The toddler’s introduction to Heap exploitation (Part 1) https://valsamaras.medium.com/the-toddlers-introduction-to-heap-exploitation-part-1-515b3621e0e8
Medium
The toddler’s introduction to Heap exploitation (Part 1)
In my introductory post I had been talking about dynamic memory allocation and I referenced various solutions that are used to tackle this…
The toddler’s introduction to Heap exploitation (Part 2) https://valsamaras.medium.com/the-toddlers-introduction-to-heap-exploitation-part-2-d1f325b74286
Medium
The toddler’s introduction to Heap exploitation (Part 2)
In my last post I had been talking about the heap structure in the context of the ptmalloc allocator. I went through some basic concepts…
An opinionated guide on how to reverse engineer software, part 1 https://margin.re/2021/11/an-opinionated-guide-on-how-to-reverse-engineer-software-part-1/
Margin Research
An opinionated guide on how to reverse engineer software, part 1
This is an opinionated guide. After 12 years of reverse engineering professionally, I have developed strong beliefs on how to get good at RE.
The toddler’s introduction to Heap exploitation, Overflows (Part 3) https://valsamaras.medium.com/the-toddlers-introduction-to-heap-exploitation-overflows-part-3-d3d1aa042d1e
Medium
The toddler’s introduction to Heap exploitation — Overflows(Part 3)
In the previous parts (1, 2) we discussed about the heap structure and we tried to simplify these concepts using a real life example. You…
Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable https://www.legitsecurity.com/blog/artifact-poisoning-vulnerability-discovered-in-rust
Legitsecurity
Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable
New software supply chain vulnerabilities use artifact poisoning and attack the software development pipelines on projects using GitHub Actions.
The toddler’s introduction to Heap exploitation, Use After Free & Double free (Part 4) https://valsamaras.medium.com/use-after-free-13544be5a921
Medium
The toddler’s introduction to Heap exploitation, Use After Free & Double free (Part 4)
This post is part of a series of articles related to x64 Linux Binary Exploitation techniques. Summarising on my previous posts, we began…
DuckLogs – New Malware Strain Spotted In The Wild https://blog.cyble.com/2022/12/01/ducklogs-new-malware-strain-spotted-in-the-wild/
Cyble
Cyble - DuckLogs - New Malware Strain Spotted In The Wild
Cyble analyzes DuckLogs - a new Malware-as-a-Service that provides sophisticated malware features to Threat Actors at a relatively low price.
CREATE: A methodology for reverse engineering complex software systems https://hackmd.io/@mrexodia/create-methodology
🤮1
DEV-0139 launches targeted attacks against the cryptocurrency industry https://www.microsoft.com/en-us/security/blog/2022/12/06/dev-0139-launches-targeted-attacks-against-the-cryptocurrency-industry/
Microsoft News
DEV-0139 launches targeted attacks against the cryptocurrency industry
Microsoft security researchers investigate an attack where the threat actor, tracked DEV-0139, used chat groups to target specific cryptocurrency investment companies and run a backdoor within their network.
Technical Analysis of DanaBot Obfuscation Techniques https://www.zscaler.com/blogs/security-research/technical-analysis-danabot-obfuscation-techniques
Zscaler
DanaBot | ThreatLabz
A technical analysis of the DanaBot malware's obfuscation techniques.
Internet Explorer 0-day exploited by North Korean actor APT37 https://blog.google/threat-analysis-group/internet-explorer-0-day-exploited-by-north-korean-actor-apt37/
Google
Internet Explorer 0-day exploited by North Korean actor APT37
Google’s Threat Analysis Group describes a new 0-day vulnerability attributed to North Korean government-backed actors known as APT37.
TheHole New World - how a small leak will sink a great browser (CVE-2021-38003) https://starlabs.sg/blog/2022/12-the-hole-new-world-how-a-small-leak-will-sink-a-great-browser-cve-2021-38003/
STAR Labs
TheHole New World - how a small leak will sink a great browser (CVE-2021-38003)
Introduction CVE-2021-38003 is a vulnerability that exists in the V8 Javascript engine. The vulnerability affects the Chrome browser before stable version 95.0.4638.69, and was disclosed in October 2021 in google’s chrome release blog, while the bug report…
Gaining Threat-Intelligence the REALLY dodgy way https://blog.tofile.dev/2022/11/30/kdu_sealighter.html
Native function and Assembly Code Invocation https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/
Check Point Research
Native function and Assembly Code Invocation - Check Point Research
Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. While in some cases it is just possible to understand the function logic and reimplement it in a higher-level…
Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass https://the-deniss.github.io/posts/2022/12/08/hooking-system-calls-in-windows-11-22h2-like-avast-antivirus.html
the-deniss.github.io
Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass
In this post I’ll show Avast self-defense bypass: how I discovered a new undocumented way to intercept all system calls without a hypervisor and PatchGuard triggered BSOD, and, finally, based on the knowledge gained, implemented a bypass
🔥1
Cool vulns don't live long - Netgear and Pwn2Own https://www.synacktiv.com/publications/cool-vulns-dont-live-long-netgear-and-pwn2own.html
Synacktiv
Cool vulns don't live long - Netgear and Pwn2Own
Using OpenAI Chat to Generate Phishing Campaigns https://www.richardosgood.com/posts/using-openai-chat-for-phishing/
Richardosgood
Using OpenAI Chat to Generate Phishing Campaigns
Generating phishing campaigns with OpenAI Chat and GPT-3
APT Cloud Atlas: Unbroken Threat
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt-cloud-atlas-unbroken-threat/
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt-cloud-atlas-unbroken-threat/
Fuzzing ping(8)
… and finding a 24 year old bug. https://sha256.net/fuzzing-ping.html
… and finding a 24 year old bug. https://sha256.net/fuzzing-ping.html
👍1
Exploring Chrome’s CVE-2020-6418 – Part1
https://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1
https://blog.haboob.sa/blog/exploring-chromes-cve-2020-6418-part1
Haboob
Exploring Chrome’s CVE-2020-6418 – Part1 — Haboob
Introduction: Chrome vulnerabilities have been quite a hot topic for the past couple of years. A lot of vulnerabilities where caught being exploited in the wild. While most of the ones we looked at were quite interesting, one bug caught our attention and…