Search:

Last Week in Security (LWiS) - 2025-02-10

Mythic C#/BOF support (@its_a_feature_), Ludus guide (@sherif_ninja), Window shadow stacks (@33y0re), Orbit scanner (@BHinfoSecurity), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-01-27 to 2025-02-10.

News

Techniques and Write-ups

Tools and Exploits

  • tspatch.c - "Tired of using ts::multirdp, because Mimikatz is a nogo nowadays and get's flagged anyway most of the time? Well, here is a standalone patching implementation with Win11 support"
  • lolc2.github.io is a collection of C2 frameworks that leverage legitimate services to evade detection.
  • pool_party_rs - This tool is a remote process injection uses techniques described in The Pool Party You Will Never Forget and found in PoolParty.
  • bloudstrike - Linux CS bypass technique.
  • raccoon - a C# tool for extending the screenshot functionality of Command and Control (C2) frameworks. The tool was developed to take targeted screenshots of processes even if their window is minimised. Check out the original blog .
  • Stifle - .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS.
  • StringReaper - Reaping treasures from strings in remote processes memory.
  • ScreenshotBOF - An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
  • CVE-2024-38143 - Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability.
  • orbit - Orbit is a powerful platform designed to facilitate large-scale Nuclei scans, enabling teams to efficiently manage and analyze scan results.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • BloodHoundViewer - BloodHound CE Enhancement Extension - A Chrome extension that enhances BloodHound Community Edition with additional features including query history navigation, improved layout controls, and Neo4j button.
  • ludus_caldera_server - Ansible role to install a CALDERA server for LUDUS.
  • ludus_caldera_agent - Ansible role to install a CALDERA agent for LUDUS.
  • ludus_aurora_agent - Ludus role to install Free windows EDR Aurora.
  • ludus-ad-vulns - Ludus role that adds vulnerabilities in an Active Directory.
  • AzureRedirector - A C# project that builds a Web Applciation which redirects all HTTPS.
  • OSX-PROXMOX - Voilà, install macOS on ANY Computer! This is really and magic easiest way!.
  • caReports - Conditional Access Reporting.
  • doom-captcha - A DOOM®-based CAPTCHA for the web.
  • well-architected-iac-analyzer - Well-Architected Infrastructure as Code (IaC) Analyzer is a project that demonstrates how generative AI can be used to evaluate infrastructure code for alignment with best practices.
  • Vergilius - Take a look into the depths of Windows kernels and reveal more than 60,000 undocumented structures.
  • The Company Portal app – A deep dive into bridges - Thorough explanation on how Microsoft's Company Portal app uses two bridge components - ConfigMgr Bridge and Intune Management Extension Bridge - to handle application installations and device management functions in Windows.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.