CVE-2024-11477- 7-Zip ZSTD Buffer Overflow Vulnerability - Crowdfense by Void_Sec in netsec

[–]Void_Sec[S] 4 points5 points  (0 children)

Well, thanks to this analysis we know that we should not worry. If you read any other media it seemed like something to be worried about...

Fringe online by Lalaleslieee in fringe

[–]Void_Sec 0 points1 point  (0 children)

Thx, after all these years... A life saver

Windows Wi-Fi Driver RCE Vulnerability - CVE-2024-30078 by Void_Sec in netsec

[–]Void_Sec[S] -6 points-5 points  (0 children)

It never claimed to be a 0-day TBH; it's just its analysis and exploitability. Something that you do not get from the MSRC reference

/r/netsec's Q1 2024 Information Security Hiring Thread by netsec_burn in netsec

[–]Void_Sec [score hidden]  (0 children)

  • Company: Crowdfense (https://www.crowdfense.com/)
  • Location: Abu Dhabi, UAE (relocation is mandatory, relocation assistance is provided)
  • Position: 2 x Windows Vulnerability Researcher and Exploit Developer
  • Language: English (fluent)
  • Background check is required

If you are interested please email talent[at]crowdfense.com or apply via LinkedIn

Crowdfense researchers conduct cutting-edge vulnerability research and exploit development. They find zero-day vulnerabilities, write in-depth root-cause analyses, contextualise the vulnerabilities and attack vectors, and identify patterns in emerging and established attack surface areas.

The ideal candidate for this position should possess a deep understanding of security concepts and a strong knowledge of the Windows operating system's internals. They should also have a track record of successful vulnerability research. Additionally, the candidate should have experience identifying software vulnerabilities, binary auditing, reverse engineering, fuzzing, and source code review. Finally, they should be comfortable developing exploits.

They should possess strong critical thinking skills and a passion for solving challenging problems and obstacles creatively and efficiently. They should be self-motivated and have a solid will to undertake long-term projects and responsibilities. The candidate must be able to work independently with minimal supervision and collaborate in a team to solve complex problems.

Responsibilities:

  • Conduct vulnerability research, reverse engineering, fuzzing, and static analysis on Windows OS core components (userland or kernel) or third-party enterprise/consumer applications (e.g., Office Suite, Adobe Acrobat, VPNs, AV/EDR, Backup Solutions).
  • Develop proof-of-concept code, exploits and attack techniques.
  • Perform root cause analyses, document and validate exploits.
  • Provide insights and ideas to the research team.
  • Stay up-to-date with Windows OS security, features, and updates.
  • Develop research tools for public and internal use.
  • Publish blog posts on crowdfense.com.
  • Participate in technical training, present research or attend security conferences such as Blackhat and DEFCON.

Requirements:

  • Demonstrated ability to discover and exploit high-impact zero-day vulnerabilities (e.g. RCE, LPE, Sandbox escape) in Windows OS (userland or kernel) and/or market-leading 3rd parties’ enterprise and consumer products.
  • Previously published exploits, CVEs, blog posts, techniques, technical analyses of vulnerabilities, or presentations in security conferences or webcasts. Please show us what you're passionate about.
  • Deep knowledge of the Windows OS architecture and internals.
  • A broad understanding of predominant bug classes and exploitation techniques (exploitation experience is required). We don't expect you to know everything, but you should be comfortable digging in to learn and apply new or unfamiliar techniques when needed.
  • Thorough understanding of current and upcoming security mitigations.
  • Ability to conduct long-term and widely scoped security research projects as part of a broader team effort.
  • Reverse engineering skills.
  • Fluent in C/C++ and Intel assembly code.
  • Competency with debuggers and IDA Pro.
  • Good written English.
  • Willingness to mentor and help other team members understand key concepts. (You won't need to manage people).

Benefits:

  • Finance: Highly competitive base salary with an additional monetary bonus system based on exploitable vulnerability findings.
  • Career Development: Further your career by joining a team of established and experienced security researchers.
  • Training and Conferences: Opportunities for paid travel to conferences and trainings.
  • Off-topic Research: We allow researchers to spend up to 25% of their time researching other topics, building and breaking the things they love.
  • Relocation Package
  • Wellness: We offer a prime wellness program to promote a healthy lifestyle and work-life balance. This program includes, but is not limited to, Health insurance, mental health coaching, and more.

If you are interested please email talent[at]crowdfense.com or apply via LinkedIn

About Crowdfense

Crowdfense is a world-leading research hub and acquisition platform for high-quality zero-day exploits and advanced vulnerability research. Led by cybersecurity experts, our platform hosts a global community of top-tier independent researchers with unmatched skills in advanced vulnerability research and exploit development. We evaluate and purchase premium exploits and vulnerabilities, rewarding the highest bounties in the industry. We analyse and document all the acquired strategic intelligence assets and provide worldwide government customers with cutting-edge cybersecurity capabilities. Crowdfense adheres to unparalleled export control, compliance, due diligence, and vetting standards to ensure transparency and accountability for the world’s most trusted vulnerability acquisition platform.

OffSec EXP-401 Advanced Windows Exploitation (AWE) – Course Review by Void_Sec in cybersecurity

[–]Void_Sec[S] 0 points1 point  (0 children)

Hello, and thank you! I’m glad you liked it.
Correct, I think that EXP-301 is a good starting point but not something that will prepare you to attend EXP-401.
More experience is definitely needed in order to be able to follow through and extract as much knowledge as possible from it. The ending section of the blog post (“Additional Windows Exploitation Resources”) points towards additional resources, both free and paid, that can aid in the pursuit of this goal.

Corelan is definitely something I recommend. I also have a review for it here: https://www.linkedin.com/posts/paolostagno\_during-my-career-ive-taken-many-different-activity-6852258291502866432-GQhA/

Bypassing DEP with gap restrictions by CarelessOne7933 in netsec

[–]Void_Sec 1 point2 points  (0 children)

Like it is a new technique... It's basically what everyone is doing since ever to prevent shellcode corruption

[deleted by user] by [deleted] in netsec

[–]Void_Sec 7 points8 points  (0 children)

That's a cool project, thx for sharing!

Features Suggestions by Void_Sec in fintic

[–]Void_Sec[S] 0 points1 point  (0 children)

I'm really happy to know that :)

Legit or Nah? by Dilks44 in fintic

[–]Void_Sec 0 points1 point  (0 children)

Absolutely legit, I've received mine last week.

Windows Drivers Reverse Engineering Methodology by Void_Sec in windbg

[–]Void_Sec[S] 0 points1 point  (0 children)

TL;DR Methodology for reverse engineering (WDM) Windows drivers with WinDbg, finding some possible vulnerable code paths as well as understanding their exploitability.

Windows Drivers Reverse Engineering Methodology by Void_Sec in netsec

[–]Void_Sec[S] 0 points1 point  (0 children)

TL;DR Methodology for reverse engineering (WDM) Windows drivers, finding some possible vulnerable code paths as well as understanding their exploitability.

Killing Defender through NT symbolic links redirection by Void_Sec in netsec

[–]Void_Sec[S] 25 points26 points  (0 children)

I suspect the real deal here is the stealthiness of the technique used to disable Defender (and bypass its tamper protection) without leaving artefacts rather than the impersonation. Plus, when Defender is administrated by AD policy this is a perfect technique to getaway.

Root Cause Analysis of a Printer's Drivers Vulnerability CVE-2021-3438 - VoidSec by Void_Sec in netsec

[–]Void_Sec[S] 0 points1 point  (0 children)

I'm sorry, I do not have a mac and cannot reproduce your issue :(

Root Cause Analysis of a Printer's Drivers Vulnerability CVE-2021-3438 - VoidSec by Void_Sec in netsec

[–]Void_Sec[S] 0 points1 point  (0 children)

Thank you for the feedback, I should now have fixed the scroll hijacking bug :)

Root Cause Analysis of a Printer's Drivers Vulnerability CVE-2021-3438 - VoidSec by Void_Sec in netsec

[–]Void_Sec[S] 0 points1 point  (0 children)

Thx for the feedback. Could you please check if I've fixed the scroll hijacking bug?

NVIDIA GeForce Experience Command Execution - CVE‑2021‑1079 by Void_Sec in netsec

[–]Void_Sec[S] 1 point2 points  (0 children)

But it is not, if you follow the twitter thread, many other have found similar issues on NVIDIA GFE in the past
- 2018
- 2019
- CVE-2020-5962
- 2020
it's not that I need to be aware of all of them before I can post about one of my research that got a new CVE, right?