Playing in the (Windows) Sandbox: A Windows Sandbox deep dive.
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
#reverse #hyperv #sandbox #internals #darw1n
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
#reverse #hyperv #sandbox #internals #darw1n
Check Point Research
Playing in the (Windows) Sandbox - Check Point Research
Research By: Alex Ilgayev Introduction Two years ago, Microsoft released a new feature as a part of the Insiders build 18305 – Windows Sandbox. This sandbox has some useful specifications: Integrated part of Windows 10 (Pro/Enterprise). Runs on top of Hyper…
CVE-2021-27365: Linux kernel LPE Exploit. Now with symbols for the latest RHEL8 kernel. Get it while it's still an 0day!
Github: https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
The following report discloses three distinct vulnerabilities discovered by GRIMM while researching the Linux kernel. The first vulnerability is a heap buffer overflow, the second is a kernel pointer leak, and the third is an out-of-bounds kernel memory read. All three vulnerabilities are associated with the iSCSI subsystem.
Article: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html?m=1
#reverse #lpe #heap #bof #expdev #linux #darw1n
Github: https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
The following report discloses three distinct vulnerabilities discovered by GRIMM while researching the Linux kernel. The first vulnerability is a heap buffer overflow, the second is a kernel pointer leak, and the third is an out-of-bounds kernel memory read. All three vulnerabilities are associated with the iSCSI subsystem.
Article: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html?m=1
#reverse #lpe #heap #bof #expdev #linux #darw1n
GitHub
NotQuite0DayFriday/2021.03.12-linux-iscsi at trunk · grimm-co/NotQuite0DayFriday
This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly. - grimm-co/NotQuite0DayFriday
VM Detection Tricks, Part 1: Physical memory resource maps
In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
https://labs.nettitude.com/blog/vm-detection-tricks-part-1-physical-memory-resource-maps/
#reverse #detect #vm #malware #redteam #darw1n
In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
https://labs.nettitude.com/blog/vm-detection-tricks-part-1-physical-memory-resource-maps/
#reverse #detect #vm #malware #redteam #darw1n
LRQA
VM Detection Tricks, Part 1: Physical memory resource maps
In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
x64dbg plugin for simple spoofing of CPUID instruction behavior
https://github.com/jonatan1024/CpuidSpoofer
#reverse #tools #plugin #x64 #debugger #hwid #darw1n
https://github.com/jonatan1024/CpuidSpoofer
#reverse #tools #plugin #x64 #debugger #hwid #darw1n
GitHub
GitHub - jonatan1024/CpuidSpoofer: x64dbg plugin for simple spoofing of CPUID instruction behavior
x64dbg plugin for simple spoofing of CPUID instruction behavior - jonatan1024/CpuidSpoofer
fpicker: Fuzzing with Frida
https://insinuator.net/2021/03/fpicker-fuzzing-with-frida/
Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms supported by Frida.
https://github.com/ttdennis/fpicker
#reverse #afl #frida #darw1n
https://insinuator.net/2021/03/fpicker-fuzzing-with-frida/
Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms supported by Frida.
https://github.com/ttdennis/fpicker
#reverse #afl #frida #darw1n
How I cut GTA Online loading times by 70% (how the Reverse Engineering helps to improve game and earn bug bounty at H1) https://nee.lv/2021/02/28/How-I-cut-GTA-Online-loading-times-by-70/ #reverse #dukeBarman
meh.
How I cut GTA Online loading times by 70%
GTA Online. Infamous for its slow loading times. Having picked up the game again to finish some of the newer heists I was shocked (/s) to discover that it still loads just as slow as the day it was re
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
https://github.com/D3VI5H4/Antivirus-Artifacts
#malware #av #redteam #artifacts #darw1n
https://github.com/D3VI5H4/Antivirus-Artifacts
#malware #av #redteam #artifacts #darw1n
GitHub
GitHub - ethereal-vx/Antivirus-Artifacts: Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes…
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot. - ethereal-vx/Antivirus-Artifacts
In-the-Wild Series: October 2020 0-day discovery
https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html
In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-wild. These exploits were delivered via "watering hole" attacks in a handful of websites pointing to two exploit servers that hosted exploit chains for Android, Windows, and iOS devices. These attacks appear to be the next iteration of the campaign discovered in February 2020 and documented in below blog posts:
Part1: Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html
Part2: Chrome Infinity Bug
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html
Part3: Chrome Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html
Part4: Android Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Part5: Android Post-Exploitation
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Part6: Windows Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html
#reverse #expdev #rce #lpe #sandbox #escape #android #ios #windows #chrome #browser #darw1n
https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html
In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-wild. These exploits were delivered via "watering hole" attacks in a handful of websites pointing to two exploit servers that hosted exploit chains for Android, Windows, and iOS devices. These attacks appear to be the next iteration of the campaign discovered in February 2020 and documented in below blog posts:
Part1: Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html
Part2: Chrome Infinity Bug
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html
Part3: Chrome Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html
Part4: Android Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Part5: Android Post-Exploitation
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Part6: Windows Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html
#reverse #expdev #rce #lpe #sandbox #escape #android #ios #windows #chrome #browser #darw1n
Blogspot
In-the-Wild Series: October 2020 0-day discovery
Posted by Maddie Stone, Project Zero In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-w...
BinDiff 7 beta coming soon. Request yours here: https://docs.google.com/forms/d/e/1FAIpQLSdEPDTnopPEzbXXmTktshVfJb28YiFahYoRfya92yIi5iEFdg/viewform #reverse #dukeBarman
Google Docs
BinDiff 7 Beta
Test-drive the new BinDiff 7 before release.
Changes:
- Full support for IDA Pro 7.6
- New open-source Binary Ninja exporter
- Faster BinExport
- JSON based config file format
- Better HiDPI support
- macOS: Universal Binaries supporting ARM64 (aka "Apple…
Changes:
- Full support for IDA Pro 7.6
- New open-source Binary Ninja exporter
- Faster BinExport
- JSON based config file format
- Better HiDPI support
- macOS: Universal Binaries supporting ARM64 (aka "Apple…
Free Malware Analysis training. Volume 1 via hasherezade https://github.com/hasherezade/malware_training_vol1 (in progress) #reverse #malware #dukeBarman
GitHub
GitHub - hasherezade/malware_training_vol1: Materials for Windows Malware Analysis training (volume 1)
Materials for Windows Malware Analysis training (volume 1) - hasherezade/malware_training_vol1
r0 Crew (Channel)
https://twitter.com/h0t_max/status/1316028532972281856?s=20 #reverse #intel #microcode
Twitter
Maxim Goryachy
[1/4]People ask us (+@_Dmit and @_markel___) for details about undocumented crbus instructions. We recorded the demo showing that for access to crbus requires only execute arbitrary code with root/admin privilege. (details below)
D810: Creating an extensible deobfuscation plugin for IDA Pro
https://eshard.com/posts/d810_blog_post_1/
D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.
https://gitlab.com/eshard/d810
#reverse #ida #plugin #deobfucation #obfuscation #QwErTyReverse
https://eshard.com/posts/d810_blog_post_1/
D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.
https://gitlab.com/eshard/d810
#reverse #ida #plugin #deobfucation #obfuscation #QwErTyReverse
Cutter and Rizin will participate in Google Summer of Code!
If you are interested in participating as part of Rizin:
- Instructions: https://rizin.re/gsoc/2021/
- The official GSOC document: https://summerofcode.withgoogle.com/organizations/5718117306597376/
- Join the dedicated mattermost channel: https://im.rizin.re/rizinorg/channels/gsoc-2021-applicants
Official tweet - https://twitter.com/cutter_re/status/1369600822162698241
#reverse #rizin #dukeBarman
If you are interested in participating as part of Rizin:
- Instructions: https://rizin.re/gsoc/2021/
- The official GSOC document: https://summerofcode.withgoogle.com/organizations/5718117306597376/
- Join the dedicated mattermost channel: https://im.rizin.re/rizinorg/channels/gsoc-2021-applicants
Official tweet - https://twitter.com/cutter_re/status/1369600822162698241
#reverse #rizin #dukeBarman
Rizin
GSoC 2021
TL;DR Jump to the Ideas list.
Introduction Each year since 2015, we have participated in Google Summer of Code as the Radare2 project and accomplished many goals. This year we participate as a fork - Rizin, but effectively continuing the same process and…
Introduction Each year since 2015, we have participated in Google Summer of Code as the Radare2 project and accomplished many goals. This year we participate as a fork - Rizin, but effectively continuing the same process and…
How the Web Audio API is used for browser fingerprinting
https://fingerprintjs.com/blog/audio-fingerprinting/
#osint #browser #p_rusanov
https://fingerprintjs.com/blog/audio-fingerprinting/
#osint #browser #p_rusanov
Fingerprint
Audio Fingerprinting: What It Is + How It Works with Web API
Learn how audio fingerprinting, a highly stable browser fingerprinting technique, is used to uniquely identify visitors without cookies.
Spectre v4: Security Analysis of AMD Zen3 Architecture Predictive Store Forwarding https://www.amd.com/system/files/documents/security-analysis-predictive-store-forwarding.pdf #reverse #hardware #amd #dukeBarman
AMD
AMD Documentation Hub
Find solution briefs, datasheets, tuning guides, programmer references, and more documentation for AMD processors, accelerators, graphics, and other products.
Go-iOS was inspired by the wonderful libimobiledevice. It can do all of what libimobiledevice can do and more. Highlights:
- run XCTests including WebdriverAgent on Linux, Windows and Mac
- start and stop apps
- Use a debug proxy to reverse engineer every tool Mac OSX has, so you can contrib to go-ios or build your own
- use Accessibility Inspector APIs
https://github.com/danielpaulus/go-ios
#reverse #iOS #dukeBarman
- run XCTests including WebdriverAgent on Linux, Windows and Mac
- start and stop apps
- Use a debug proxy to reverse engineer every tool Mac OSX has, so you can contrib to go-ios or build your own
- use Accessibility Inspector APIs
https://github.com/danielpaulus/go-ios
#reverse #iOS #dukeBarman
GitHub
GitHub - danielpaulus/go-ios: This is an operating system independent implementation of iOS device features. You can run UI tests…
This is an operating system independent implementation of iOS device features. You can run UI tests, launch or kill apps, install apps etc. with it. - GitHub - danielpaulus/go-ios: This is an oper...