Shielder

InfoSec boutique.
Owning things since 2014.
We love to go for the extra mile, where we usually find the best 🦟🐞πŸͺ²πŸͺ³πŸ›πŸœπŸ•· the others miss.

2025-04-07

Last week @apple released MacOS 13.4 which contains a fix for a vulnerability @suidpit exploited to escape the Sandbox.

Update now and stay tuned for the technical details!

Ref: support.apple.com/en-us/122373

2025-03-13

In Lausanne for @1ns0mn1h4ck? Don’t miss the chance to meet our very own
@not4nhacker! If you're into cursed OAuth hacking techniques or breaking mobile apps, find a comfy spot -- you might be there for a while!

2025-01-16

🚨 New Open Source Audit Alert! 🚨

Shielder, with @OSTIF & @cloudnativefdn, audited @karmada_io:
πŸ” 6 issues found (1 high, 1 medium, 2 low, 2 info)
βœ”οΈ Most fixed, others planned.
πŸ—£οΈ to @suidpit and @thezero

Full details in the blog post!

shielder.com/blog/2025/01/karm

2024-10-22

Attending @thesascon in the beautiful Bali 🏝️?
Make sure not to miss @suidpit's talk about his novel research on the macOS 🍎 sandbox and how to bypass it.
πŸ—“οΈ Wednesday, October 23 - 15:10

Shielder boosted:
2024-10-11

It's always cool to contribute to free and open-source projects πŸŽ‰

β˜…β˜…β˜…β˜…β˜… - Would recommend!

mastodon.online/@thunderbird/1

Shielder boosted:
Thunderbird: Free Your Inboxthunderbird@mastodon.online
2024-10-11

We wanted to give a shout out to @smaury, who found a ReDoS security issue with Thunderbird Appointment. This resulted in us fixing the issue and removing deprecated urls! It's fantastic community contributions like this that makes Thunderbird so much more than the sum of its code. πŸ’™ πŸ‘

2024-09-20

For the weekend, we gift you with not one, but TWO ways to escalate `sudo iptables` (+ a couple other boring preconditions) into a r00t shell - read how @smaury and @suidpit managed to climb your friendly neighborhood πŸ”₯wall!

shielder.com/blog/2024/09/a-jo

2024-08-29

Our very own @suidpit will present his novel #macOS*research at #TheSAS2024 - if you want to learn more about the macOS sandbox and how to escape it make sure to be in Bali 🏝️ from Oct 22 to Oct 25!

Learn more here: thesascon.com/

2024-08-28

During a recent engagement @mindlaess_ hacked his way through Vtiger CRM which led to discover a privilege escalation and a SQL injection.
Learn more in the dedicated advisories:
- CVE-2024-42994 #sqli shielder.com/advisories/vtiger
- CVE-2024-42995 #privesc shielder.com/advisories/vtiger

2024-05-23

@luc Yes - we see the confusion out of it :)
We chose to go lowercase as the team behind the libraries refers to it as "boost".

We hope it was still an enjoyable read!

2024-05-22

Back in December 2023 our researchers @thezero, @suidpit, and @mindlaess_ performed an audit sponsored by @awscloud and facilitated by @ostifofficial on boost.
It resulted in 7 findings and 15 new fuzzers.
The report is now public, check the details here: shielder.com/blog/2024/05/boos

2024-05-07

In early 2023 we (@thezero & @smaury) collaborated with @securedrop to start designing and prototyping the #E2EE messaging protocol for a future version of SecureDrop.

πŸ“„ blog post: securedrop.org/news/introducin
πŸ’» poc code: github.com/freedomofpress/secu

2024-04-18

Exciting news! We've just released a new blog post on mobile app security, where @suidpit and @thezero used their intent-fu to discover vulnerabilities (CVE-2024-26131, CVE-2024-26132) in @element, a @matrix client for Android. #writeup #CVE

shielder.com/blog/2024/04/elem

2024-03-29

We recently partnered with @ostifofficial to perform a security audit sponsored by @awscloud on Bref.
The audit resulted in 5 findings promptly addresses by @mnapoli
The report is now public, check the details here: shielder.com/blog/2024/03/bref

2024-03-08

During a recent Red Team Assessment @thezero and @smaury discovered a vulnerability in PostgreSQL's #PgAdmin which in the worst case allows unauthenticated attackers to run arbitrary server-side code.

Check out the #RCE advisory and patch now!

shielder.com/advisories/pgadmi

2024-02-03

Hey hackers! Are you attending @fosdem?
If you want to talk about open-source software and hardware security make sure to hit up @smaury and @thezero!

2024-01-30

Ever wondered how to binary diff router firmwares to write n-day exploits?
Learn how @thezero and @suidpit combined unblob, binexport, ghidra, Qiling, and an Asus router to write an exploit for CVE-2023-39228.
The outcome was unexpected ...

While attending @silviocesare training at @cybersaiyan's RomHack @thezero and @suidpit chose to do some practice. While looking at the news they discovered about some recently disclosed ASUS routers unauthenticated RCEs.

They quickly bin-diffed the firmware versions, found the vulnerabilities, emulated the vulnerable firmware, and wrote and exploit for one of them.
This was so fast they had a working exploit even before jumping off the wayback πŸš‚.

Once at home they used their research budget to buy a real device and prove the vulnerability there too, but ... it was not working 🀯
Know what? The vulnerability was not unauthenticated on the physical device!

After some intense debugging sessions they discovered that not only that one but also a lot of other ASUS routers' vulnerabilities were probably incorrectly deemed as unauthenticated.

Apparently most of the researchers are either keeping an authentication bypass private or they do their research in emulated environments only and no one ever checked the vulnerabilities before issuing the CVE numbers and releasing the advisories.

TL;DR
Product security folks: do not blindly trust the attack requirements shared by the researchers.
Security researchers: when testing embedded devices make sure to mimic correctly all their configurations (i.e. the NVRAM content).

shielder.com/blog/2024/01/hunt

2023-10-24

Join suidpid 🩺 in his journey into executing arbitrary code in #healthcare πŸ₯ servers with #polyglot files by creating an #exploit for CVE-2023-33466! #nday #exploit
shielder.com/blog/2023/10/cve-

2023-10-21

Hey hackers - attending @nohatcon?
Pop at the boot in the entrance for some swag and to chat about crazy πŸ¦‹πŸ¦—πŸžπŸπŸœπŸ¦ŸπŸͺ²!
#nohat2023

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst