Red teamer @ Outflank. Passionate about networking and cybersecurity | father of two superheroes.

Groningen, Nederland
Joined December 2010
I pretended I'm an exploit dev and created a stable exploit to CVE-2020-1034, that's tagged by MS as "low complexity". But only if crashing the machine is your only goal: windows-internals.com/exploi… Thank you @aionescu for all the help and reviews! 😄
5
163
493
Show this thread
Cn33liz retweeted
ETW is very vulnerable part of Windows NT Kernel The first blog of 2021 : blog.br0vvnn.io/pages/blogpo… CVE-2020-1033 CVE-2020-1034 CVE-2021-1662 CVE-2021-1682 Thanks to @YanZiShuang @gabe_k @z0x55g @lm0963 @yarden_shafir
1
88
240
Cn33liz retweeted
One more for the collection - added a Syscalls process dump BOF to the repo. Effectively a port of @OutflankNL's awesome Dumpert. github.com/ajpc500/BOFs/tree…
1
41
83
Cn33liz retweeted
Having discovered various issues with Windows mini-filter drivers lately I found public information about how to analyze such drivers for security issues somewhat lacking. Therefore today I've put out a blog post to try and fix that glitch :-) googleprojectzero.blogspot.c…
4
238
477
Cn33liz retweeted
I wrote a blog & proof of concept for a Beacon Object File that performs remote process injection via thread hijacking instead of spawning a new thread. This was a lot of fun & I’m glad operators who leverage Cobalt Strike can now run in-memory C tools!! connormcgarr.github.io/threa…
4
154
346
Show this thread