RME-DisCo @ UNIZAR [www.reversea.me]
2.99K subscribers
1 photo
5.31K links
Telegram channel of RME, part of the DisCo Research Group of the University of Zaragoza (Spain) focused on cybersecurity aspects. "It’s not that I have something to hide. I have nothing I want you to see"

Link to the channel: https://t.iss.one/reverseame
Download Telegram
Local PoC exploit for CVE-2021-43267 (Linux TIPC) https://github.com/ohnonoyesyes/CVE-2021-43267
The hidden side of Seclogon part 2: Abusing leaked handles to dump LSASS memory https://splintercod3.blogspot.com/p/the-hidden-side-of-seclogon-part-2.html
CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape https://sysdig.com/blog/cnapp-cloud-security-sysdig/
Pwn2Own Local Escalation of Privilege Category — Ubuntu Desktop Exploit https://flatt.tech/assets/reports/210401_pwn2own/whitepaper.pdf
Nice explanation on the basics » A simple x86_64 stack based buffer overflow exploitation with gdb https://oxagast.org/posts/simple-buffer-overflow-exploitation-walkthrough-gdb/
Malicious IFilter: a DLL waiting patiently (not even loaded) until the file with a particular extension appears, then it executes as the LOCALSYSTEM https://github.com/gtworek/PSBits/tree/master/IFilter
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata https://sysdig.com/blog/teamtnt-aws-credentials/
Leaking EPROCESS address of the specific SYSTEM processes https://blog.rewolf.pl/blog/?p=1683
Nice reading after all the madness » Log4Shell: RCE 0-day exploit found in log4j 2, a popular Java logging package https://www.lunasec.io/docs/blog/log4j-zero-day/