Bill Demirkapi's Blog

Web Name: Bill Demirkapi's Blog

WebSite: http://www.billdemirkapi.me

ID:325520

Keywords:

Demirkapi,Bill,Blog

Description:


Bill Demirkapi's Blog

The adventures of a 21-year-old security researcher.

Security Research

Sharing is Caring: Abusing Shared Sections for Code Injection

In this article, we will explore how to abuse certain quirks of PE Sections to place arbitrary shellcode into the memory of a remote process without requiring direct process access.

Bill Demirkapi
Security Research

Abusing Exceptions for Code Execution, Part 1

A common offensive technique used by operators and malware developers alike has been to execute malicious code at runtime to avoid static detection. Often, methods of achieving runtime execution have focused on placing arbitrary code into executable memory that can then be executed. In this article, we will explore a

Bill Demirkapi
Security Research

Unpacking CVE-2021-40444: A Deep Technical Analysis of an Office RCE Exploit

In the middle of August 2021, a special Word document was uploaded to VirusTotal by a user from Argentina. Although it was only detected by a single antivirus engine at the time, this sample turned out to be exploiting a zero day vulnerability in Microsoft Office to gain remote code

Bill Demirkapi
Security Research

Abusing Windows’ Implementation of Fork() for Stealthy Memory Operations

Note: Another researcher recently tweeted about the technique discussed in this blog post, this is addressed in the last section of the blog (warning, spoilers!). To access information about a running process, developers generally have to open a handle to the process through the OpenProcess API specifying a combination of

Bill Demirkapi
Insecure by Design

Insecure by Design, Epic Games Peer-to-Peer Multiplayer Service

The opinions expressed in this publication are those of the authors. They do not reflect the opinions or views of my employer. All research was conducted independently. As someone who enjoys games that involve logistics, a recently-released game caught my eye. That game was Satisfactory, which is all about building

Bill Demirkapi
Security Research

Defeating Macro Document Static Analysis with Pictures of My Cat

Over the past few weeks I've spent some time learning Visual Basic for Applications (VBA), specifically for creating malicious Word documents to act as an initial stager. When taking operational security into consideration and brainstorming ways of evading macro detection, I had the question, how does anti-virus detect a malicious

Bill Demirkapi
Security Research

How to use Trend Micro's Rootkit Remover to Install a Rootkit

The opinions expressed in this publication are those of the authors. They do not reflect the opinions or views of my employer. All research was conducted independently. For a recent project, I had to do research into methods rootkits are detected and the most effective measures to catch them when

Bill Demirkapi
Security Research

Several Critical Vulnerabilities on most HP machines running Windows

I always have considered bloatware a unique attack surface. Instead of the vulnerability being introduced by the operating system, it is introduced by the manufacturer that you bought your machine from. More tech-savvy folk might take the initiative and remove the annoying software that came with their machine, but will

Bill Demirkapi
Insecure by Design

Insecure by Design, Weaponizing Windows against User-Mode Anti-Cheats

The market for cheating in video games has grown year after year, incentivizing game developers to implement stronger anti-cheat solutions. A significant amount of game companies have taken a rather questionable route, implementing more and more invasive anti-cheat solutions in a desperate attempt to combat cheaters, still ending up with

Bill Demirkapi
Security Research

Local Privilege Escalation on Dell machines running Windows

In May, I published a blog post detailing a Remote Code Execution vulnerability in Dell SupportAssist. Since then, my research has continued and I have been finding more and more vulnerabilities. I strongly suggest that you read my previous blog post, not only because it provides a solid conceptual understanding

Bill Demirkapi
Security Research

Remote Code Execution on most Dell computers

What computer do you use? Who made it? Have you ever thought about what came with your computer? When we think of Remote Code Execution (RCE) vulnerabilities in mass, we might think of vulnerabilities in the operating system, but another attack vector to consider is "What third-party software came with

Bill Demirkapi
Security Research

Hacking College Admissions

Getting into college is one of the more stressful time of a high school student's life. Since the admissions process can be quite subjective, students have to consider a variety of factors to convince the admissions officers that "they're the one". Some families do as much as they can to

Bill Demirkapi
Security Research

Reversing the CyberPatriot National Competition Scoring Engine

Edit 4/12/2019Originally, I published this post a month ago. After my post, I received a kind email from one of the primary developers for CyberPatriot asking that I take my post down until they can change their encryption algorithm. Given that the national competition for CyberPatriot XI was

Bill Demirkapi
Security Research

Reading Physical Memory using Carbon Black's Endpoint driver

Enterprises rely on endpoint security software in order to secure machines that have access to the enterprise network. Usually considered the next step in the evolution of anti-virus solutions, endpoint protection software can protect against various attacks such as an employee running a Microsoft Word document with macros and other

Bill Demirkapi
Powered by Ghost

TAGS:Demirkapi Bill Blog

<<< Thank you for your visit >>>

Websites to related :
Blog | Chen Liao

   Blog | Chen Liao Engineering Program Manager @ Apple

Billigere strøm | Tilbud fra fl

   PrivatBedriftBorettslagStrømpriser

2giadinh.com - Blog Gia đình V

  Skip to contentThứ Bảy, Tháng Chín 17, 2022 2giadinh.comBlog Gia đình Việt Nam Trang chủMẹ & béMang thaiChăm sóc béLàm mẹ khó lắmTâ

Y!an's Blog

   Y!an's Blog 念念不忘,必有回响

Blogging for Beginners & Beyond

  &darr; My Second Million Blogging for Beginners & Beyond &#8211; Make Money Blogging HomeMenu &darr;Skip to primary contentSkip to seco

Forums - Portal of Robotics and

  Helpverse.mv mv = MetaverseArticlesWhat's New?ForumBlogsRecent EntriesMost PopularMember BlogsAdvanced SearchBlogsRecent Blogs PostsRecent Blogs Posts

Lew's Blog

  

AS Roma france by AmoRoma - Bill

   Menu As Roma France by AmoRoma.fr Rechercher Switch skin Calendrier AS ROMA masculine Infos / actus

Sweet Memory Baskets - Wedding T

  Skip to Content Menu

Food Blog | Notizie, curiosità

  Vai al contenuto@media (max-width: 480px) {#adwallpaper {width: 100%;position: fixed;z-index: 1000;top: 114px;left: 0;}}MenuRistorantiChefRicetteConsi

ads

Hot Websites