Rich Warren

1.6K posts

Rich Warren banner
Rich Warren

Rich Warren

@buffaloverflow

Red Team & Offensive Security Research @AmberWolfSec // @buffaloverflow.rw.md on bsky

Katılım Mayıs 2011
668 Takip Edilen10.6K Takipçiler
Haifei Li
Haifei Li@HaifeiLi·
A quick update for hunting the CVE-2026-21509 0day sample.. Weird (and good) stuff! - my EXPMON system has an existing Indicator Logic specifically detecting "shellexplorer" (the same {EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B}, "shellexplorer" is the progid name) OLE/COM/ActiveX object, which is the key to look for potential CVE-2026-21509 0day! And I have forgotten why I wrote that detection logic in the first place, really..😅 But anyway, if you spot a sample which was detected with such an Indicator on @EXPMON_ , then it could be a very good candidate! See this example pub.expmon.com/analysis/31153…, the Indicator's name is "activex compatibility shellexplorer registry key accessed". Please note that even the sample is not detected ("Undetected"), as long as it's detected w/ such Indicator, it could still be the 0day. You then test in an unpatched env to see what's going on. Please note that you should not connect your testing VM to the Internet because once you connect to the Internet Office will get patched automatically with some server-side configuration which is already deployed according to Microsoft's advisory. Or, you can let me know your submission, I have a VM ready for testing. Happy hunting! :)
Haifei Li tweet media
English
3
9
27
6.3K
Haifei Li
Haifei Li@HaifeiLi·
With the CLSID "{EAB22AC3-30C1-11CF-A7EB-0000C05BAE0B}" disclosed, I think it's not very hard to create the sample myself, or someone want to save me time by sending me one? I want to test the @EXPMON_ system.:)
English
2
1
18
3.4K
Rich Warren
Rich Warren@buffaloverflow·
@mkolsek @HaifeiLi @EXPMON_ @yorickkoster this trick still works on Word 2019 (10417.20080). No idea if it's actually the security feature bypass they patched, but this does actually work in preview pane.. so ..🤷‍♂️
English
1
0
3
58
Rich Warren
Rich Warren@buffaloverflow·
@_xpn_ 💯 I felt the same when I saw it earlier. It’s sad to see the monetisation of outrage seep through into the infosec TL, but good to call out this shitty behaviour
English
1
0
3
421
Adam Chester 🏴‍☠️
@buffaloverflow Winds me up, and I know I’m doing worse by retweeting, but hopefully calling out this BS first time stops any others from thinking it’s a good idea :/
English
1
0
4
612
Rich Warren retweetledi
Ollie Whitehouse
Ollie Whitehouse@ollieatnowhere·
Zero Trust is not a product it is an approach - at the @NCSC we have just released demystifying zero trust which addresses common misconceptions, and provides practical advice on when and how it should be adopted. ncsc.gov.uk/collection/zer…
English
1
24
69
12.9K
Rich Warren
Rich Warren@buffaloverflow·
@cyb3rops Probably an eula violation so you shouldn’t do it, but as a point of interest MS ship a big list of “FriendlyFile” hashes in Defender’s vdm db #threat_begin--threat_end" target="_blank" rel="nofollow noopener">github.com/commial/experi…
English
0
0
0
500
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
1 TB of diverse malware - trivial. 1 TB of truly diverse goodware - now that’s the challenge.
English
8
4
126
13.6K
Rich Warren
Rich Warren@buffaloverflow·
@irsdl Haha thanks 😆 Unfortunately readme\.md was taken but I like your interpretation!
English
0
0
1
124
Rich Warren
Rich Warren@buffaloverflow·
I made a website that lets you generate VBA macro docs in your browser (using rust+wasm!): vba.rw.md ^just for fun, inb4 "motw kills macros" etc. 😅
English
4
29
147
9K
Rich Warren
Rich Warren@buffaloverflow·
@irsdl True, sometimes bugs just find you 😅
English
1
0
1
133
Rich Warren
Rich Warren@buffaloverflow·
@irsdl A funny but ironic accident, good spot though! 😆
English
2
0
1
180
Rich Warren
Rich Warren@buffaloverflow·
@irsdl Does this count as second order stored XSS? 😅
English
1
0
9
1.2K
Soroush Dalili
Soroush Dalili@irsdl·
Visiting NCC Group’s blogs right now feels like a CTF challenge: decipher the mangled text while dodging XSS pop-ups. Better to use web archive to see the original content but they have even changed the URLs! Example: nccgroup.com/research-blog/… The fox-it.com etc are also the same. My blog posts there are all ruined for sure which is a shame. I have to repost them all in my own blog.
Soroush Dalili tweet media
English
6
19
132
20.3K