Categories
Tags
Latest Advisories
Latest Blog Posts
Analyzing and Breaking Defender for Endpoint's Cloud Communication
Attacking EDRs Part 5 - Multiple vulnerabilities are present in the communication of Defender for Endpoint with cloud APIs. Authentication bypass, spoofing of commands and data, uploading malicious data to incident responders and information disclosure.
2025-10-10
|
1333 words
|
7 minutes
Automation of VHDX Investigations
Yann Malherbe
Automating VHDX investigations can transform how DFIR teams handle virtual desktop environments. By integrating Velociraptor with a smart remapping workflow, this approach enables seamless analysis of virtual profiles, reducing manual effort, increasing speed, and ensuring consistent, scalable results across investigations.
2025-09-19
|
2568 words
|
13 minutes
Attacking EDRs Part 4: Fuzzing Defender's Scanning and Emulation Engine (mpengine.dll)
Multiple out-of-bounds read and null dereference bugs were identified in Microsoft Defender by using Snapshot Fuzzing with WTF and kAFL/NYX. The bugs can be used to crash the main Defender process as soon as the file is scanned. Most are unpatched, but none appear exploitable for code execution.
2025-05-23
|
3901 words
|
20 minutes
Attacking EDRs Part 3: One Bug to Stop them all
This post describes a DoS vulnerability affecting most Windows EDR agents. The vulnerability is an issue in the handling of already existing objects in the Object Manager's namespace.
2025-02-24
|
3422 words
|
17 minutes
Attacking EDRs Part 2: Driver Analysis Results
The second part describes the process and results of the EDR driver security analysis of Palo Alto Cortex using manual analysis and Sophos Intercept X using snapshot fuzzing. Only minor vulnerabilities were identified (CVE-2024-5905).
2025-02-17
|
3599 words
|
18 minutes
Attacking EDRs Part 1: Intro & Security Analysis of EDR Drivers
This article gives an overview of the attack surface of EDR software and describes the process to search for attack surface on EDR drivers from a low-privileged user.
2025-02-10
|
2340 words
|
12 minutes
Tear Down The Castle - Part 2
Stephan Berger
To gain insight into common issues and patterns of misconfiguration, we analyzed 250 PingCastle reports collected from Incident Response cases and Compromise Assessments.
2025-01-23
|
1514 words
|
8 minutes
Tear Down The Castle - Part 1
Stephan Berger
To gain insight into common issues and patterns of misconfiguration, we analyzed 250 PingCastle reports collected from Incident Response cases and Compromise Assessments.
2025-01-19
|
1814 words
|
9 minutes