Search:

Last Week in Security (LWiS) - 2025-02-17

PAN-OS auth bypass (@hash_kitten), Outlook drafts as C2 (@elasticseclabs), Ludus powered SocGholish analysis (@RussianPanda9xx), kernel UAF (@h0mbre_), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-02-10 to 2025-02-17.

News

  • DOGE’s .gov site lampooned as coders quickly realize it can be edited by anyone - "So far, it's clear that DOGE has gained access to data systems at the Centers for Medicare and Medicaid Services, the US Agency for International Development, the Department of Veterans Affairs, the Department of Education, and the US Treasury. And most recently, DOGE got software approval to potentially transfer 'vast amounts of data' out of the Department of Labor’s systems." What a time to be a foreign cyber actor. Perhaps DOGE doesn't know that USA Spending already exists and even has an API and full database downloads? Archive.org has captures of the defacement (may take a few seconds to load): Example 1, Example 2.

Techniques and Write-ups

  • 2025 IT Risk and Compliance Benchmark Report release Sponsored - Hyperproof, a trusted platform for operationalizing compliance and risk management, has released its 6th annual IT Risk and Compliance Benchmark Report. Based on insights from 1,000 IT and GRC professionals, the in-depth report contains insights on trends shaping the GRC space in 2025. See the report.

Tools and Exploits

  • ChgPass - is a Windows standalone executable tool that allows you to change the password of user/computer accounts in Active Directory (AD) via MS-SAMR protocol. This tool can be used when you have the necessary permissions on the objects but need a simple way to set passwords using a standalone exe command line. More info: Changing Windows Passwords in the Most Complex Way.
  • captaincredz - CaptainCredz is a modular and discreet password-spraying tool.
  • ARM64_AmsiPatch - With the rise of ARM64 as an emerging architecture for Windows on ARM devices, there is an increasing need to understand and adapt low-level techniques traditionally used on x86_64 systems to this new platform. This repository demonstrates how AMSI (Antimalware Scan Interface) patching can be translated to ARM64, showcasing the fundamental differences and similarities in opcode manipulation between x86_64 and ARM64 architectures.
  • WebcamBOF - Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options.
  • susinternals - A python implementation of PSExec's native service implementation.
  • wpprobe - A fast WordPress plugin enumeration tool.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • PowerCrypt - The best powershell obfuscator ever made.
  • Stifle - .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS.
  • ashirt-server - Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit.
  • ashirt - It records your screenshots and code, then lets you upload to ASHIRT.
  • aterm - It records your terminal, then lets you upload to ASHIRT.
  • Playable3DMaze - A playable version of Microsoft's old 3DMaze screensaver from Windows 9x.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.

page 1 | older articles »