Threat Research Blog
-
Read ArticleA Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows
Introduction The topic of memory corruption exploits can be a difficult one to initially break in to. When I first began to explore this topic on the Windows OS I was immediately struck by the...
-
Read ArticleIntel, Please Stop Assisting Me
This post focuses on two vulnerabilities the CyberArk Labs team uncovered in the Intel Support Assistant that affected the millions of Windows machines that run this software. The first...
-
Read ArticleAttacking Kubernetes Clusters Through Your Network Plumbing: Part 1
Have you ever wondered how the water supply gets into your home and to the taps? Honestly it may not be something you ever thought about. When receiving a system that works “out of the...
-
Read ArticleLoRaWAN & MQTT: What to Know When Securing Your IoT Network
The LoRaWAN protocol wirelessly connects battery-powered devices to the internet. Because of its ability to communicate long-range with little battery consumption, it is likely to be the network...
-
Read ArticleAnti-Virus Vulnerabilities: Who’s Guarding the Watch Tower?
This blog entry is a special anti-malware edition showcasing how the most common bugs security products suffer from can allow a standard user to escalate into a privileged user. What we found...
-
Read ArticleAn Introduction to Hardware Hacking
With the introduction of more and more IOT and embedded devices in the market, hackers are starting to find firmware exploitation as a more viable mechanism for gaining access into networks and...
-
Read ArticleRunning Sensitive Apps in WSL: (SAFE + SAFE) < SAFE
This blog is intended to be a warning bell and to draw attention to a potential security risk involved in running sensitive applications in the WSL (“Windows Subsystem Linux”) Windows utility. As...
-
Read ArticleMake Memcpy Safe Again: CodeQL
Last February, I went to #OffensiveCon20 and, as you might expect, it was awesome. The talks were great, but the real gem was the CodeQL workshop that was held the second day of the event....
-
Read ArticleUsing Kubelet Client to Attack the Kubernetes Cluster
In this blog post, we are going to look at the Kubernetes agent, kubelet (see Figure 1), which is responsible for the creation of the containers inside the nodes and show how it can be...
-
Read ArticleMasking Malicious Memory Artifacts – Part III: Bypassing Defensive Scanners
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add...
-
Read ArticleDIY: Hunting Azure Shadow Admins Like Never Before
TL;DR Cloud technologies are ubiquitous and most organizations rely on cloud vendors to provide them with critical services and computing workloads. This ecosystem makes organizations deeply...
-
Read ArticleMasking Malicious Memory Artifacts – Part II: Insights from Moneta
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add...
-
Read ArticleMasking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add...
-
Read ArticleIntroducing Evasor: A New Pen Test Tool for WindowAppLocker
For anyone who may not be familiar, Windows AppLocker is an application whitelisting technology that allows administrators to control which executable files are allowed to be executed. With...
-
Read ArticleGroup Policies Going Rogue
This blog –part of a year-long research project that uncovered 60 different vulnerabilities across major vendors – discusses a vulnerability in the Windows group policy object (GPO) mechanism....
-
Read ArticleBug Hunting Stories: Schneider Electric & The Andover Continuum Web.Client
As a penetration tester, my mission is to find vulnerabilities. To sharpen my skills and to stay up-to-date with new technologies, I spend my free time hacking on numerous bug bounty programs on...
-
Read ArticleWhen a CLI Falls for an Attacker
A few months ago, I was working on research that involved spanning up and down multiple virtual machines in AWS and used AWS CLI in order to manage them. I decided to make a small...
-
Read ArticleBeware of the GIF: Account Takeover Vulnerability in Microsoft Teams
Executive Summary As more and more business is conducted from remote locations, attackers are focusing their efforts on exploiting the key technologies – like Zoom and Microsoft Teams – that...
-
Read ArticleWild Temporary Tokens and Where to Find Them – AWS Edition
AWS is one of the most successful cloud solutions available today. As a pioneer in the infrastructure-as-a-service (IaaS) scene, AWS has more than a million customers. Part of that success is...
-
Read ArticleExplain Like I’m 5: Remote Desktop Protocol (RDP)
Table of Contents Introduction RDP Connection Connection Sequence | Basic Input and Output Channels in RDP | Data Compression RDP Security | Recent RDP Vulnerabilities Conclusion References ...
-
Loading More...


