DJI - The ART of obfuscation
https://blog.quarkslab.com/dji-the-art-of-obfuscation.html
#reverse #mobile #android #obfuscation
https://blog.quarkslab.com/dji-the-art-of-obfuscation.html
#reverse #mobile #android #obfuscation
Quarkslab
DJI - The ART of obfuscation - Quarkslab's blog
Study of an Android runtime (ART) hijacking mechanism for bytecode injection through a step-by-step analysis of the packer used to protect the DJI Pilot Android application.
π₯9β€5π2π΄2
LayeredSyscall β Abusing VEH to Bypass EDRs
https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs
#redteam #edr #hook #bypass
https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs
#redteam #edr #hook #bypass
White Knight Labs
LayeredSyscall - Abusing VEH to Bypass EDRs | White Knight Labs
Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows.
π₯6π΄3β€2π1
Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.
https://github.com/frkngksl/Shoggoth
#redteam
https://github.com/frkngksl/Shoggoth
#redteam
GitHub
GitHub - frkngksl/Shoggoth: Shoggoth: Asmjit Based Polymorphic Encryptor
Shoggoth: Asmjit Based Polymorphic Encryptor. Contribute to frkngksl/Shoggoth development by creating an account on GitHub.
π8π΄3π2
SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a additive feedback loop to encode given binary instructions similar to LSFR. This project is the reimplementation of the original Shikata ga nai in golang with many improvements.
https://github.com/EgeBalci/sgn
#redteam #golang
https://github.com/EgeBalci/sgn
#redteam #golang
GitHub
GitHub - EgeBalci/sgn: Shikata ga nai (δ»ζΉγγͺγ) encoder ported into go with several improvements
Shikata ga nai (δ»ζΉγγͺγ) encoder ported into go with several improvements - EgeBalci/sgn
π₯3π€2π1
How to Bypass Golang SSL Verification
https://www.cyberark.com/resources/threat-research-blog/how-to-bypass-golang-ssl-verification
#golang #ssl #bypass #reverse #web #pentest
https://www.cyberark.com/resources/threat-research-blog/how-to-bypass-golang-ssl-verification
#golang #ssl #bypass #reverse #web #pentest
Cyberark
How to Bypass Golang SSL Verification
Golang applications that use HTTPS requests have a built-in SSL verification feature enabled by default. In our work, we often encounter an application that uses Golang HTTPS requests, and we have...
π€5π2
V8 Sandbox escape/bypass/violation and VR collection
https://github.com/xv0nfers/V8-sbx-bypass-collection
#v8 #sandbox #escape
https://github.com/xv0nfers/V8-sbx-bypass-collection
#v8 #sandbox #escape
GitHub
GitHub - xv0nfers/V8-sbx-bypass-collection
Contribute to xv0nfers/V8-sbx-bypass-collection development by creating an account on GitHub.
π₯6
C++ Unwind Exception Metadata: a Hidden Reverse Engineering Bonanza
https://www.msreverseengineering.com/blog/2024/8/20/c-unwind-metadata-1
#reverse #cpp #type #reconstruction #hints
https://www.msreverseengineering.com/blog/2024/8/20/c-unwind-metadata-1
#reverse #cpp #type #reconstruction #hints
MΓΆbius Strip Reverse Engineering
C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza β MΓΆbius Strip Reverse Engineering
The worst part of reverse engineering C++ programs -- or really, any program that uses custom structure types with no definitions provided -- is that information about structures is often incomplete, sporadic, and isolated. Consider the following function:
π₯4
POC for trigerring CVE-2024-38063 (RCE in tcpip.sys)
https://github.com/ynwarcs/CVE-2024-38063
#expdev #poc
https://github.com/ynwarcs/CVE-2024-38063
#expdev #poc
GitHub
GitHub - ynwarcs/CVE-2024-38063: poc for CVE-2024-38063 (RCE in tcpip.sys)
poc for CVE-2024-38063 (RCE in tcpip.sys). Contribute to ynwarcs/CVE-2024-38063 development by creating an account on GitHub.
β€10π3
Exploiting the Windows Kernel via Malicious IPv6 Packets (CVE-2024-38063)
https://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html
#expdev #poc
https://malwaretech.com/2024/08/exploiting-CVE-2024-38063.html
#expdev #poc
Malwaretech
CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6
Performing a root cause analysis & building proof-of-concept for CVE-2024-38063, a CVSS 9.8 Vulnerability In the Windows Kernel IPv6 Parser
π11π2
Native function and Assembly Code Invocation
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/
#reverse #idapro
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/
#reverse #idapro
Check Point Research
Native function and Assembly Code Invocation - Check Point Research
Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. While in some cases it is just possible to understand the function logic and reimplement it in a higher-levelβ¦
π₯10π4π₯°2π€1
0-Click exploit in MediaTek Wi-Fi chipsets affects routers and smartphones / Exploiting (CVE-2024-20017) 4 different ways
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
#expdev #poc
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
#expdev #poc
hyprblog
4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
a post going over 4 exploits for CVE-2024-20017, a remotely exploitable buffer overflow in a component of the MediaTek MT7622 SDK.
β€10π3π₯1
Attacking UNIX Systems via CUPS, Part I
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1
#linux #rce #printer
CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177 have been assigned around these CUPS issues.
CVSS 9.9
This remote code execution issue can be exploited across the public Internet via a UDP packet to port 631 without needing any authentication, assuming the CUPS port is open through your router/firewall. LAN attacks are also possible via spoofing zeroconf / mDNS / DNS-SD advertisements.
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
A series of bugs in the CUPS printers discovery mechanism (cups-browsed) and in other components of the CUPS system, can be chained together to allow a remote attacker to automatically install a malicious printer (or hijack an existing one via mDNS) to execute arbitrary code on the target host as the lp user when a print job is sent to it.
https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1
#linux #rce #printer
π€£8β€6π4π4π₯2π₯°2π2π€―1
Complete list of LPE exploits for Windows (starting from 2023)
https://github.com/MzHmO/Exploit-Street
#windows #expdev #lpe
https://github.com/MzHmO/Exploit-Street
#windows #expdev #lpe
GitHub
GitHub - MzHmO/Exploit-Street: Complete list of LPE exploits for Windows (starting from 2023)
Complete list of LPE exploits for Windows (starting from 2023) - MzHmO/Exploit-Street
β€13π€―3π2π₯±2π€£1
Forwarded from Malware Research / RedTeam / News
New blog on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that identified by author in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.
https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/
Proof-of-concept for the AMSI bypass and an implementation of a CLR memory manager is on GitHub. We can implement custom memory routines and track all allocations made by the CLR.
https://github.com/passthehashbrowns/Being-A-Good-CLR-Host
#redteam #net #clr
https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/
Proof-of-concept for the AMSI bypass and an implementation of a CLR memory manager is on GitHub. We can implement custom memory routines and track all allocations made by the CLR.
https://github.com/passthehashbrowns/Being-A-Good-CLR-Host
#redteam #net #clr
Security Intelligence
Being a good CLR host β Modernizing offensive .NET tradecraft
Learn how red teams can modernize their use of .NET assemblies using CLR customizations.
β‘9β€6π4