Category: MalwareTech

CVE-2024-38063 – Remotely Exploiting The Kernel Via IPv6

Performing a root cause analysis & building proof-of-concept for CVE-2024-38063, a CVSS 9.8 Vulnerability In the Windows Kernel IPv6 Parser This article has been indexed from MalwareTech Read the original article: CVE-2024-38063 – Remotely Exploiting The Kernel Via IPv6

Bypassing EDRs With EDR-Preloading

Evading user mode EDR hooks by hijacking the AppVerifier layer This article has been indexed from MalwareTech Read the original article: Bypassing EDRs With EDR-Preloading

It might Be Time to Rethink Phishing Awareness

Phishing awareness can be a powerful security tool, or a complete disaster. It all hinges on how you implement it. This article has been indexed from MalwareTech Read the original article: It might Be Time to Rethink Phishing Awareness

[Video] Introduction to Use-After-Free Vulnerabilities | UserAfterFree Challenge Walkthrough (Part: 1)

This article has been indexed from MalwareTech An introduction to Use-After-Free exploitation and walking through one of my old challenges. Challenge Info: https://www.malwaretech.com/challenges/windows-exploitation/user-after-free-1-0 Download Link: https://malwaretech.com/downloads/challenges/UserAfterFree2.0.rar Password: MalwareTech The post [Video] Introduction to Use-After-Free Vulnerabilities | UserAfterFree Challenge Walkthrough (Part:…

[Video] Introduction to Use-After-Free Vulnerabilities | UserAfterFree Challenge Walkthrough (Part: 1)

This article has been indexed from MalwareTech An introduction to Use-After-Free exploitation and walking through one of my old challenges. Challenge Info: https://www.malwaretech.com/challenges/windows-exploitation/user-after-free-1-0 Download Link: https://malwaretech.com/downloads/challenges/UserAfterFree2.0.rar Password: MalwareTech The post [Video] Introduction to Use-After-Free Vulnerabilities | UserAfterFree Challenge Walkthrough (Part:…

How I Found My First Ever ZeroDay (In RDP)

Read the original article: How I Found My First Ever ZeroDay (In RDP) Up until recently, I’d never tried the bug hunting part of vulnerability research. I’ve been reverse engineering Windows malware for over a decade, and I’d done the…

Are Criminals Really Using ICS Malware?

Read the original article: Are Criminals Really Using ICS Malware? Recently, The New York Times posted a sensational article about criminals using sophisticated state software for the first time. The headline is non-specific and could be taken to mean state…