chompie

pressing f8 over and over

chompie boosted:
Marcus Hutchins :verified:malwaretech@infosec.exchange
2025-05-15

After 7 years of external circumstances getting in the way, I finally managed to sit down with @jackrhysider and record a Darknet Diaries episode. Check it out here! :D

darknetdiaries.com/episode/158/

Me and the homies are dropping browser exploits on the red team engagement šŸ˜Ž. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application.

ibm.com/think/x-force/operatio

@dbarros nope I’ll have to write a book some day

@osxreverser @chort actually the point was that Ubuntu turned off unprivileged namespaces but you can still create one using busybox (and other binaries). this wasn’t meant to show LPE, but that you can still create a namespace as an unprivileged user (and touch more kernel attack surface as a result)

chompie boosted:
2025-04-05
The Exploit Development Life Cycle: From Concept to Compromise /by @chompie1337

https://www.youtube.com/watch?v=ce0bXORSMX4

@chort @osxreverser my exact reaction when I saw

Exciting news! I’m starting X-Force’s new offensive research team (XOR) and hiring a security researcher. Want to work with myself and other researchers to find bugs, exploit popular targets, and share your work? Apply for this unique (remote) role 😊 (US or Canada only, but stay on the lookout for Europe based positions in the future) careers.ibm.com/job/21219320/s

Here are the slides from my BSides Canberra Keynote @bsidescbr

The Exploit Development Lifecycle: From Concept To Compromise drive.google.com/file/d/1jHnVd

@http it’s open internationally. disregard location in listing

Winners have been notified! It was a very difficult decision with many deserving applicants. So, if you weren’t selected don’t be discouraged. I plan to provide more scholarship opportunities in the future working with sponsors. If you or your company is interested, pls reach out

@malwaretech true, but that also wasn’t targeting a modern OS. exploit mitigations will continue to make things more difficult and labor intensive

@malwaretech full RCE but only works on specific versions/configurations etc or not fully stable

@malwaretech As someone who has been that asshole security researcher u speak of, and dropped full RCE exploits for crit vulns - there is a big difference between a PoC to prove it can be done, and a fully productized exploit that allows for blind mass exploitation. And tbh, even the more sophisticated cybercriminals don’t really possess the skills to fully weaponize a PoC that’s already been mostly constructed for them, lol.

At the same time, there is very little public insight into what mature exploit dev looks like outside of what a handful of security researchers publish. It’s subjective of course, but I do believe there’s a benefit to defenders and others wanting to learn more about an area that has been traditionally shrouded in mystery.

@malwaretech yeah, I’m actually not sure about that either. the structure isn’t supposed to be used after sending the error. might be one of those things where it felt ā€œrightā€ for the dev to do during cleanup but serves no actual purpose (and inadvertently worsens a bug) lol

@malwaretech nice work!!my only nit is that what you’re calling packet_size really represents the packet ā€œcursorā€, like place in packet that has been processed thus far. that’s why it gets reset back to 0 in IppSendError.

great blog post 😊

chompie boosted:
Marcus Hutchins :verified:malwaretech@infosec.exchange
2024-08-28

Analyzing and Exploiting CVE-2024-38063, an RCE Vulnerability In the Windows TCP/IP Stack

malwaretech.com/2024/08/exploi

Feel free to share the link! Applications will be reviewed by myself and a review team consisting of my faves

Application Deadline August 31, 2024 at 11:59 PM Eastern Time

The past year has been amazing. From marriage, to Pwn2Own to a Pwnie Award, I'm so grateful. I'm using the money I've won from hacking competitions, bounties, & RB for two ppl to travel & attend Hexacon, the premier offensive security con in Paris, France.

forms.gle/zt9RaR7EEvTxWGCe7

I’m thrilled to share my latest blog post! This one focuses on the bug hunting process: inspiration, approach, and execution. I also provide a retrospective on how the bug was introduced and analyze the insufficient ā€œpatchā€. Check it out: securityintelligence.com/x-for

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst