Resources

Article

Getting Physical: Extreme abuse of Intel based Paging Systems - Part 3 - Windows HAL's Heap

Continuing with my Getting Physical blog posts series (CanSec2016’s presentation), in this third episode I’m going to talk about how Windows Paging is related to the HAL's heap and how it can be abused by kernel exploits. This is probably the simplest way of abusing Windows paging structures, because deep knowledge about how Intel paging works is not necessary to implement the attack.
Article

Abusing GDI for ring0 exploit primitives

Every once in a while I get to work on something special, something that leaves me with the keys to open new doors. Introduction: Not long ago I came across a certain font related vulnerability, it was a 0day being exploited in the wild...
Article

Early Release Exploit for MS14-068 Vulnerability (Affecting Kerberos)

A few weeks ago a critical vulnerability (MS14-068) affecting Windows environments was published by Microsoft (credited to Tom Maddock and team). Specifically, the vulnerability affects Kerberos. [The vulnerability will] allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account.
Article

Exploiting CVE-2015-0311: A Use-After-Free in Adobe Flash Player

At the end of January, Adobe published the security bulletin APSA15-01 for Flash Player, which fixes a critical use-after-free vulnerability affecting Adobe Flash Player 16.0.0.287 and earlier versions. This vulnerability, identified as CVE-2015-0311, allows attackers to execute arbitrary code...
Article

Linux Flash for Newbies: How Linux Works with Flash

In the first series of this introduction to Linux and flash, we began with a basic lesson on flash memory. In part two, we can begin to tackle how Linux interacts with it. From this point forward, we’ll focus on NAND flash, with the following assumptions...
Article

Linux Flash for Newbies: Flash Memory Basics

During hardware-oriented engagements, we are sometimes faced with a hardware device's firmware image. This may happen because we downloaded a firmware upgrade image to try to understand a device with a view of finding security flaws...
Article

Bypassing CVE-2018-15442: Another Case of DLL Hijacking

As an exploit writer, one of my tasks consists of gathering common vulnerabilities and exposures (CVE) and all of the information related to them in order to design an exploit for Core Impact. As part of this process I stumbled across CVE-2018-15422: A vulnerability in the update service of Cisco WebEx Meetings Desktop App for Windows. 
Video

The Truth About Viruses on Linux

There are many myths about viruses and Linux—including the belief that the system is immune. A startling increase in malware, ransomware and malicious code targeting Linux systems of all shapes and sizes means the days of believing it’s “just a Windows thing” are over. In reality, Linux is becoming a lucrative target. It’s time to take action to protect your Linux environment and surrounding...
Video

Why Endpoint Antivirus Belongs in Your Security Environment

Most organizations are vigilant about scanning their workstation PCs. Unfortunately, malware and other destructive entities can just as easily target your servers, both on-premise or in the cloud, so many environments remain unprotected. Endpoint antivirus software is used to provide virus protection to endpoints, like servers, which connect to enterprise networks. Endpoint antivirus software...
Guide

2020 Malware Report

The Challenge of Malware: Finding Long Term Solutions for a Chronic Problem No matter how much technology progresses, malware continues to be a consistent menace that never seems to grow outdated. No matter how long the fight against malware has been, there is always more to learn in order to better safeguard against attacks. Finding out what other organizations are experiencing, and how they're...
Guide

Penetration Testing Toolkit

Safeguard your infrastructure and data With today’s constantly-shifting threat landscape, most organizations know they must employ offensive security measures like penetration testing to stay a step ahead of attackers. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing tools and resources to set you...
Guide

Identity and Access Toolkit

Reduce identity related risk Implementing a strong identity governance and administration (IGA) program is crucial to any enterprise organization. Data is everywhere, but so are users. To protect your organization and reduce identity-related access risks, organizations must properly manage access to systems, applications, and devices. Based on our years of experience helping organizations manage...
Guide

Making the Case for Identity Governance

Building a Business Case for Identity Governance Solutions Organizations are facing increasing demands to protect the devices and systems critical to the business and are pressured to meet ongoing regulatory compliance. It's time to invest in intelligent identity governance solutions—but you need a solid business case to justify it. Download this step-by-step guide to learn how to: Define the...
Guide

Intelligent Identity and Access Management eBook

Leverage Intelligent IAM to help keep your organization’s identities and accounts secure Identity and Access Management (IAM) systems provide the capability to create and manage user accounts, roles, and access rights for individual users in an organization. They typically incorporate user provisioning, password management, policy management, access governance, and identity repositories in an...
Guide

Insider Threat Toolkit

How does your security stack up against insider threats? When thinking about cybersecurity, it's easy to focus on ways to block external threat actors attempting to breach your IT environment. But unfortunately, one of the biggest threats to your organization are your own employees. Many are accidental insiders susceptible to phishing attempts, while others may be malicious insiders attempting to...
Guide

Doing Identity Access Right

We’ve seen the same results year after year, stolen or misused credentials are, by far, the leading cause of data breaches. The reason for this is that access risk is extremely hard to manage on your own. From the most common access risks to proving compliance with government and industry regulations, you need a solution that can help you manage and minimize your risk. Control who has access to...