Security Review #288

December 26, 2025

Debugging is like being the detective in a crime movie where you are also the murderer.

— Filipe Fortes

Starred Articles

A Hands-On Introduction to Polyglot Files

The goal of this post is to explore the nature of polyglot files and the scenarios where they are most effective for discovering vulnerabilities. We will also explore two existing tools which are going to help us create these kinds of files.

The Curious Case of the Comburglar

We discovered a highly stealthy and persistent intrusion technique utilized to maintain Command-and-Control (C2). The attacker had modified Scheduled Tasks in the environment to use a ComHandler to create and execute a method within a registered Component Object Model (COM), leveraging custom surrogate DLL files for code execution.

New Articles

Using DCOM objects for remote command execution

In this article, we will first discuss COM technology. Then, we will examine Control Panel items, how adversaries have used them for initial access and persistence, and how these items can be leveraged through a DCOM object to achieve command execution.

Advent of Configuration Extraction - Part 3: SNOWLIGHT Config

We dissect SNOWLIGHT, a lightweight ELF downloader designed to retrieve and execute a remote payload on Linux systems, by disassembling the main function and identifying calls to dynamically imported functions based on their addresses. To do so we rely on two powerful tools: LIEF for parsing the ELF format, and Capstone for disassembling the machine code.

Breaking SAPCAR: Four Local Privilege Escalation Bugs in SAR Archive Parsing

We uncover four SAPCAR bugs, where parsing a SAR archive could lead to local privilege escalation. Path traversal in CAR archive extraction (CVE-2025-42970), metadata tampering in signed SAR archives (CVE-2025-42992), extraction can override permissions of current and parent directories (CVE-2025-43001) and memory corruption when parsing crafted CAR archives (CVE-2025-42971).

Windows Malware Persistence: Common Techniques Explained

This article will cover some common persistence mechanisms for malware on Windows systems and relevant examples of various malware families that take advantage of these persistence mechanisms.

Azure Storage Account Attacks and Detections

Many of the resources in Azure depend on storage accounts and blob storage for hosting things like metadata, session info, or event data. Regardless of the reason, it’s probably a good idea to secure that data in some way, both from the authorization & authentication level but also from the detection side. The goal of this post is to highlight a few attacks and how to detect or defend against them.

When WebSockets Lead to RCE in CurseForge

An unauthenticated local WebSocket server in the CurseForge launcher allowed any website to trigger remote code execution via attacker-controlled JVM arguments.

When OAuth Becomes a Weapon: Lessons from CVE-2025-6514

CVE 20225-6514 is a client-side critical vulnerability in mcp-remote allowing arbitrary OS command execution when connecting to untrusted MCP servers. The attack exploits OAuth dynamic discovery leveraging URL sanitization failure.

Turning List-Unsubscribe into an SSRF/XSS Gadget

This post discusses how the List-Unsubscribe SMTP header can be abused to perform Cross-Site Scripting (XSS) and Server-Side Request Forgery (SSRF) attacks in certain scenarios. Real-world examples involving Horde Webmail (CVE-2025-68673) and Nextcloud Mail App are provided to illustrate the risks.

Livewire: remote command execution through unmarshaling

Livewire comes with a critical vulnerability: a dangerous unmarshalling process can be exploited as long as an attacker is in possession of the APP_KEY of the application. By crafting malicious payloads, attackers can manipulate Livewire’s hydration process to execute arbitrary code, from simple function calls to stealthy remote command execution.

TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy in the Era of AI Assisted Reverse Engineering

In this post, I will focus on the TP-Link Tapo C200 camera and show how I approach firmware analysis these days, now that we have AI. although it is the last firmware I find 4 vulnerabilities: a SOAP XML Parser Memory Overflow, an HTTPS Content-Length Integer Overflow, WiFi Hijacking vulnreability and the capacity to scan nearby WiDFi networks, all without authentication.

Advent of Config Extraction - Part 4: Extracting TinyShell Configs

We dissect a lightweight Linux backdoor, that is derived from an open-source backdoor called TinySHell, using capa, Capstone and Python to recover RC4-encrypted C2 settings from the malware.

Yet Another DCOM Object for Command Execution - Part 2

In this second part, I present a new DCOM object that can be used for command execution and potential persistence. This technique abuses older initial-access and persistence methods involving Control Panel items. We'll see how adversaries have used them for initial access and persistence, and how they can be leveraged via a DCOM object to execute commands.

Still Recent

From Veeam to Domain Admin: Real-World Red Team Compromise Path

This post walks through a real-world compromise path that started with Veeam and ended with full Domain Admin, highlighting why backup security matters and how defenders can harden their environments.

Vulnhalla: Picking the true vulnerabilities from the CodeQL haystack

In this blog post, we present our approach for uncovering vulnerabilities by combining LLM reasoning with static analysis. By layering an LLM on top of CodeQL, we significantly reduce the overwhelming noise of false positives that typically buries security teams.

ClickFix Gets Creative: Malware Buried in Images

We uncovered an attack utilizing a ClickFix lure to initiate a multi-stage malware execution chain. This analysis reveals how threat actors use steganography to conceal infostealers like LummaC2 and Rhadamanthys within seemingly harmless PNGs.

Advent of Configuration Extraction - Part 1: Kaiji Configuration

In this first article of the series, we showcase the extraction of configuration data from Kaiji, an IoT botnet malware. We provide a straightforward demonstration of how the pipeline operates and how the configuration extraction service interacts with the rest of the system.

How I Reverse Engineered a Rust Botnet and Built a C2 Honeypot to Monitor Its Targets

A Rust DDoS botnet slipped past every antivirus engine. I captured it on my honeypot, reverse engineered its custom C2 protocol, and built a fake bot to infiltrate the network-now monitoring attack targets and tracking the malware's evolution in real-time.

Advent of Configuration Extraction - Part 2: QuasarRAT Config

In this second part, we unwrap QuasarRAT, a popular .NET remote access trojan (RAT), and show how to extract its encrypted configuration out of the binary. We first detail the environment, then construct a Python-based extractor for a clean QuasarRAT sample, then extends the approach to handle an obfuscated build.

Oldies but Goodies

The Problem with Parsing Linux-Based Memory Dumps

We review 2 techniques to parse Linux memory dumps using Volatility by either building (slower but educational) or downloading kernel profile.