Advertisement · 728 × 90

Posts by Juan Manuel Fernández

Post image Post image Post image
10 months ago 0 0 0 0

Wow, this was fast! #OffensiveCon25 videos are up!


www.youtube.com ->


Original->

11 months ago 2 1 0 0
Post image

New doormat

11 months ago 0 0 0 0
Post image
11 months ago 6 1 0 0
Post image

Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch 🙏

1 year ago 4 3 0 0
Preview
Tutorial: unpacking executables with TinyTracer + PE-sieve In this short blog I would like to demonstrate you how to unpack an executable with PE-sieve and Tiny Tracer. As an example, let’s use the executable that was packed with a modified UPX: 8f66…

A small demo/tutorial on unpacking executables with #PEsieve and #TinyTracer: hshrzd.wordpress.com/2025/03/22/u...
- automatic OEP finding, reconstructing IAT, avoiding antidebugs and fixing imports broken by shims

1 year ago 28 13 0 0
Video

I got Linux running in a PDF file using a RISC-V emulator.

PDFs support Javascript, so Emscripten is used to compile the TinyEMU emulator to asm.js, which runs in the PDF. It boots in about 30 seconds and emulates a riscv32 buildroot system.

linux.doompdf.dev/linux.pdf
github.com/ading2210/li...

1 year ago 313 129 12 22
Windows Bug Class: Accessing Trapped COM Objects with IDispatch Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy ...

New blog post on the abuse of the IDispatch COM interface to get unexpected objects loaded into a process. Demoed by using this to get arbitrary code execution in a PPL process. googleprojectzero.blogspot.com/2025/01/wind...

1 year ago 65 41 2 0
Post image
1 year ago 0 0 0 0
Advertisement

I don’t want to make a fuckin account to use my toaster. I don’t want to fuckin subscribe to software. I don’t want to create a fuckin profile to watch TV. I don’t want to fuckin register my whatever to unlock whatever. I don’t want to download a fuckin app to access anything. Death to new logins

1 year ago 11625 2794 225 192
Post image
1 year ago 1 0 0 0
Biznaga – Imaginación política
Biznaga – Imaginación política YouTube video by BIZNAGA

Warming for tonight concert 🔥 www.youtube.com/watch?v=qRiA...

1 year ago 0 0 0 0
The Qualcomm DSP Driver - Unexpectedly Excavating an Exploit Posted by Seth Jenkins, Google Project Zero This blog post provides a technical analysis of exploit artifacts provided to us by Google's Thr...

Can you find an ITW 0-day from crash logs? Project Zero finds out

googleprojectzero.blogspot.com/2024/12/qual...

1 year ago 15 7 0 0
Post image

We are extending our call for papers to January 1, 2025!

We are now targeting an end of January release.

If you have any Linux/ELF related research, projects, or papers, we would love to publish them!

Huge thank you to everyone who has already submitted!

tmpout.sh/blog/vol4-cf...

1 year ago 34 19 0 0

@decoder-it.bsky.social and i noticed that it's no more possible to call NtLoadDriver pointing to an unprivileged regkey such as \REGISTRY\USER
Even if you have the SeLoadPrivilege you would still require the Admin group to write the required regkey.
Some more technical details below 👇

1 year ago 3 3 1 0
Diagram representing the various Windows Point and Print configurations that reintroduce the PrintNightmare exploit variants.

Diagram representing the various Windows Point and Print configurations that reintroduce the PrintNightmare exploit variants.

I updated the diagram representing the different Point and Print configurations and their exploitation on my blog.

Hopefully, this should provide a better understanding of the whole "PrintNightmare" situation to both defenders and red teamers. 🤞

1 year ago 18 8 0 0
Advertisement
Preview
GitHub - Kudaes/Eclipse: Activation Context Hijack Activation Context Hijack. Contribute to Kudaes/Eclipse development by creating an account on GitHub.
1 year ago 5 2 0 0
Preview
UDRL, SleepMask, and BeaconGate I've been looking into Cobalt Strike's UDRL, SleepMask, and BeaconGate features over the last couple of days. It took me some time to understand the relationship between these capabilities, so the aim...

[BLOG]
This post summarises how to tie Cobalt Strike's UDRL, SleepMask, and BeaconGate together for your syscall and call stack spoofing needs.

rastamouse.me/udrl-sleepma...

1 year ago 32 16 0 1
DEF CON 32 - Splitting the email atom  exploiting parsers to bypass access controls - Gareth Heyes
DEF CON 32 - Splitting the email atom exploiting parsers to bypass access controls - Gareth Heyes YouTube video by DEFCONConference

In case you missed it...the DEF CON video of my talk 'Splitting the Email Atom' is finally here! 🚀 Watch me demonstrate how to turn an email address into RCE on Joomla, bypass Zero Trust defences, and exploit parser discrepancies for misrouted emails. Don’t miss it:

youtu.be/JERBqoTllaE?...

1 year ago 95 30 2 0

I should start logging how many hours I'm wasting trying to to compile a static openldap lib with SASL support. I thought it would be easy but hey, second weekend trying it without luck.

1 year ago 0 0 0 0
Post image
1 year ago 2 0 1 0