Obscurities with MS Teams
MS Teams does not verify most of the messages, which allows to do some strange things. Strangest behaviour is the crosstenant fileshare, two days late to the party but as the draft was ready releasing anyway. But thats not all :)
badoption.eu/blog/2023/06/2…
How to avoid this WhatsApp account takeover?
1. Make sure that your voicemail pincode is not the default pincode.
2. Setup 2FA pincode on your WhatsApp
The recent WhatsApp accounts takeover is simple and genius.
This is how it works:
You're sleeping.
A "hacker" tries to login to your account via WhatsApp.
You get a text message with a pincode that says "Do not share this".
You don't share it, yet you still get hacked.
How?
After a bit of research it came out that it's possible to leverage Teams functionalities for a better phishing scenario. The idea is using it as an alternative way of initial access. Hope it can help some red team guys out there!
posts.inthecyber.com/leveraging-mic…
I developed a Remote Code Execution PoC exploit for the Exim Use-After-Free that was recently disclosed (as part of @qualys 21Nails advisory). Tested just on Exim 4.92. PoC available: github.com/lockedbyte/CVE…
Just published a remote shellcode loader I've been working on to show why we shouldn't rely solely on real-time injection alerting. Writeup in a few days :)
My C sucks so it's a "PoC".
github.com/xinbailu/DripL…
Hey all! first blog post. Are the popular fuzzers just for binary exploitation? In this blog post I outline how you can find logic issues in web-related regular expressions using differential fuzzing. (spoiler: 29 lines of python using Google Atheris)
defparam.medium.com/finding-issues…
High-level approaches for finding vulnerabilities < a very well written vulnerability research primer written by @jackson_t in 2017 (but still 100% relevant today)
jackson-t.ca/finding-vulner…
My first ever blog post: Anatomy of an Exploit: RCE CVE-2020-1350 #SIGRed. RCE PoC included, for research purposes. This was my first userland Windows heap exploit and I hope a deep dive into the process will help others. Patch or apply the workaround. graplsecurity.com/post/anatomy-o…
A short post to address an exploit chain I did in last year. Both slides and YouTube video are online now - A Journey Combining Web Hacking and Binary Exploitation in Real World! blog.orange.tw/2021/02/a-jour…