#patchdiffinginthedark

2025-04-01

Wrapped up an incredible time teaching #PatchDiffingInTheDark in Austin, TX with
@_ringzer0
! The city didn’t disappoint—amazing food, friendly people, and my first autonomous vehicle ride!🤖 🚗✨ #waymo

2025-03-16

#EverydayGhidra virtual course with
@_ringzer0
just wrapped up! 😅 Huge shoutout to my stellar students 🤓 who crushed a jam-packed CTF. Next stop: Austin, TX for my in-person #PatchDiffingInTheDark course next week. See you at #Bootstrap25 Conference next weekend! 🤠🎯

2025-02-14

One more this week!

#CVE-2025-21418 2025-Feb Windows Ancillary Function Driver for WinSock 7.8 EoP Heap-based Buffer Overflow

This time in AfdAccept... 🧐
gist.github.com/clearbluejar/9

Side by side: diffpreview.github.io/?9c33282 👀

#patchdiffinginthedark #Ghidra

2023-11-09

Patch diffing when you have no blog post, no Github poc, only binaries! #patchdiffinginthedark

Let's try CVE-2023-36713 with #ghidriff:

An information disclosure for CLFS.sys, not too many functions changed. 🤔
gist.github.com/clearbluejar/0

There seem to be some refcount changes to memset and memcpy...
memset refcount++ 🧐
gist.github.com/clearbluejar/0
memcpy refcount++ 🧐
gist.github.com/clearbluejar/0

Looking at the modified function with new calls to memcpy and memset.
gist.github.com/clearbluejar/0

Seems to be an area that is now calling memset on some newly allocated memory (link with a side-by-side view): diffpreview.github.io/?0f9dc5d

We patch diff in the dark to step into the light. 💪

Kudos to
@tacbliw
, who is credited with CVE-2023-36713

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst