Bill Demirkapi's Blog
Time 2022-09-23 01:29:18Web Name: Bill Demirkapi's Blog
WebSite: http://www.billdemirkapi.me
ID:325520
Keywords:
Demirkapi,Bill,BlogDescription:
Bill Demirkapi's Blog
The adventures of a 21-year-old security researcher.
Sharing is Caring: Abusing Shared Sections for Code Injection
In this article, we will explore how to abuse certain quirks of PE Sections to place arbitrary shellcode into the memory of a remote process without requiring direct process access.
Abusing Exceptions for Code Execution, Part 1
A common offensive technique used by operators and malware developers alike has been to execute malicious code at runtime to avoid static detection. Often, methods of achieving runtime execution have focused on placing arbitrary code into executable memory that can then be executed. In this article, we will explore a
Unpacking CVE-2021-40444: A Deep Technical Analysis of an Office RCE Exploit
In the middle of August 2021, a special Word document was uploaded to VirusTotal by a user from Argentina. Although it was only detected by a single antivirus engine at the time, this sample turned out to be exploiting a zero day vulnerability in Microsoft Office to gain remote code
Abusing Windows’ Implementation of Fork() for Stealthy Memory Operations
Note: Another researcher recently tweeted about the technique discussed in this blog post, this is addressed in the last section of the blog (warning, spoilers!). To access information about a running process, developers generally have to open a handle to the process through the OpenProcess API specifying a combination of
Insecure by Design, Epic Games Peer-to-Peer Multiplayer Service
The opinions expressed in this publication are those of the authors. They do not reflect the opinions or views of my employer. All research was conducted independently. As someone who enjoys games that involve logistics, a recently-released game caught my eye. That game was Satisfactory, which is all about building
Defeating Macro Document Static Analysis with Pictures of My Cat
Over the past few weeks I've spent some time learning Visual Basic for Applications (VBA), specifically for creating malicious Word documents to act as an initial stager. When taking operational security into consideration and brainstorming ways of evading macro detection, I had the question, how does anti-virus detect a malicious
How to use Trend Micro's Rootkit Remover to Install a Rootkit
The opinions expressed in this publication are those of the authors. They do not reflect the opinions or views of my employer. All research was conducted independently. For a recent project, I had to do research into methods rootkits are detected and the most effective measures to catch them when
Several Critical Vulnerabilities on most HP machines running Windows
I always have considered bloatware a unique attack surface. Instead of the vulnerability being introduced by the operating system, it is introduced by the manufacturer that you bought your machine from. More tech-savvy folk might take the initiative and remove the annoying software that came with their machine, but will
Insecure by Design, Weaponizing Windows against User-Mode Anti-Cheats
The market for cheating in video games has grown year after year, incentivizing game developers to implement stronger anti-cheat solutions. A significant amount of game companies have taken a rather questionable route, implementing more and more invasive anti-cheat solutions in a desperate attempt to combat cheaters, still ending up with
Local Privilege Escalation on Dell machines running Windows
In May, I published a blog post detailing a Remote Code Execution vulnerability in Dell SupportAssist. Since then, my research has continued and I have been finding more and more vulnerabilities. I strongly suggest that you read my previous blog post, not only because it provides a solid conceptual understanding
Remote Code Execution on most Dell computers
What computer do you use? Who made it? Have you ever thought about what came with your computer? When we think of Remote Code Execution (RCE) vulnerabilities in mass, we might think of vulnerabilities in the operating system, but another attack vector to consider is "What third-party software came with
Hacking College Admissions
Getting into college is one of the more stressful time of a high school student's life. Since the admissions process can be quite subjective, students have to consider a variety of factors to convince the admissions officers that "they're the one". Some families do as much as they can to
Reversing the CyberPatriot National Competition Scoring Engine
Edit 4/12/2019Originally, I published this post a month ago. After my post, I received a kind email from one of the primary developers for CyberPatriot asking that I take my post down until they can change their encryption algorithm. Given that the national competition for CyberPatriot XI was
Reading Physical Memory using Carbon Black's Endpoint driver
Enterprises rely on endpoint security software in order to secure machines that have access to the enterprise network. Usually considered the next step in the evolution of anti-virus solutions, endpoint protection software can protect against various attacks such as an employee running a Microsoft Word document with macros and other
<<< Thank you for your visit >>>
Websites to related : Blog | Chen Liao
Blog | Chen Liao Engineering Program Manager @ Apple
Billigere strøm | Tilbud fra flPrivatBedriftBorettslagStrømpriser
2giadinh.com - Blog Gia đình VSkip to contentThứ Bảy, Tháng Chín 17, 2022 2giadinh.comBlog Gia đình Việt Nam Trang chủMẹ & béMang thaiChăm sóc béLàm mẹ khó lắmTâ
Y!an's BlogY!an's Blog 念念不忘,必有回响
Blogging for Beginners & Beyond↓ My Second Million Blogging for Beginners & Beyond – Make Money Blogging HomeMenu ↓Skip to primary contentSkip to seco
Forums - Portal of Robotics andHelpverse.mv mv = MetaverseArticlesWhat's New?ForumBlogsRecent EntriesMost PopularMember BlogsAdvanced SearchBlogsRecent Blogs PostsRecent Blogs Posts
Lew's BlogAS Roma france by AmoRoma - Bill
Menu As Roma France by AmoRoma.fr Rechercher Switch skin Calendrier AS ROMA masculine Infos / actus
Sweet Memory Baskets - Wedding TSkip to Content Menu
Food Blog | Notizie, curiositàVai al contenuto@media (max-width: 480px) {#adwallpaper {width: 100%;position: fixed;z-index: 1000;top: 114px;left: 0;}}MenuRistorantiChefRicetteConsi
adsHot Websites