RME-DisCo @ UNIZAR [www.reversea.me]
2.98K subscribers
1 photo
5.31K links
Telegram channel of RME, part of the DisCo Research Group of the University of Zaragoza (Spain) focused on cybersecurity aspects. "It’s not that I have something to hide. I have nothing I want you to see"

Link to the channel: https://t.iss.one/reverseame
Download Telegram
Malicious IFilter: a DLL waiting patiently (not even loaded) until the file with a particular extension appears, then it executes as the LOCALSYSTEM https://github.com/gtworek/PSBits/tree/master/IFilter
Leaking EPROCESS address of the specific SYSTEM processes https://blog.rewolf.pl/blog/?p=1683
Nice reading after all the madness » Log4Shell: RCE 0-day exploit found in log4j 2, a popular Java logging package https://www.lunasec.io/docs/blog/log4j-zero-day/
Log4Shell Update: Second log4j Vulnerability Published (CVE-2021-44228 + CVE-2021-45046) https://www.lunasec.io/docs/blog/log4j-zero-day-update-on-cve-2021-45046/
Risk analysis of Log4Shell (CVE-2021-44228) and mitigation https://hardenedvault.net/2021/12/17/analysis-CVE-2021-44228.html
Remote Deserialization Bug in Microsoft's RDP Client through Smart Card Extension (CVE-2021-38666) https://thalium.github.io/blog/posts/deserialization-bug-through-rdp-smart-card-extension/