Off By One Security

112 posts

Off By One Security banner
Off By One Security

Off By One Security

@offby1security

This is the X page for the Off By One Security YouTube channel and Discord server. Streams every Friday at 11AM PT. https://t.co/Q8qt342Nhx

California, USA Entrou em Haziran 2024
1 Seguindo1.4K Seguidores
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
This man is a machine! Another amazing article from @ale_sp_brazil on vulnerability research!
Alexandre Borges@ale_sp_brazil

I am excited to release the seventh article in the Exploiting Reversing Series (ERS). Titled “Exploitation Techniques | CVE-2024-30085 (part 01)” this 119-page technical guide offers a comprehensive roadmap for vulnerability exploitation: exploitreversing.com/2026/03/04/exp… Key features of this edition: [+] Dual Exploit Strategies: Two distinct exploit versions using Token Stealing and I/O Ring techniques. [+] Exploit ALPC + PreviousMode Flip + Token Stealing: elevation of privilege of a regular user to SYSTEM. [+] Exploit ALPC + Pipes + I/O Ring: elevation of privilege of a regular user to SYSTEM. [+] Solid Reliability: Two complete working and stable exploits, including an improved cleanup stage. [+] Optimized Exploit Logic: Significant refinements to the codebase and technical execution for better stability and predictability. The article guides you through the two distinct techniques for exploiting the CVE-2024-30085 Heap Buffer Overflow vulnerability. I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which has helped me write these articles over time. I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback! Enjoy your reading and have an excellent day.

English
2
20
116
12.2K
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
It was good to be back on the Soft White Underbelly YouTube channel with Mark Laita again to talk about AI in the offensive security space. I did the interview a month ago and already wish I could update the things I said! Be sure to follow the @offby1security YouTube channel! youtu.be/1ZfZDEcl0ZI?si…
YouTube video
YouTube
English
2
18
83
6.7K
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
I tried my best to do something different for a video... Feel free to let me know your thoughts on my attempt to explain content outside of the cybersecurity realm... youtu.be/8OjWCWNnqlg
YouTube video
YouTube
English
0
3
19
2K
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
You can get Off By One Security hoodies and t-shirts here: off-by-one.square.site For shirts we have size Small all the way up to 5XL.
Stephen Sims tweet mediaStephen Sims tweet media
English
0
4
19
1.7K
Off By One Security retweetou
Graham Helton (too much for zblock)
At 11AM PT I'll be discussing some of the intricacies of Kubernetes offensive security techniques and walking through some attack paths the use the nodes/proxy GET permission to execute code. See you there!
Graham Helton (too much for zblock) tweet media
Stephen Sims@Steph3nSims

Tomorrow at 11AM PT! Join me with @GrahamHelton3 for a session & live demo of a Kubernetes authentication bypass he recently disclosed that turns a commonly granted read-only permission into remote code execution in any pod in the cluster! youtube.com/watch?v=jTbANt… @offby1security

English
1
7
28
4K
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
Tomorrow at 11AM PT! Join me with @GrahamHelton3 for a session & live demo of a Kubernetes authentication bypass he recently disclosed that turns a commonly granted read-only permission into remote code execution in any pod in the cluster! youtube.com/watch?v=jTbANt… @offby1security
YouTube video
YouTube
Stephen Sims tweet media
English
0
11
40
10.5K
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
For those of you working as a pen tester, red teamer, or other offensive cybersecurity role, are you using autonomous agents? I'd love to hear your comments as to what you're using, for what, any limitations, and if not, why? Thanks!
English
5
3
14
3.3K
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
The @offby1security stream with @33y0re (Connor McGarr) on "Windows Secure Calls in Practice" is now available on YouTube. Thanks to Connor again for sharing his advanced research with the community! There's not much on this out there... youtube.com/watch?v=zvmkTz…
YouTube video
YouTube
English
2
30
106
13.4K
Off By One Security retweetou
Stephen Sims
Stephen Sims@Steph3nSims·
Join us next Friday for a stream with @GrahamHelton3 and live demo of an auth bypass vulnerability disclosed by Graham recently that allows remote code execution in any Pod in the cluster from a commonly granted "read-only" permission! youtube.com/watch?v=jTbANt… @offby1security
YouTube video
YouTube
Stephen Sims tweet media
English
1
9
43
8.6K
Off By One Security retweetou
Off By One Security retweetou
Connor McGarr
Connor McGarr@33y0re·
Really looking forward to this! I will be doing a demo about previous work I did a few months ago on examining VTL 0 <-> VTL 1 communication and showcasing the two associated tools, SkBridge (to manually invoke secure calls) and Vtl1Mon (monitoring them)! connormcgarr.github.io/secure-calls-a…
Stephen Sims@Steph3nSims

Join us next Friday, 13-February at 11AM for the next @offby1security stream with the great Connor McGarr (@33y0re) where we'll take a look inside Windows Virtual Secure Mode (VSM), secure calls, VTL transitions, and the secure kernel! youtube.com/watch?v=zvmkTz…

English
2
23
99
14.1K