prxcmn

3.1K posts

prxcmn banner
prxcmn

prxcmn

@prxcmon

tiap weekend kalo gak ngoding, PoC research, ya nimbrung di https://t.co/09BGDEa5zs

Sysxnternals Ste, Wu-Tang dist Katılım Temmuz 2023
998 Takip Edilen224 Takipçiler
Sabitlenmiş Tweet
prxcmn
prxcmn@prxcmon·
"Siaga 1 TNI" to protect the country from foreign invasion but in reality it's against the most critical civilians and to protect the Solo-Djojohadikusumo Dyarchical cronies as well It could be against yours too
Harian Kompas@hariankompas

Hasil investigasi independen terhadap data dan rekaman kamera pengawas yang dilakukan masyarakat sipil terhadap peristiwa penyiraman aktivis Andrie Yunus menyimpulkan bahwa pelaku di lapangan setidaknya berjumlah 16 orang. Baca di Kompas.id ➡️ kompas.id/artikel/pelaku… #AndrieYunus #Kontras #PelanggaranHAM #AdadiKompas

English
0
0
0
123
prxcmn
prxcmn@prxcmon·
Edan taktik jurnalis irak
Ravio Patra@raviopatra

Gambar 1: Feed @magdaleneid di IG ada berita investigasi TAUD tentang 16+ pelaku percobaan pembunuhan Andrie Yunus. Gambar 2: Beritanya hilang dari feed Magdalene kemarin. Gambar 3: Notifikasi jika klik berita itu dari link yang ada sebelumnya. Apa yang coba disembunyikan?

Indonesia
0
0
1
81
prxcmn retweetledi
flux
flux@0xfluxsec·
As I teased earlier - I used Claude Code to (near enough) autonomously develop an exploit for a known vulnerable driver. Claude did it with no hesitation - from triage to exploit. As you can see, it was successful in privilege escalation. Read what I found below! This is a long read - but I hope you find it useful and an interesting topic to debate. As a background, through the last week I used GPT-5.4 to analyse a known vulnerable driver to identify any opportunities to exploit. I have already documented my process in detail (check my recent posts for context if you wish) - in short I connected it to an MCP in IDA Pro for GPT to find the vulnerability. It did it. I then asked it to develop an exploit but it refused, I had to write an exploit myself which I did, as a POC that it had found the vuln. The vulnerability in question is an arbitrary physical memory read & memory write - a super critical bug. There was one limiting factor to this, the driver was limited to only 32-bits of physical address, which covers up to 4 GB of physical RAM. On modern systems with 8+ GB RAM, EPROCESS structures for important processes (including System, PID 4) are typically allocated well above the 4 GiB boundary. The driver simply cannot address them. This is also where my knowledge starts breaking down; I'm not a well versed kernel exploit dev and there is always more to learn with low level security. So, I'm going to quote Claude here: But VirtualAlloc + VirtualLock has a key property: the physical pages backing locked user-space memory are guaranteed to be resident (non-pageable), and on x64 Windows with typical RAM configurations, user-mode allocations frequently land in low physical memory because the user-mode VA range starts from the bottom of the address space, and early allocations map to low physical pages. More precisely: you don't need the physical address to be below 4 GiB for EPROCESS — you need the payload to be below 4 GiB. The write primitive lets you write from a physical address into a kernel VA. ---- To the point before we return to Claude, I asked Claude to exploit the driver. Recall GPT refused.. well.. Claude to my (un)surprise, did not! Fantastic! For context I purchased the £20 p/m plan, and had to buy extra tokens also. So, off it went - I had to go back and forth over the course of several days to get the exploit working as 3 prompts.. YES THREE PROMPTS.. was enough to hit my cap.........!? But that aside, I did not have to guide it, only pass it what the console printed in my VM and the occasional crash dump when I hit a Blue Screen. Many iterations and £40 later, I tested it (this morning) and VIOLA, it managed to exploit the driver to get NT AUTHORITY\SYSTEM, the highest privilege level available in user mode. So back to the technical topic, as mentioned, the difficulty was that we only had a 32-bit register to use in order to overwrite critical structures in memory to elevate our privilege. Claude came up with the following strategy: 1. VirtualAlloc + VirtualLock a page in your own process — this pins it in physical RAM 2. Write your payload (the SYSTEM token value) into that page 3. Find the physical address of that page by scanning physical RAM for a sentinel you wrote alongside the payload 4. Use the write primitive: memmove(target_kernel_va, your_physical_page, 8) — this copies 8 bytes from your user page's physical address into the kernel VA of the target's EPROCESS.Token The user-mode page is virtually always sub-4GiB in physical address because Windows allocates low physical pages to user processes first (high memory is preferred for kernel use). Even if it weren't guaranteed, you'd just retry until you get a sub-4GiB physical page. One critical safety measure: you must exclude MMIO regions from the scan. Certain physical address ranges are memory-mapped I/O — reading them via MmMapIoSpace can trigger hardware side effects or cause an IRQL_NOT_LESS_OR_EQUAL BSOD. The registry CM_RESOURCE_LIST gives you the actual RAM ranges, so you scan only those. Early iterations that scanned the full 4 GiB range BSODed immediately upon hitting MMIO. I will include some screenshots in this post showing its thought process. ---- On to the code that it wrote, I (of course) asked it to write the exploit in Rust. Now, the code it wrote is 923 lines, kinda gross, lots of sweeping unsafe code, but I cannot fault the results. It provided good comments, descriptive code, and good problem solving. I don't really have much else to say on this point, good robot. ---- Now, this driver was abused by ransomware gangs for spreading their ransomware by elevating privilege and executing arbitrary code. Thankfully now - this driver is on the blocklist so I don't mind sharing the POC (I will leave a link in the comments to the code it created). For my own ethical sanity, from the horses mouth: "These vulnerabilities have been patched by both Paragon Software, and vulnerable BioNTdrv.sys versions blocked by Microsoft's Vulnerable Driver Blocklist". The implication of this is, in my opinion, massive. Ransomware gangs, hacktivists, nation states, now have the power to develop exploits at scale, with a lower barrier to entry to conduct their activity. So, that leads to the question - should companies such as OpenAI / Anthropic with their ChatGPT and Claude models restrict this? In my opinion - no. I think more good can come of it than bad - there are far more good people in the world who are trying to make things more secure, and with the advent of researchers and programmers using these tools to find and disclose vulnerabilities ethically, gives more credence to them being fixed and security tools & vendors being on top of the game. Adversaries are always going to have local LLMs as the tech evolves that is unrestricted - so the leading companies in this space should adopt and be ahead of the curve, giving researchers and devs the same power as the adversary. Also, as a fun idea, it could push people towards memory safe languages such as Rust which are significantly less prone to memory bugs that often allow remote code execution. Note that in this case, Rust would not have prevented this vulnerability, as it comes from a bad driver implementation, rather than a strict memory safety issue. ---- If you made it this far, thanks for reading, this turned out longer than expected and I may move it over to a blog post! I am working on a tool to automate this process at scale (more the discovery of vulnerabilities) so, make sure to follow me if you want to check in with the progress of that project! Remember - SECURE BOOT: ON, HVCI: ON, and known vulnerable driver blocklist: ON!
flux tweet mediaflux tweet mediaflux tweet mediaflux tweet media
English
16
79
501
49K
prxcmn retweetledi
faulty *ptrrr
faulty *ptrrr@0x_shaq·
pwndbg is for ctf players. gef is for hackers. vanilla gdb is for that one person who sells exploits to the goverment from his basement.
English
16
20
401
20.6K
prxcmn
prxcmn@prxcmon·
@bevbeh75 @Dandhy_Laksono Diancam azab karena "menista" nabi jokowi a.s. dgn: - disiram air keras - dipukul helm taktikal - atau dilindas rantis
Indonesia
0
0
0
95
prxcmn retweetledi
POC_Crew
POC_Crew@POC_Crew·
🎃Chih-Yen Chang(@u1f383) - Modern Android Kernel Exploitation Through a Mali Driver Vulnerability
POC_Crew tweet media
English
0
21
148
7.1K
prxcmn retweetledi
Griffin
Griffin@aussinfosec·
I have been doing bug bounty since 2011 and ran a program for a multinational bank. Put everything I've learned into bugbounty.info. Target selection, recon pipelines, chain patterns, report templates, the business side. Free, no paywall, no course upsell.
English
27
158
968
47.6K
prxcmn
prxcmn@prxcmon·
Influencers in context:
prxcmn tweet media
Fajar@zeronol0

@tempodotco makasih loh ya aktivis/influencer kemaren yang udah ketemu sama anggota dewan, berkat kalian mereka bukan berbenah, malah balik lagi ke setelan pabrik, kalian emang berjasa banget ama mereka, keren

English
1
2
3
103
prxcmn
prxcmn@prxcmon·
Terjemahan (US): "Aku sangat pro palestina, tapi aku mau indonesia mengakui israel untuk menjamin keamanan palestina" Terjemahan (ID): "Aku benci pemerintah, tapi aku ingin bansos (hasil kampanye dari) pemerintah untuk memenuhi kebutuhan hidupku"
tan maraj@fanji_apt

@BudiBukanIntel Hot take: Gibran sekarang jadi pantes dapet dukungan kita. Dia satu2nya perwakilan sipil di pemerintahan skrg. Yg lainnya di bawah komando PS (ala militer), dia sendiri yg enggak. Dia juga ga begitu dekat dgn TNI & polri. Gw ga keberatan dia naik gantiin PS, tapi harus sekarang.

Indonesia
0
1
1
227
prxcmn
prxcmn@prxcmon·
@AnggaPutraF Udah terbukti kalo Solo-Djojohadikusumo (Klan Owi-Klan Owo) udah sepaket
Indonesia
0
0
5
822
Angga PF
Angga PF@AnggaPutraF·
Ohh plot soros ini masuk ke arah sini. Jadi kemarin yang nuduh2 soros itu secara gak langsung masuk dalam plot percobaan pembunuhan. Ngeri banget.
Indonesia
7
182
469
38.3K
prxcmn retweetledi
prxcmn
prxcmn@prxcmon·
@akunbolabola Sudah ketebak, member target ops "Kulkas LG 2 Pintu Minat Inbok"
prxcmn tweet mediaprxcmn tweet media
GIF
Indonesia
0
0
4
58
Kurnia Bijaksana
Kurnia Bijaksana@mkbijaksana·
@satyaXBT Ini brownies coklat tu maksudnya apa bang? apakah ada makna tersirat, atau gimana? Saya ga ngerti aasli
Indonesia
12
1
10
35.1K
satyaxbt
satyaxbt@satyaXBT·
Amsal sitepu: videografer yang dilawan negara > be Amsal Sitepu > videografer & pekerja kreatif dari Karo > dituduh korupsi dana desa 200 juta > ditahan dan diintimidasi oknum jaksa > ngelawan balik, hari ini resmi divonis bebas murni the project > bikin video profil dokumenter buat 20 desa > dapet kontrak bikin video profil desa (2020-2022) > per video dihargai 30 juta (include drone, editing, crew) > malah dituduh korupsi & markup sama kejaksaan the "creative" logic > jaksa nganggep harga video kemahalan > ada argumen absurd di persidangan: "ide & konsep harusnya GRATIS" > cuma alat & operasional yang boleh dihitung the "brownies" incident > pas lagi ditahan, didatengin oknum jaksa > dibawain sekotak brownies cokelat > bukan empati, tapi ngasih ancaman > disuruh bungkam, "ikuti alurnya, tutup konten" > diancam bakal "dibenamkan" kalau berani ngelawan > amsal nolak tunduk, dibongkar semua di pleidoi the comedy audit > jaksa klaim negara rugi 202 juta > di sidang ketahuan yang ngitung bukan BPK atau BPKP > hitungannya dapet dari nanya staf komdigi > kocaknya staf ini nggak pernah diperiksa pas penyidikan > nggak pernah dihadirkan juga di persidangan > JPU cuma asal comot angka 1 april 2026 > hakim PN medan ketok palu > dakwaan JPU prematur dan cacat prosedur > amsal sama sekali tidak terbukti korupsi > bebas murni, harkat dan martabat wajib dipulihkan
satyaxbt tweet media
Indonesia
344
5.6K
15K
597K
prxcmn retweetledi
Magdalene
Magdalene@magdaleneid·
Tim Advokasi Untuk Demokrasi (TAUD) merilis (30/3) laporan investigasi independen “OPERASI PARA PENGECUT”, yang mengungkap dugaan keterlibatan 16 orang dalam kasus penyiraman air keras terhadap Andrie Yunus. Temuan ini membuka indikasi operasi yang terorganisir dan melibatkan jaringan aktor besar.
Magdalene tweet media
Indonesia
53
4.1K
5.5K
139.7K