Randomizing the KUSER_SHARED_DATA Structure on Windows https://msrc-blog.microsoft.com/2022/04/05/randomizing-the-kuser_shared_data-structure-on-windows/
Analysis of CVE-2022-21882 "Win32k Window Object Type Confusion Exploit"
https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-21882-win32k-window-object-type-confusion-exploit
https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-21882-win32k-window-object-type-confusion-exploit
Coresecurity
Analysis of CVE-2022-21882 "Win32k Window Object Type Confusion Exploit" | Core Security
This blog analyzes the “Win32k Window Object Type Confusion” that abuses the CVE-2022-21882 vulnerability. It’s based on the existing Proof of Concept (POC), which is both interesting and quite complex. It can be treated as an interactive guide to be used…
Detecting malicious artifacts using an ETW consumer in kernel mode https://www.countercraftsec.com/blog/post/detecting-malicious-artifacts-using-an-etw-consumer-in-kernel-mode/
CounterCraft
Detecting Malicious Artifacts Using an ETW Consumer in Kernel Mode
Post-exploitation tooling is becoming increasingly sophisticated and often evades detection by EDRs, meaning sometimes we will not be able to detect when an attacker is able to load his code into memory. Here's a way to detect artifacts that are already loaded…
Dirty Pipe Explained - CVE-2022-0847 https://www.hackthebox.com/blog/Dirty-Pipe-Explained-CVE-2022-0847
Hack The Box
Dirty Pipe Explained - CVE-2022-0847
On 7th March’22, security researcher Max Kellermann published the vulnerability nicknamed ‘Dirty-Pipe’ which was assigned as CVE-2022-0847. This vulnerability affects the Linux kernel.
Exploiting CVE-2022-0778, a bug in OpenSSL vis-à-vis WebRTC platforms https://www.rtcsec.com/article/exploiting-cve-2022-0778-in-openssl-vs-webrtc-platforms/
Enablesecurity
Exploiting CVE-2022-0778, a bug in OpenSSL vis-à-vis WebRTC platforms
Exploiting CVE-2022-0778 in a WebRTC context requires that you get a few things right first. But once that is sorted, DoS (in RTC) is the new RCE!
CVE-2022-26381: Gone by others! Triggering a UAF in Firefox https://www.zerodayinitiative.com/blog/2022/4/7/cve-2022-26381-gone-by-others-triggering-a-uaf-in-firefox
Zero Day Initiative
Zero Day Initiative — CVE-2022-26381: Gone by others! Triggering a UAF in Firefox
Memory corruption vulnerabilities have been well known for a long time and programmers have developed various methods to prevent them. One type of memory corruption that is very hard to prevent is the use-after-free and the reason is that it has too many…
Nginx Zero-Day LDAP Reference Implementation Vulnerability Alert https://securityonline.info/nginx-zero-day-rce-vulnerability-alert/
Daily CyberSecurity
Nginx Zero-Day LDAP Reference Implementation Vulnerability Alert
An nginx Zero-Day RCE issue was identified in the nginx LDAP-auth daemon implementation, which was briefly leaked.
State-sponsored Attack Groups Capitalise on Russia-Ukraine War for Cyber Espionage https://research.checkpoint.com/2022/state-sponsored-attack-groups-capitalise-on-russia-ukraine-war-for-cyber-espionage/
Check Point Research
State-sponsored Attack Groups Capitalise on Russia-Ukraine War for Cyber Espionage - Check Point Research
Introduction Geopolitical tensions often make headlines and present a golden opportunity for threat actors to exploit the situation, especially those targeting high-profile victims. In the past month while the Russian invasion of Ukraine was unfolding, Check…
CVE-2022-22965: Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware https://www.trendmicro.com/en_us/research/22/d/cve-2022-22965-analyzing-the-exploitation-of-spring4shell-vulner.html
Trend Micro
CVE-2022-22965 Analyzing the Exploitation of Spring4Shell Vulnerability in Weaponizing and Executing the Mirai Botnet Malware
Cado Discovers Denonia: The First Malware Specifically Targeting Lambda https://www.cadosecurity.com/cado-discovers-denonia-the-first-malware-specifically-targeting-lambda/
Darktrace
Solve Cloud Forensics at Scale
Darktrace has acquired Cado security, a cyber investigation and response solution provider and leader in cloud data capture and forensics.
Firewall analysis: A portable graph based approach
https://diablohorn.com/2022/04/09/firewall-analysis-a-portable-graph-based-approach/
https://diablohorn.com/2022/04/09/firewall-analysis-a-portable-graph-based-approach/
DiabloHorn
Firewall analysis: A portable graph based approach
Sometimes you are asked to perform a firewall analysis to determine if the configuration can be improved upon to reduce the ability for an attacker to move laterally through the network or identify…
Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 3) https://connormcgarr.github.io/type-confusion-part-3/
Connor McGarr’s Blog
Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 3)
Porting part 2’s ChakraCore exploit to Microsoft Edge while defeating ASLR, DEP, CFG, ACG, CIG, and other mitigations.
Introducing PacketStreamer: distributed packet capture for cloud-native platforms https://medium.com/deepfence-cloud-native-security/introducing-packetstreamer-distributed-packet-capture-for-cloud-native-platforms-3e7f9ac57ab1
Medium
Introducing PacketStreamer: distributed packet capture for cloud-native platforms
PacketStreamer is an open-source tool that captures network traffic from multiple remote sources concurrently and aggregates the data into…
zgrep, xzgrep: arbitrary-file-write vulnerability https://www.openwall.com/lists/oss-security/2022/04/08/2
Android Pentesting Setup On Macbook M1 https://infosecwriteups.com/android-pentesting-setup-on-macbook-m1-d2f1f0a8db4b
Medium
Android Pentesting Setup On Macbook M1
Hello hackers,
Abusing LargePageDrivers to copy shellcode into valid kernel modules https://vollragm.github.io/posts/abusing-large-page-drivers/
VollRagm
Abusing LargePageDrivers to copy shellcode into valid kernel modules
Introduction Most people in the game hacking community write their kernel-mode drivers to get around kernel-level anti-cheats such as EasyAntiCheat. However, those anti-cheats have several methods to detect cheat drivers. The most commonly used way to load…
Bypassing SSL pinning on Android Flutter Apps with Ghidra https://raphaeldenipotti.medium.com/bypassing-ssl-pinning-on-android-flutter-apps-with-ghidra-77b6e86b9476
Medium
Bypassing SSL pinning on Android Flutter Apps with Ghidra
TL-DR