Search:

Last Week in Security (LWiS) - 2025-01-06

Kick off 2025 with, fresh news, new exploits, techniques, tools, and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past few weeks. This post covers 2024-12-16 to 2025-01-06.

News

Techniques and Write-ups

Tools and Exploits

  • aad-bofs - AzureAD beacon object files.
  • dylight is a project that loads macOS dynamic libraries (dylibs) from the internet over HTTP and injects within the local process.
  • VladimiRED - is a C# port of Mockingjay injection technique to be used with AppDomainManager Injection Method.
  • sccmhound - A BloodHound collector for Microsoft Configuration Manager.
  • aad-bofs - This repository contains a collection of BOFs for various Azure AD attacks.
  • TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of the box with many popular Azure post exploitation tools.
  • LitterBox - A sandbox environment designed specifically for malware development and payload testing.
  • sharp-execute - Executing .NET Files from an Unmanaged Process with Manual CLR Loading.
  • userland-exec - Userland exec replaces the existing process image within the current address space with a new one. It mimics the behavior of the system call execve, but the process structures describing the process image remain unchanged. In other words, the process name reported by system utilities will retain the old process name.
  • PanGP_Extractor - Tool to extract username and password of current user from PanGPA in plaintext.
  • Blackfyre - Blackfyre is an open-source platform designed to standardize and streamline binary analysis. It provides tools and APIs for extracting, analyzing, and storing binary data in a disassembler-agnostic and architecture-agnostic format. This enables consistent workflows for advanced reverse engineering tasks powered by AI/ML, NLP, and LLMs.
  • Krueger - Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC.
  • LitterBox - Sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment.
  • hashcrack-ai - Hashcrack-AI is an automated python script that is designed to use GPU instances provided by https://vast.ai, to deploy a Dockerized Hashcat CUDA instance https://github.com/dizcza/docker-hashcat.
  • trust-validator - Validates priv escalation of AD trusts.
  • DLLHound - Find potential DLL Sideloads on your windows computer.
  • Know-Normal-S1 - Helps to "Know Normal" by comparing artifacts from an alert against the enterprise. Based on SANS 508 concept.
  • PoCEntraDeviceComplianceBypass - Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy.
  • DRSAT - Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machines.
  • Cacheract - GitHub Actions Cache Native Malware - for Educational and Research Purposes only.
  • CodeQL-Community-Packs - Collection of community-driven CodeQL query, library and extension packs. More info: Announcing CodeQL Community Packs.
  • SCCMSiteCodeHunter - A utility for querying SCCM (System Center Configuration Manager) management points and site servers using LDAP.
  • CVE-2024-49112 - LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112.
  • btexec - Execute shellcode via Bluetooth device authentication.
  • Spyndicapped - COM ViewLogger — new malware keylogging technique.
  • DOMspy - A web security research tool for DOM testing. A chrome extension now.
  • MLOKit is a toolkit that can be used to attack MLOps platforms by taking advantage of the available REST API. This tool allows the user to specify an attack module, along with specifying valid credentials (API key or stolen access token) for the respective MLOps platform. Read the full report here: [PDF] Disrupting the Model: Abusing MLOps Platforms to Compromise ML Models and Enterprise Data Lakes.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • SharpExShell automates the DCOM lateral movement technique which abuses ActivateMicrosoftApp method of Excel application.
  • InstaTools - Ansible Script to install my favorite Tools.
  • NachoVPN - A delicious, but malicious SSL-VPN server 🌮.
  • CVE-2024-35176 - CVE-2024-35176 poc full.
  • lc3-vm - Write your own virtual machine for the LC-3 computer!.
  • SharpExShell - SharpExShell automates the DCOM lateral movement technique which abuses ActivateMicrosoftApp method of Excel application.
  • powerview.py - Just another Powerview alternative.
  • OFFAT - The OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The project remains a work in progress, continuously evolving towards completion.
  • SharpRDPHijack - A proof-of-concept Remote Desktop (RDP) session hijack utility.
  • AttackRuleMap - Mapping of open-source detection rules and atomic tests.
  • egressinator - Find what egress ports are allowed.
  • Azurepwn.ps1 - Azure post-exploitation work

Resources

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.