Stealing Bitcoin with Cross-Site Request Forgery (Ride the Lightning + Umbrel)

Ride the Lightning is a popular add on for Bitcoin full-node distributions like Umbrel. A recent bug would have allowed remote attackers to empty Bitcoin wallets via malicious JavaScript, due to an overly permissive HTTP CORS header.
Read more →

Firefox for Android: LAN Based Intent Triggering

The SSDP engine in Firefox for Android (68.11.0 and below) can be tricked into triggering Android intent URIs with zero user interaction. This attack can be leveraged by attackers on the same WiFi network and manifests as applications on the target device suddenly launching, without the users’ permission, and conducting activities allowed by the intent.
Read more →

Three Privilege Escalation Bugs in Google Cloud Platform’s OS Login

Google Cloud Platform provides OS Login for managing SSH access to compute instance using IAM roles. I discovered multiple ways to escalate privileges from the non-administrative IAM role to the administrative one. These vulnerabilities manifest as local root exploits, allowing non-administrative users to execute commands as the root user.
Read more →

Plundering GCP - Privilege Escalation and Post-Exploitation Techniques for Google Cloud

A deep-dive into manual post-exploitation tactics and techniques for Google Cloud Platform. Assuming a breach scenario, we’ll look at many possibilities to abuse design decisions in an effort to escalate privileges and exfiltrate sensitive data throughout the organization.
Read more →

LAN-Based Blind SSRF Attack Primitive for Windows Systems (switcheroo)

Unauthenticated attackers on a local network can force stock Windows systems to perform arbitrary HTTP GET requests, including to the target’s localhost interface. No user interaction is required. No IIS installation is required.
Read more →

Linux Privilege Escalation via LXD & Hijacked UNIX Socket Credentials

Linux systems running LXD are vulnerable to privilege escalation via multiple attack paths, two of which are published in my lxd_root GitHub repository. This blog will go into the details of what I think is a very interesting path - abusing relayed UNIX socket credentials to speak directly to systemd’s private interface.
Read more →

Linux Privilege Escalation via snapd (dirty_sock exploit)

In January 2019, I discovered a privilege escalation vulnerability in default installations of Ubuntu Linux. This was due to a bug in the snapd API, a default service. Any local user could exploit this vulnerability to obtain immediate root access to the system.
Read more →

Serv-U FTP: Privilege Escalation to Remote Code Execution

I found an interesting way to achieve remote code execution on a recent test. I ended up submitting a detailed description of manual exploitation to the vendor, and I thought it might be interesting to share here.
Read more →

Red-Teamers: Skip the Proxmark, Clone a Lanyard

I noticed a nice, cheap, low-tech alternative to badge cloning on a recent physical security engagement and thought I’d share. This post is going to be short and sweet.
Read more →

Phishing for Screenshots (Excel Macro)

When performing social engineering engagements, it’s tricky to find a payload that demonstrates the gravity of the attack without going full-on red team and shelling boxes. I’ve developed something for a recent test that I think finds a nice balance - an Excel macro that will take a screenshot of the user’s desktop and leverage their local Outlook profile to email it back to a predefined address.
Read more →