After a long and restful break since leaving my last role, I'm back to actively looking for new problems to solve. If you know of anyone looking for someone with an extensive background in security leadership, application security, & penetration testing, let me know!
Resume: https://adamcaudill.com/resume/
Four years ago I got my first threat of violence for my Open Source work that I ended up reporting to the police. Thick skin and all that, but there are limits...
https://daniel.haxx.se/blog/2021/02/19/i-will-slaughter-you/
This is *the most malicious, brutal* malicious compliance I've seen in quite some time, possibly ever, and I am HERE FOR IT. Thank you, @jwz
Normally you can't auth to Entra ID connected webapps with bearer tokens. But if Teams can open SharePoint/OneDrive with an access token, I guess so can we. roadtx now supports opening SharePoint with access tokens in the embedded browser 😀
Ooh, this is another fun one. Again, the advisory isn't brand new, but the CVE is dated today.
Incorrect Access Control vulnerability in Atos Eviden IDRA before 2.6.1 could allow the possibility to obtain CA signing in an illegitimate way.
https://nvd.nist.gov/vuln/detail/CVE-2024-39327
Good thing Atos is small and no one uses their stuff or anything...
As at December 31, 2024, Atos liquidity is estimated at €2,191 million, more than one billion euros above the €1,152 million expected cash position presented in the Accelerated Safeguard Plan
So, coup by the evil venture capitalists. I kindly suggest the good venture capitalists should proceed to stand up and actively fight this, before everything goes full Palpatine.
Okay, now who doesn't enjoy a vuln in a Palantir product? Here's an advisory from November 2024, but the CVE was published today.
https://palantir.safebase.us/?tcuUid=b60db1ee-4b1a-475d-848e-c5a670a0da16
Restricted Views backed objects (OSV1) could be bypassed under specific circumstances due to a software bug, this could have allowed users that didn't have permission to see such objects to view them via Object Explorer directly. The affected service have been patched and automatically deployed to all Apollo-managed Foundry instances.
Inside imessage-exporter: Reverse Engineering Apple's typedstream Format by @rxcs
https://chrissardegna.com/blog/reverse-engineering-apples-typedstream-format/
Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis https://medium.com/@clearbluejar/everyday-ghidra-how-platform-choice-influences-ghidras-binary-analysis-76c40db0e407
I should just share all of Trails of Bits new posts, right? It's the best cryptography blog I know of.
This time they're discussing key derivatives (as in, how to get a private key? How to generate more keys out of it?).
https://blog.trailofbits.com/2025/01/28/best-practices-for-key-derivation/
If you haven’t noticed malicious emails abusing Microsoft Library Description files (.library-ms), watch out and block them.
From Microsoft “Library description files are XML files that define libraries. Libraries aggregate items from local and remote storage locations into a single view in Windows Explorer.”
Threat actors, in an effort to evade detection, use them as a way of connecting their target to a remote share directly via File Explorer.
https://learn.microsoft.com/en-us/windows/win32/shell/library-schema-entry
We are thrilled to announce the winners of the 2024 Hex-Rays Plugin Contest!
🥇1st Place: hrtng
🥈2nd Place: aiDAPal
🥉3rd Place: idalib Rust bindings
Check out our reviews of the winners and other notable submissions here: https://hex-rays.com/blog/2024-plugin-contest-winners
Huge thank you to all participants for their innovative contributions. Your creativity continues to enhance the IDA community.
Added AMD support to hvext, the windbg extension for reversing Hyper-V!
https://github.com/tandasat/hvext
You can check what SVM features are enabled, which MSRs and IO ports are accessible, and how nested page table looks like, for NT, SK and regular VMs.