Skip Navigation
udunadan

An open-eyed man falling into the well of weird warring state machines. I mostly speak on (offensive) cybersecurity issues.

https://twitter.com/udunadan

https://infosec.exchange/@udunadan

Posts
82
Comments
7
Joined
2 yr. ago
Exploit Development @infosec.pub
udunadan @infosec.pub

No More Speculation: Exploiting CPU Side-Channels for Real

Exploit Development @infosec.pub
udunadan @infosec.pub

Diving into Windows Remote Access Service for Pre-Auth Bugs

Exploit Development @infosec.pub
udunadan @infosec.pub

iOS 17: New Version, New Acronyms

www.df-f.com iOS 17: New Version, New Acronyms — Dataflow Forensics

Our goal at DFF is to reveal any threats on mobile devices, and that requires us to keep up to date with every single version of Android and iOS, including the beta and "Developer Preview" phases. Often, these are the under-the-hood, undocumented changes which have the real impact on opera

iOS 17: New Version, New Acronyms — Dataflow Forensics
Exploit Development @infosec.pub
udunadan @infosec.pub

You have become the very thing you swore to destroy: Remotely exploiting an Antivirus engine

Exploit Development @infosec.pub
udunadan @infosec.pub

Use Native Pointer of Function to Bypass The Latest Chrome v8 Sandbox

Exploit Development @infosec.pub
udunadan @infosec.pub

In-depth Analysis of the CVE-2023-29300 Adobe ColdFusion Serialization Vulnerability

Exploit Development @infosec.pub
udunadan @infosec.pub

CVE-2023-2033

Exploit Development @infosec.pub
udunadan @infosec.pub

Exploiting a Flaw in Bitmap Handling in Windows User-Mode Printer Drivers

Exploit Development @infosec.pub
udunadan @infosec.pub
blog.isosceles.com An Introduction to Exploit Reliability

Earlier this year I was invited to give a talk at University of California San Diego (UCSD) for Nadia Heninger's CSE 127 ("Intro to Computer Security"). I chose to talk about modern exploit development, stepping through the process of finding and exploiting some of the memory corruption bugs that th...

An Introduction to Exploit Reliability
Exploit Development @infosec.pub
udunadan @infosec.pub
Exploit Development @infosec.pub
udunadan @infosec.pub
Exploit Development @infosec.pub
udunadan @infosec.pub

All known API based kernel address leaks on Windows no longer work

Exploit Development @infosec.pub
udunadan @infosec.pub

CVE-2023-3389 - Exploiting a vulnerability in the io_uring subsystem of the Linux kernel

Exploit Development @infosec.pub
udunadan @infosec.pub
Exploit Development @infosec.pub
udunadan @infosec.pub
blog.isosceles.com The Legacy of Stagefright

Introduction Every so often a piece of security research will generate a level of excitement and buzz that's palpable. Dan Kaminsky's DNS bug, Barnaby Jack's ATM Jackpotting, Chris Valasek and Charlie Miller's Jeep hacking escapades. There's something special about the overheard conversations, the ...

The Legacy of Stagefright
  • Absolutely no problem, happy if you liked it!

  • The issue had been made public only on July 25. The point of sharing the bug isn't notifying users to patch their browsers but to inform browser vulnerability researchers of a valuable data point.

  • Exploit Development @infosec.pub
    udunadan @infosec.pub
    starlabs.sg prctl anon_vma_name: An Amusing Linux Kernel Heap Spray

    TLDR prctl PR_SET_VMA (PR_SET_VMA_ANON_NAME) can be used as a (possibly new!) heap spray method targeting the kmalloc-8 to kmalloc-96 caches. The sprayed object, anon_vma_name, is dynamically sized, and can range from larger than 4 bytes to a maximum of 84 bytes. The object can be easily allocated a...

    prctl anon_vma_name: An Amusing Linux Kernel Heap Spray
    Exploit Development @infosec.pub
    udunadan @infosec.pub

    CVE-2023-35086 POC - ASUS routers format string vulnerability

    Exploit Development @infosec.pub
    udunadan @infosec.pub
    starlabs.sg A new method for container escape using file-based DirtyCred

    Recently, I was trying out various exploitation techniques against a Linux kernel vulnerability, CVE-2022-3910. After successfully writing an exploit which made use of DirtyCred to gain local privilege escalation, my mentor Billy asked me if it was possible to tweak my code to facilitate a container...

    A new method for container escape using file-based DirtyCred
    Exploit Development @infosec.pub
    udunadan @infosec.pub

    UAF in MLGraphXnnpack::BuildOnBackgroundThread (reward: $11000)

    Exploit Development @infosec.pub
    udunadan @infosec.pub
  • It was an ITW 0-day at the moment of reporting and has probably retained the issue header from back then which I had copied.

  • Popped up on my Twitter feed somewhere

  • The content is really bounded by tech stuff, but I guess that's due to migration being important for tech-savvy users. It is true that appending "reddit" to search queries and following the results is still inevitable (but hey, libreddit and teddit still work). But vibe is completely different, very organic, very active, I like it a lot. I think there is a lot of potential in this feeling of authentic communication. Let's hope it grows.

    Lemmy is much better replacement for Reddit than Mastodon is for Twitter.