Search:

Last Week in Security (LWiS) - 2025-03-24

Next.js auth bypass (@zhero___ + @inzo____), ServiceNow for red teamers (@__invictus_), Veeam RCE - again! (@chudyPB), ArgFuscator (@Wietze), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-03-17 to 2025-03-24.

News

  • Google + Wiz: Strengthening Multicloud Security - $32 billion... Google is positioning itself to be the "security" cloud provider after the Mandiant and Wiz acquisitions.
  • Trimarc Joins TrustedSec: Strengthening Our Commitment to Security - TrustedSec snatches Sean Metcalf and his team! Good luck guys!
  • Microsoft Trusted Signing service abused to code-sign malware - The Microsoft hosted signing service is being abused to sign malware. Why not use the Azure service when it's cheap and easy?
  • The Trump Administration Accidentally Texted Me Its War Plans - Politics aside, the planning and dissemination of national security information via Signal is wild. This is why iOS 0days are so valuable; with access to the phone all the end-to-end encryption isn't worth anything and an adversary can just read the messages out of Signal's database. One wonders what would happen to an Army soldier who shared operational details via Signal and if that same punishment will befall any members of this group chat. The US Director of National Intelligence, who was in the Signal group where the information was shared, tweeted on 2025-03-14 (10 days ago) "Any unauthorized release of classified information is a violation of the law and will be treated as such." We shall see.

Techniques and Write-ups

Tools and Exploits

  • spinningcat - A program to "demonstrate impact" by filling the target's screen with a cat gif and playing techno music (based on: spinningcat).
  • CloudPEASS - The current goal of Cloud PEASS is simple: Once you manage to get some credentials to access Azure, GCP or AWS, use different techniques to get the permissions the principal has and highlight all the potential attacks (privilege escalation, read sensitive information, etc) it's possible to do. [Note: this is the first tool I've seen to ship data to an LLM by default (that isn't explicitly an AI based tool). Be careful with sensitive data]
  • CVE-2025-24071_PoC - NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File.
  • verizon_burp_extensions_ai - Verizon Burp Extensions: AI Suite.
  • CVE-2025-29927 - Vulnerability in Next.js where the internal header x-middleware-subrequest can be used to bypass middleware checks like authentication.
  • ludus_ghosts_server - Ansible GHOSTS server role for Ludus.
  • defending-off-the-land - Assortment of scripts and tools for our Blackhat EU 2024 talk. [The file_access_token is so cool!]
  • kernel-callback-removal - kernel callback removal (Bypassing EDR Detections).

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • phisherman - A real fake social engineering app.
  • The biggest mistake: ServicePrincipalName’s - Old blog but still valuable. Must read for all kerberos enthusiast or anyone confused about what SPNs are.
  • nuclei-templates-labs - Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀.
  • landrun - Run any Linux process in a secure, unprivileged sandbox using Landlock LSM. Think firejail, but lightweight, user-friendly, and baked into the kernel.
  • active-directory-firewall - Active Directory Firewall.
  • Ultimate-RAT-Collection - For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.
  • cascii is a web-based ASCII and Unicode diagram builder written in vanilla Javascript.
  • Time crystal - 🤯

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.

page 1 | older articles »