Security Review #305

May 01, 2026

Every great developer you know got there by solving problems they were unqualified to solve until they actually did it.

— Patrick McKenzie

Starred Articles

Disclosing PhantomRPC

We discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.

ARP Around and Find Out: Hijacking GPO UNC Paths for Code Execution and NTLM Relay

If you have WriteGPLink on an Active Directory Organizational Unit (OU) and you're on the same network segment as a computer within that OU, you can abuse that permission to link an existing Group Policy Objects (GPO) with a software installation policy and ARP spoof the server it references, resulting in code execution as SYSTEM without modifying SYSVOL.

Achieving Deterministic Prompt Injection Through Client-Side Feedback Loops

We achieve consistent exploitation of prompt injections using client-side gadgets: postMessage payloads to a vulnerable iframe, mutual window.opener relationship to confirm success, and automatic retries until the iframe receives the malicious content, ultimately allowing full XSS and data exfiltration.

Bad Apples: Weaponizing native macOS primitives for movement and execution

We documents several macOS living-off-the-land (LOTL) techniques, demonstrating that native pathways for movement and execution remain accessible to those who understand the underlying architecture.

Building an Encrypted C2 Implant Using QUIC

In this article, we're going to ditch TCP sockets entirely and build a C2 implant that communicates over QUIC, an encrypted transport protocol that runs over UDP.

New Articles

Bypassing Windows authentication reflection mitigations for SYSTEM shells - Part 2

In this second part, we turn to Kerberos and explain how we achieved a full-blown RCE primitive as a domain user, via a completely novel Kerberos authentication coercion technique that abuses discrepancies in how different Windows components handle Unicode characters.

Microsoft Entra ID: Understanding OAuth App Consent and Permissions

Understanding OAuth app consent in Microsoft Entra ID is fundamental to securing your organization’s identity environment. In this post we see how user consent settings, admin consent workflow, permission classifications, and enterprise application assignment, work together as a complete control framework.

Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854) Breakdown

CVE-2026-3854 is an RCE in GitHub's internal git infrastructure that could have affected both GitHub.com and GitHub Enterprise Server. By exploiting an injection flaw, any authenticated user could execute arbitrary commands on GitHub's backend servers with a single git push command - using nothing but a standard git client.

Windows Privilege Escalation - Part 1: Initial Enumeration

Hands-on walkthrough of Windows PrivEsc fundamentals, with network recon, Defender analysis, AppLocker parsing, and process enumeration. Real command output and the reasoning behind every step.

Malware Analysis Chronicles: Inside Remcos RAT

This analysis chronicles a Remcos 7.2.1 Pro variant that demonstrates the evolution of commercial RATs into full-featured surveillance platforms. We'll trace its execution from initial triage through persistence establishment, multi-threaded surveillance architecture, self-termination, and finally its cleartext C2 protocol that exposed the entire operation.

Microservices Attack Vectors in Modern Web Applications

From a security researcher's perspective, microservices introduce entirely new attack surfaces. More services mean more communication paths, internal APIs, tokens, and opportunities for misconfiguration. In this article, I'll walk through three real-world attack vectors that demonstrate how microservices can introduce unexpected security weaknesses.

Go With the Flow: Abusing OAuth Device Code Flow

This analysis covers the abuse of Microsoft's implementation of the OAuth 2.0 Device Authorization Grant (Device Code Flow) in order to acquire account access tokens.

Living off the Cloud

AWS Systems Manager and Azure Run Command provide threat actors are attracted by the ability to execute commands with the highest privileges on a host without needing host credentials, providing reliable lateral movement and persistence paths that bypasses traditional network controls entirely.

VECT: Ransomware by design, Wiper by accident

Technical analysis of VECT 2.0, a ransomware that permanently destroys "large files" rather than encrypting them. A critical flaw in the encryption implementation, identical across all three platform variants (Windows, Linux, ESXi), discards three of four decryption nonces for every file above 131,072 bytes (128 KB)

Kerberos with Titanis

In this article, I'll walk you through the basics of Kerberos, and use Titanis tools to demonstrate various concepts. Most tools within Titanis directly support Kerberos authentication scenarios (e.g., passwords, PKINIT), so there is rarely any need to manually request a Kerberos ticket with Kerb.

kCaddy: Forging a Malleable Caddy Redirector for Evilginx

This post covers the story behind kCaddy, a hardened Caddy redirector in front of Evilginx, with header stripping, IP filtering, cookie-based session detection, and custom error handling. How to run it, and a detailed walkthrough of putting kCaddy in front of Evilginx for a hardened phishing deployment.

Here We Go Again: A Five-Bug Chain to Arbitrary APK Install on Samsung S25

We discovered a five‑bug chain in Samsung’s Galaxy Store (weak Cloud‑Games signature checks, an unprotected SmartSwitch broadcast receiver, a path‑traversal write primitive, a predictable‑randomness authentication flaw, and a DoS crash in IapReceiver) that lets an unprivileged app arbitrarily write a crafted APK into the Store's shell‑APK location and force its silent installation

KYCShadow: An Android Banking Malware Exploiting Fake KYC Workflows for Credential and OTP Theft

Analysis of an Android malware that operates as a multi-stage dropper that installs a secondary payload and establishes persistent command-and-control (C2) communication. It combines native code obfuscation, Firebase-based remote execution, VPN-based traffic manipulation, and WebView-based phishing to systematically harvest sensitive user data.

Bypassing Windows authentication reflection mitigations for SYSTEM shells - Part 1

This two-part blogpost will cover our journey to bypass the mitigations for CVE-2025-33073, which led to the discovery of two new authentication reflection vulnerabilities. In this first part, we will lay the foundation of our research, describe our methodology and disclose the first vulnerability that we uncovered: a trivial local privilege escalation via NTLM reflection.

Active Directory Pentesting - Part 2

This post covers the full GoAD setup, SMB host discovery and OSINT-based username generation to kerbrute enumeration and a first successful authentication against a GoAD domain controller. It's the groundwork every Active Directory engagement starts with.

Still Recent

Hooked on Linux - Part 2: Rootkit Detection Engineering

In this second pars, we explore Linux rootkit detection engineering, focusing on the limitations of static detection reliance, and the importance of rootkit behavioral detection.

Windows File System Artefacts Under C:\ProgramData

For investigators, the Windows root path %ProgramData% (commonly C:\ProgramData\) and its subfolders offer a system-level perspective. Analyzing it can uncover historical activity, revealing events from background file transfers and software installations to Wi-Fi connections and security tool detections.

Heap KASLR Leaks

This post presents a practical heap KASLR leak that does not rely on a memory-safety vulnerability. A software-only KernelSnitch side channel plus cross-cache reuse leaks heap KASLR (msg_msg/pipe_buffer) across Linux environments and Android.

Oldies but Goodies

DLL Sideloading & Proxying for Advance Red Team Engagements

We walk through a practical example of DLL sideloading and proxying with VLC's libvlc.dll and show how to build a Rust proxy DLL that forwards all original exports while executing a hidden payload.

Unearthed Arcana

Rusty Bootkit

RedLotus is an experimental project that shows how a full UEFI bootkit can be written in Rust and used to manually map unsigned drivers during boot. It demonstrates how early boot environments can bypass protections like Driver Signature Enforcement.

Malware Development Essentials for Operators

This post is a full pipeline walkthrough from a MessageBoxA call all the way to a kernel rootkit doing DKOM process hiding and callback abuse. Dynamic function loading, PEB walking, IAT hooking, process hollowing, DLL injection, shellcode encryption, APC injection all of it, with code.