john@home:~$

  • CVE-2020-26894 Privilege Escalation Vulnerability in LiveCode v9.6.1 Programming Language

    Summary LiveCode v9.6.1 for Windows is vulnerable to a horizontal privilege escalation vulnerability. CVE Mitre Assigned: CVE-2020-26894 Discovery While taking a Wildlife Issues course at my University, I discovered a high severity vulnerability in the course software our class was using that leads to a horizontal privilege escalation. At first,...

  • Setting Up Your Own Malicious DNS Server For Data Exfiltration (Without a DNS Server)

    Data exfiltration is a key component of any red team/penetration testing assesment. Sometimes it’s as simple as scp’ing the sensitive data over an SSH connection. Other times, however, more sophisticated methods need to be used. One such common method is exfiltrating data through specially crafted URL requests to your public...

  • The Most Fun (and maybe impractical) Command and Control: SpotifyC2

    Command and Control is one of the most common techniques used by attackers to maintain persistent control over an infected computer, sending commands to be executed and receiving the output of those commands. There exists many different methods for implementing Command and Control, from using cloud services (AWS, Azure, etc.)...

  • VBA Macro Remote Template Injection With Unlinking & Self-Deletion

    One of the most common methods leveraged by attackers is the use of Malicious Word/Excel Documents sent over email. These malicious docs are embedded with macro VBA code that, when run, execute various tasks on the victim’s computer, usually resulting in RCE (Remote Code Execution) and/or data exfiltration. There are...