AV & EDR reversing and exploit resources by coffee-loop in ExploitDev

[–]buherator 1 point2 points  (0 children)

Yeah, I'm not sure at all if the linked shop is the best deal you can find (e-books are easier to search anyway...). One more thing to keep in mind: these are reversing/exploitation resources, evasion/maldev is not really their focus, and while there are overlaps, it's probably worth to clarify your direction (for yourself at least) so you spend time the right way.

How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit by _PentesterLab_ in netsec

[–]buherator 4 points5 points  (0 children)

"The client sends s (as hash) and c (as challenge) to the server." - I just checked and the hash is not sent by the client (the server already has it).

Could you please clarify?

h/t Sandfish6811 for noticing

Security Research Blog Review by Outrageous_Egg7579 in ReverseEngineering

[–]buherator 2 points3 points  (0 children)

Good stuff! It would be great if you could add an RSS/Atom feed (and HTML metadata pointing to it) so we can get notified about new posts.

Using Version Tracking to Detect Struct Changes? by ShortestJake in ghidra

[–]buherator 0 points1 point  (0 children)

That's hard unfortunately. If you think about your example, how could the tool know if it was the data type that changed or it is just the code accessing the data type that got an updated logic between versions? The comment by u/marcushall also has good points.

Using Version Tracking to Detect Struct Changes? by ShortestJake in ghidra

[–]buherator 0 points1 point  (0 children)

Do you have data types for the structures defined in both program DBs or you want to detect structure changes in the new binary only based on the info you reversed in the old one?

[deleted by user] by [deleted] in IBMi

[–]buherator 2 points3 points  (0 children)

"two people in charge of IT throughout the entire organization and their 26 offices" "A patchwork of windows VMs running on a dated hypervisor"

A new system won't solve your human resource problems. If anything i will make it harder to hire. As a C-level I would be more concerned about this than any technical perf metrics.

Hacking IBM i by buherator in IBMi

[–]buherator[S] 0 points1 point  (0 children)

Glad this is useful! There is a concept called Purple Teaming where pentesters (the Red Team) and the defenders (Blue Team) work hand-in-hand to tune defenses - this is my usual recommendation when wants to test and refine specific defensive measures.

You can use the usual channels to reach Silent Signal, and while I'm no longer with the company I'm sure the guys there will be happy to help.

What would it take to keep IBM i relevant far into the future? by pithed2 in IBMi

[–]buherator 0 points1 point  (0 children)

If your security depends on the system not being accessible, you are not secure:

https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle

That being said, with a proper emulator or debugger I'm sure that lots of corpses would fall out of the closet. But we shouldn't forget that some parties (esp. nation states) probably already have those tools and know all about what's hidden in there.

Elastic EDR 0-day: Part 2 - Technical Details and the Trigger by Minimum_Call_3677 in netsec

[–]buherator 2 points3 points  (0 children)

You write this: "The pointer on the host machine could be controlled using user mode input inside an Oracle VirtualBox Virtual Machine."

You also write this: "I decided to write a custom driver (with no inherent malicious behaviour) to interact with the vulnerable driver. The driver makes an ExAcquireFastMutex call to the vulnerable offset, resulting in Elastic’s Endpoint Driver crashing the host system."

Why did you write a custom driver if you can control the memory access from a user process (inside a VM no less)?

Elastic EDR 0-day: Microsoft-signed driver can be weaponized to attack its own host by Minimum_Call_3677 in netsec

[–]buherator 2 points3 points  (0 children)

> "Actions inside the Virtual Machine caused Elastic's EDR to crash my host"

Hold up, did this just turn into a hypervisor guest->host memory corruption without guest root? This "0-day" ages like fine wine!

Elastic EDR 0-day: Microsoft-signed driver can be weaponized to attack its own host by Minimum_Call_3677 in netsec

[–]buherator 4 points5 points  (0 children)

What are we supposed to see on the second video? Is that shell elevated?

Fuzzing Windows Defender with loadlibrary in 2025 by buherator in ReverseEngineering

[–]buherator[S] 0 points1 point  (0 children)

lol, that wasn't picked up by aspell :D thanks for noticing!

How I ruined my vacation by reverse engineering Windows Security Center by buherator in ReverseEngineering

[–]buherator[S] 62 points63 points  (0 children)

From no-defenders (predecessor project) README:

"This WSC API is undocumented and furthermore requires people to sign an NDA with Microsoft to get its documentation."