Anthony Weems

179 posts

Anthony Weems banner
Anthony Weems

Anthony Weems

@amlweems

Cloud Vulnerability Research • The opinions stated here are my own, not those of my company.

Katılım Nisan 2008
270 Takip Edilen3K Takipçiler
Sabitlenmiş Tweet
Anthony Weems
Anthony Weems@amlweems·
Learn how Google CVR could have potentially exfiltrated Gemini 1.0 Pro before launch last year. We describe the vulnz, the fix, and tips for bughunters. Also, shout-out to @epereiralopez for teaming up to adapt this work to another cloud provider. bughunters.google.com/blog/567986357…
Google Cloud Security@GoogleCloudSec

Today our Cloud Vulnerability Research (CVR) team shared this research into LLM security, which is broadly applicable to AI domain security practitioners working in this rapidly evolving space. Learn more: bit.ly/3TWYrF3

English
2
16
62
36.6K
Anthony Weems
Anthony Weems@amlweems·
🕺"Leaving tradition" is one of the best parts of Google's security culture and has led to some of the most interesting attack chains I've gotten to work on. There's nothing quite like starting with a blank slate and ending with a root shell.💃
Google VRP (Google Bug Hunters)@GoogleVRP

Celebrating 15 years of password hacking 💻 🔑, Swiss Army knives (and sometimes even chainsaws or swords) included! 😲 Discover how Google's security teams turn employee farewells into security tests. bughunters.google.com/blog/635526578…

English
0
1
12
1.5K
Anthony Weems
Anthony Weems@amlweems·
Effective today, Google will issue CVEs for critical vulnerabilities in Google Cloud that are fixed internally and do not require customer action or patching. cloud.google.com/blog/products/…
English
2
25
83
11.2K
Anthony Weems
Anthony Weems@amlweems·
Before joining Google, I submitted some Cloud bugs to the Google Vulnerability Rewards Program (VRP). Today, we announced a dedicated Cloud VRP and I'm so excited to be a part of the program that got me into Google in the first place. Send us vulnz 🙂 cloud.google.com/blog/products/…
English
2
12
72
5.8K
Anthony Weems retweetledi
Phil Venables
Phil Venables@philvenables·
Cloud CISO Perspectives Blog for mid-October ‘24 is up covering: - Sharing AI vulnerability research - Virtual red teams - Advances in DDoS mitigation - Securing inherited cloud deployments - Can AI keep a secret? - and more….. cloud.google.com/blog/products/…
English
0
5
10
1.5K
Anthony Weems retweetledi
offensivecon
offensivecon@offensive_con·
The Mines of Kakadûm: Blindly Exploiting Load-Balanced Services by @scannell_simon and @amlweems is now live!
offensivecon tweet media
English
1
7
42
11.1K
Anthony Weems
Anthony Weems@amlweems·
@bl4sty @julianor Yeah, I noticed this and was wondering if it was a bug. It seems strange to allow setting the request type but not the body.
English
0
0
1
76
blasty
blasty@bl4sty·
@amlweems @julianor also the third command byte lets you override the monitor_reqtype that is sent to the monitor process, I'm trying to figure out how that is useful right now (as the body of the monitor request is still formed like a MONITOR_REQ_KEYALLOWED request..)
English
2
0
1
180
Juliano Rizzo
Juliano Rizzo@julianor·
Reverse engineering by @amlweems reveals 3 flaws that allows attackers to use the backdoor without the private key, using only a captured message signed for the target host: 1. Lack of replay protection 2. Symmetric encryption with a hardcoded key, 3. Partially signed commands
Juliano Rizzo tweet media
Anthony Weems@amlweems

I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-) github.com/amlweems/xzbot

English
7
95
354
72.7K
Anthony Weems
Anthony Weems@amlweems·
@bl4sty @julianor Yes, but I don't yet understand their purpose. My hunch is that command 1 might be for identifying a vulnerable server w/o calling system(). Command 3 looks interesting.
English
0
0
0
164
blasty
blasty@bl4sty·
@amlweems @julianor yeah, the last 2 bytes of the 5 bytes flag for command 0x2 are a u16 size of the command string to be included in the signature. have you played with commands 1 and 3 at all?
English
2
0
0
234
Anthony Weems
Anthony Weems@amlweems·
@therealshodan fyi: if you search for keys, the magic command byte can be obfuscated, I've updated the code with an example.
English
0
0
2
209
Anthony Weems
Anthony Weems@amlweems·
@solardiz This is an excellent point, I had only been considering the simple case where the values were e.g. 2*1+0, but it makes more sense that they'd be large ints to look less suspicious. I'll update the .patch later today.
English
1
0
4
2.9K
Solar Designer
Solar Designer@solardiz·
@amlweems That's a cool project, thanks! You describe the 3 magic values as 32-, 32-, and 64-bit, but in openssh.patch you treat them as bytes (which means more false positives). How is it in backdoor code? I think either your description or the "patch" should be adjusted to match.
English
1
0
4
3.4K
Anthony Weems
Anthony Weems@amlweems·
I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-) github.com/amlweems/xzbot
Anthony Weems tweet media
English
51
835
3.9K
631.7K
Anthony Weems
Anthony Weems@amlweems·
@julianor @vx__notduck1e @CodeAsm_ I've tested and signature replay works as expected, allowing modification of the command (except the first 5 chars). But I agree it is unrealistic until we actually capture a real signature (which may never happen).
English
0
0
6
114
Juliano Rizzo
Juliano Rizzo@julianor·
@vx__notduck1e @CodeAsm_ @amlweems About the PoC: I agree with you about PoCs I could make a PoC of the replay with the command extended using amlweems code, however, it will be unrealistic because we don't know if we can capture a signed message in real life (SSH handshake)
English
1
0
1
216
Anthony Weems
Anthony Weems@amlweems·
@therealshodan Did you capture SSH certificates as well? The payload is embedded in the CA signing key in the cert and will always start with 16 bytes that match a specific pattern. (see github.com/amlweems/xzbot for the payload format)
English
1
0
3
215