Beacon Object File (BOF) to kill a process by specifying its PID #RedTeaming #BOF #ProcessKill #CookieHarvest #AWSSSO https://tierzerosecurity.co.nz/2025/09/08/killerPID-BOF.html
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
Break The Protective Shell Of Windows Defender With The Folder Redirect Technique #WindowsDefender #FolderRedirect #AVBypass #SymlinkExploit #RedTeaming https://www.zerosalarium.com/2025/09/Break-Protective-Shell-Windows-Defender-Folder-Redirect-Technique-Symlink.html
Zerosalarium
Break The Protective Shell Of Windows Defender With The Folder Redirect Technique
Exploiting vulnerability in the update mechanism of Windows Defender by using a symbolic link folder. Destroying or injecting code into Defender
Department of War Doesn’t Defend its Web Streams From Hackers #DepartmentOfWar #StreamKeyLeak #LivestreamHack #CyberSecurityFail #DisinformationRisk https://theintercept.com/2025/09/08/department-of-war-defense-stream-keys-hackers-livestream-hack-security/
The Intercept
Department of War Doesn’t Defend its Web Streams From Hackers
The Pentagon publicly posts the stream keys to its Facebook, YouTube, and X channels, exposing livestreams to account takeovers.
Memory Integrity Enforcement: A complete vision for memory safety in Apple devices #MemorySafety #AppleSecurity #MIE #AppleSilicon #ExploitPrevention https://security.apple.com/blog/memory-integrity-enforcement/
Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research
Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort spanning half a decade that combines the unique strengths of Apple silicon hardware with our advanced operating system security to provide industry-first…
Pwn My Ride: Exploring the CarPlay Attack Surface #CarPlayHacking #CVE202524132 #AirPlayVulnerability #ConnectedCarSecurity #AutomotiveCybersecurity https://www.oligo.security/blog/pwn-my-ride-exploring-the-carplay-attack-surface
www.oligo.security
Apple CarPlay Hacking Risks: CVE-2025-24132 Explained | Oligo Security
At DefCon, Oligo Security revealed critical Apple CarPlay vulnerabilities, including CVE-2025-24132 in the AirPlay SDK. Learn how attackers exploit iAP2 and AirPlay to compromise connected cars, and why patching delays leave vehicles exposed.
Kerberoasting #Kerberoasting #ActiveDirectory #MicrosoftSecurity #WeakCrypto #PasswordCracking https://blog.cryptographyengineering.com/2025/09/10/kerberoasting/
A Few Thoughts on Cryptographic Engineering
Kerberoasting
I learn about cryptographic vulnerabilities all the time, and they generally fill me with some combination of jealousy (“oh, why didn’t I think of that”) or else they impress me w…
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs #Ransomware #CyberIntrusion #ThreatActor #MalwareAnalysis #DFIRReport https://thedfirreport.com/2025/09/08/blurring-the-lines-intrusion-shows-connection-with-three-major-ransomware-gangs/
The DFIR Report
Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs
Key Takeaways The intrusion began when a user downloaded and executed a malicious file impersonating DeskSoft’s EarthTime application but instead dropped SectopRAT malware. The threat actor d…
You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819) #FreePBX #ZeroDay #CVE202557819 #SQLInjection #VoIPSecurity https://labs.watchtowr.com/you-already-have-our-personal-data-take-our-phone-calls-too-freepbx-cve-2025-57819/
watchTowr Labs
You Already Have Our Personal Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
We’re back - it’s a day, in a month, in a year - and once again, something has happened.
In this week’s episode of “the Internet is made of string and there is literally no evidence to suggest otherwise”, we present even further evidence that as a
In this week’s episode of “the Internet is made of string and there is literally no evidence to suggest otherwise”, we present even further evidence that as a
NT OS Kernel Information Disclosure Vulnerability – CVE-2025-53136 #CVE202553136 #KernelLeak #WindowsVulnerability #RaceCondition #KASLRBypass https://www.crowdfense.com/nt-os-kernel-information-disclosure-vulnerability-cve-2025-53136/
Crowdfense
NT OS Kernel Information Disclosure Vulnerability - CVE-2025-53136 - Crowdfense
Bidding farewell to one of the last kernel address leaks, CVE-2025-53136. Even patches can open new doors for exploitation.
Fine-grained HTTP filtering for Claude Code #AIAgentSecurity #HTTPFiltering #EgressControl #DevToolSecurity #NetworkIsolation https://ammar.io/blog/httpjail
ammar.io
Fine-grained HTTP filtering for Claude Code
Default‑deny HTTP(S) for dev tools and AI agents. Script rules in JS or shell, log every request, and keep egress within your policy.
Old But Gold, Dumping LSASS With Windows Error Reporting On Modern Windows 11 #LSASSDumping #WerFaultSecure #PPLBypass #Windows11 #RedTeam https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html
Zerosalarium
Old But Gold, Dumping LSASS With Windows Error Reporting On Modern Windows 11
Use the offensive tool WSASS to dump the LSASS memory area by exploiting the vulnerability in WerFaultSecure.exe
pyLDAPGui - How It was Born #pyLDAPGui #LDAPBrowser #PythonGUI #RedTeaming #ActiveDirectory https://blog.zsec.uk/pyldapgui/
ZephrSec - Adventures In Information Security
pyLDAPGui - How It was Born
Python-based LDAP browser with GUI for AD pentesting & red teaming. Cross-platform PoC tool for exporting, searching & BloodHound integration.
Building a Scanner in Go #HTTP2CONNECT #Multiplexing #PortScanning #ProxyTunneling #NetworkSecurity https://blog.flomb.net/posts/http2connect/
blog.flomb.net
Playing with HTTP/2 CONNECT
In HTTP/1, the CONNECT method instructs a proxy to establish a TCP tunnel to a requested target. Once the tunnel is up, the proxy blindly forwards raw traffic in both directions. This mechanism is most commonly used to tunnel TLS traffic through forwarding…
PureVPN IPv6 leak #PureVPN #IPv6Leak #LinuxClients #FirewallBug #VPNSecurity https://anagogistis.com/posts/purevpn-ipv6-leak/
Anagogistis
PureVPN IPv6 leak
I discovered two issues while using PureVPN’s Linux clients (GUI v2.10.0, CLI v2.0.1) on Ubuntu 24.04.3 LTS (kernel 6.8.0, iptables-nft)1. One affects IPv6 traffic, the other the system firewall.
1. IPv6 leak after reconnect After a network transition (e.g.…
1. IPv6 leak after reconnect After a network transition (e.g.…
Linux Kernel Runtime Guard (LKRG) 1.0 #LKRG #LinuxKernel #KernelSecurity #ExploitDetection #RuntimeIntegrity https://www.openwall.com/presentations/NullconBerlin2025-LKRG/
How An Authorization Flaw Reveals A Common Security Blind Spot: CVE-2025-59305 Case Study #AuthorizationFlaw #CVE202559305 #DataCorruption #DepthFirstSecurity #SecurityBlindSpot https://depthfirst.com/post/how-an-authorization-flaw-reveals-a-common-security-blind-spot-cve-2025-59305-case-study
Depthfirst
depthfirst | How An Authorization Flaw Reveals A Common Security Blind Spot: CVE-2025-59305 Case Study
We recently discovered a textbook example of this in Langfuse, a leading open-source LLM engineering platform with 16k stars on Github. A subtle flaw in its background job controls allowed any authenticated user to access highly sensitive administrative functions…
Remote Code Execution and Authentication Bypass in Materialise OrthoView (CVE-2025-23049) #OrthoView #RCE #AuthBypass #DICOMsecurity #CommandInjection https://outurnate.com/remote-code-execution-and-authentication-bypass-in-materialise-orthoview-cve-2025-23049
Outurnate
Remote Code Execution and Authentication Bypass in Materialise OrthoView (CVE-2025-23049)
Personal projects, research, and other things I find worth sharing
Hacking Furbo - A Hardware Research Project – Part 2: Mobile and P2P Exploits #FurboHacking #MobileAppSecurity #P2PExploits #SSRF #Frida https://www.softwaresecured.com/post/hacking-furbo-a-hardware-research-project-part-2-mobile-and-p2p-exploits
Softwaresecured
Hacking Furbo 2: Mobile App and P2P Exploits
We reverse the Android app, hook TUTK Kalay P2P with Frida, capture commands, find token remnants in memory, trigger SSRF to custom.wav, and show a treat-toss DoS.
IPv4/IPv6 Packet Fragmentation: Implementation Details #PacketFragmentation #IPv4IPv6 #PacketSmith #Networking #ProtocolImplementation https://packetsmith.ca/ipv4-ipv6-packet-fragmentation/
PacketSmith
IPv4/IPv6 Packet Fragmentation: Implementation Details - PacketSmith
IPv4/IPv6 Packet Fragmentation: Implementation Details Introduction In release v2.0, we’ve shipped PacketSmith with support for IPv4/IPv6 fragmentation detection and reassembly. Additionally, we’ve detailed some of the implementation details in the public…