is implemented entirely as shellcode with mordern design, without relying on sRDI, making it easier to use during injection.

The Birth and Death of "LoopyTicket"

The scoop on CVE-2025-33073, how the Kerberos Reflection attack was uncovered, its impact on Active Directory, and lessons learned.

Entra ID Incident Response: Advanced PowerShell Techniques

In this post, we’ll explore how PowerShell empowers security teams to harness the full potential of Entra ID CFIR (Cloud Forensic and Incident Response). From automating incident response workflows to identifying subtle signs of compromise, PowerShell scripts can transform complex logs and alerts into actionable intelligence.

Still Recent

You Shall Not Get Access: Browser Permissions

We detail browser permissions, their type, the key mechanisms (API, policy headers, iFrame delegation), investigate common piutfalls and misconceptions and their related security risks.

Unveiling AI Agent Vulnerabilities - Part 3: Data Exfiltration

In the third part of our series we demonstrate how risk intensifies in multi-modal AI agents, where hidden instructions embedded within innocuous-looking images or documents can trigger sensitive data exfiltration without any user interaction.

Oldies but Goodies

Win32k that we lost

In this writeup I try to explain the full exploitation process of CVE-2023-29336, a privilege escalation vulnerability on Win32k.

Unearthed Arcana

macOS Unified Logs

In this blog post, we will cover an overview of the Unified Logs and the challenges presented in using them during an investigation. Along with this blog post, we also released a tool called "macos-unifiedlogs" to help overcome some of the challenges in parsing log data, and to provide examples of how it can uncover vital information during an investigation.

Enhancing subdomain enumeration

This post details a technique to improve subdomain enumeration by including Empty Non-Terminals (ENT), an often-ignored DNS node and observing the NOERROR status code.