Kuba Gretzky

847 Followers
139 Following
37 Posts
I develop offensive security tools for red teams. Reverse engineer, software developer and ex-MMO game hacker. Creator of Evilginx and pwndrop.
Bloghttps://breakdev.org
Courseshttps://academy.breakdev.org/
GitHubhttps://github.com/kgretzky
Twitterhttps://twitter.com/mrgretzky
Decided to publish the Lexmark printer exploit + writeup + tools instead of sell it for peanuts. 0day at the time of writing: https://github.com/blasty/lexmark -- enjoy!
GitHub - blasty/lexmark

Contribute to blasty/lexmark development by creating an account on GitHub.

GitHub

Friendly reminder to everyone - just booked my ticket to OffensiveCon 2023!

If you are also going, I will be more than happy to grab few beers with you and party together! πŸ»β€‹

πŸ”₯ It's time for my top 10 list of the best blog posts I read in 2022! 🧡

I want to make it clear that this list is subjective and based on my own personal preferences. There are many other great articles and blog posts out there that didn't make it onto my list.

The infosec community is full of talented and knowledgeable individuals, and it's important that we continue to share our insights and experiences with each other to improve as a whole.

Here are my top 10 picks πŸ‘‡ (ordered by release date)

1. Windows Drivers Reverse Engineering Methodology by @Void_Sec

This blog post details a methodology for reverse engineering and finding vulnerable code paths in Windows drivers.
Including a guide for setting up a lab for (the pesky) kernel debugging.

https://voidsec.com/windows-drivers-reverse-engineering-methodology/

2. Sandboxing Antimalware Products for Fun and Profit by @GabrielLandau

The concept of nerfing the token of a privileged process in order to bypass Anti-Tamper protections is mindblowing.
I bet this worked against most of EDRs when it was released

https://www.elastic.co/security-labs/sandboxing-antimalware-products

3. Exploring Windows UAC Bypasses: Techniques and Detection Strategies by @sbousseaden

Not lying here saying UAC it's one of my favorite topics
This blogpost details multiple aspects of it, including exploitation primitives and detection opportunities

https://www.elastic.co/security-labs/exploring-windows-uac-bypasses-techniques-and-detection-strategies

4. Bypassing UAC in the most Complex Way Possible! by @tiraniddo

There should be a dedicated Top 10 for all the vulnerabilities reported by James in 2022
This is probably the less relevant but the one i enjoyed most, a way to abuse Kerberos to bypass UAC

https://www.tiraniddo.dev/2022/03/bypassing-uac-in-most-complex-way.html

5. Critical Remote Code Execution Vulnerabilities in Windows RPC Runtime by @nachoskrnl and @ophirharpaz

Do you remember the panic back in April when the CVSS 9.8 vuln was released?
This was the main technical ref, great contribution to the community

https://www.akamai.com/blog/security/critical-remote-code-execution-vulnerabilities-windows-rpc-runtime

6. Why Are My Junctions Not Followed? Exploring Windows Redirection Trust Mitigation by @galdeleon

Symlink attacks have been a major source of privesc vulnerabilities in Windows
This article discusses the mitigations (trying) to address this issue

https://unit42.paloaltonetworks.com/junctions-windows-redirection-trust-mitigation/

7. Using process creation properties to catch evasion techniques by Microsoft

The infosec community has often criticized Microsoft for its wellknown lack of documentation
This article provides valuable information on detecting stealthy process injections

https://www.microsoft.com/en-us/security/blog/2022/06/30/using-process-creation-properties-to-catch-evasion-techniques/

8. The End of PPLdump by @itm4n

The "legendary" tool that forced Microsoft to unexpectedly fix an Admin->Protected Process boundary violation is described in this blog post.
It also details all the changes that were implemented to prevent the attack.

https://itm4n.github.io/the-end-of-ppldump/

9. Stopping Vulnerable Driver Attacks by @dez_

This post discusses a trend among ransomware groups of using vulnerable drivers for kernel code execution and tampering with security solutions
The 65 released YARAs are an invaluable community contribution

https://www.elastic.co/security-labs/stopping-vulnerable-driver-attacks

10. Bypassing FileBlockExecutable in Sysmon 14.0: A Lesson In Analyzing Assumptions by @diversenok_zero

This article highlights the complex decisions and difficulties involved in minifilter driver development and how attackers can exploit them

https://www.huntandhackett.com/blog/bypassing-sysmon

[BONUS] 11. Giving JuicyPotato a second chance: JuicyPotatoNG by @decoder_it and I

I tried to avoid including any of my own research, but reviving JuicyPotato is priceless
Written with my friend Andrea, this details the latest JuicyPotatoNG implementation
https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong/

That's a wrap on my top 10 list.
These articles provided valuable insights and knowledge on a variety of security topics, and I'm sure they'll be just as useful for you.
Here's to hoping for even more great content in 2023!
Cheers 🍻

ChatGPT is, in essence, a software emulation of Dunning-Kruger effect.

πŸ”΄ PoCs related:
https://bit.ly/3BPmDjy

πŸ”΅Dissection utility - http://msidump.py:
https://bit.ly/3BPmxbG

πŸŽ“ Moreover, I'd like to announce that my Modern Initial Access & Evasion Tactics training is now open for registration!

More details here:
https://bit.ly/3VlUbNe

GitHub - mgeeky/msi-shenanigans: Proof of Concept code and samples presenting emerging threat of MSI installer files.

Proof of Concept code and samples presenting emerging threat of MSI installer files. - GitHub - mgeeky/msi-shenanigans: Proof of Concept code and samples presenting emerging threat of MSI installer...

GitHub

☒️ Recently we started seeing Threat Actors abusing MSI Windows Installation files for Initial Access & code execution

πŸ”₯ I now release Part 1 insights into how MSIs can be abused, PoCs for πŸ”΄ & dissection utility for πŸ”΅

🦠 Let me know what you think!

https://bit.ly/3jc6myt

MSI Shenanigans. Part 1 – Offensive Capabilities Overview – mgeeky's lair

Big kudos to @oj for still working on this! Impressive amount of updates!

https://github.com/OJ/gobuster/releases/tag/v3.4.0

Release v3.4.0 Β· OJ/gobuster

Changelog Enable TLS1.0 and TLS1.1 support Add TFTP mode to search for files on tftp servers

GitHub

Our RPC toolkit (https://github.com/akamai/akamai-security-research/tree/main/rpc_toolkit) was updated today with even more stuff from Ben Barnea (@nachoskrnl on Twitter):

* a flowchart describing the various security protections that can stop a remote RPC request

* two new blog posts, one on RPC security and the other on Ben's LSM vulnerabilities

akamai-security-research/rpc_toolkit at main Β· akamai/akamai-security-research

This repository includes code and IoCs that are the product of research done in Akamai's various security research teams. - akamai-security-research/rpc_toolkit at main Β· akamai/akamai-security...

GitHub
Let's see how many people jump ship today and tomorrow...
8,619,649 accounts
+5,257 in the last hour
+40,310 in the last day
+257,802 in the last week