Think your speech model is secure?
It might be quietly leaking what it was trained on.
In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
π neodyme.io/en/blog/memb...
@k0lj4.bsky.social
Think your speech model is secure?
It might be quietly leaking what it was trained on.
In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
π neodyme.io/en/blog/memb...
π Throwback to #Pwn2Own Toronto 2022: "Routers are just Linux boxes with antennas." So we treated one like it. At #Pwn2Own 2022, we turned a Netgear RAX30 into a stepping stone for a full LAN pivot. Story: neodyme.io/en/blog/pwn2...
06.06.2025 16:08 β π 4 π 1 π¬ 0 π 0At #Pwn2Own Ireland 2024, we successfully targeted the SOHO Smashup category. π¨οΈ
Starting with a QNAP QHora-322 NAS, we pivoted to the Canon imageCLASS MF656Cdw - and ended up with shellcode execution.
Read the full vulnerability deep dive here π neodyme.io/en/blog/pwn2...
π Digging deeper into COM hijacking!
In Part 3, we explore two new vulnerabilities:
ποΈ Webroot Endpoint Protect (CVE-2023-7241) β SYSTEM via arbitrary file deletion
π₯ Checkpoint Harmony (CVE-2024-24912) β SYSTEM via a file download primitive
Read more: neodyme.io/en/blog/com_...
πͺIntroducing HyperHook! πͺ
A harnessing framework for snapshot-based #fuzzing using Nyx. βοΈ
HyperHook simplifies guest-to-host communication & automates repetitive tasks, making snapshot-fuzzing easier & more efficient!
π Read more: neodyme.io/en/blog/hype...
πPart 2 of our COM hijacking series is live!
This time, we discuss a vulnerability in AVG Internet Security, where we bypass an allow-list, disable self-protection, and exploit an update mechanism to escalate privileges to SYSTEM ππ»
neodyme.io/en/blog/com_...
From startups to large companies, we've seen this setup used by many corporate clients in the wild. Here's why this is so difficult to fix and Microsoft has not changed the exploitable default settings yet: neodyme.io/blog/bitlock...
17.01.2025 14:20 β π 3 π 2 π¬ 0 π 0Your laptop was stolen. Itβs running Windows 11, fully up-to-date, device encryption (BitLocker) and Secure Boot enabled. Your data is safe, right? Think again! This software-only attack grabs your encryption key. Following up on our #38C3 talk: neodyme.io/blog/bitlock...
17.01.2025 14:00 β π 4 π 2 π¬ 1 π 1Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! π
Check out our first blog post on our journey to π₯ exploit five reputable security products to gain privileges via COM hijacking: neodyme.io/blog/com_hij...
I agree this will just make it a bit harder, but is by no means a proper fix for the underlying issue. There are probably different ways to inject code and I think vulnerable signed DLLs (itm4n.github.io/ghost-in-the...) might also be an option but I have not looked into it further.
29.12.2024 09:31 β π 1 π 0 π¬ 0 π 0Slides for our talk "The Key to COMpromise" (AV/EDR privilege escalation) are on GitHub.
If you want to discuss this stuff, you can find @k0lj4.bsky.social or me at the CTF area of #38c3
github.com/0x4d5a-ctf/3...
ND people are @ #38C3 in Hamburg, Germany. Be sure to check out our two talks about LPEs in AV/EDR Products (Saturday, 4 PM YELL) and a not yet mitigated Bitlocker Flaw! (Saturday, 7:15 PM HUFF)
27.12.2024 17:51 β π 2 π 3 π¬ 1 π 1π₯When security software itself becomes a target! π₯
Learn how we've uncovered critical vulnerabilities in Wazuh, turning a powerful security tool into an unexpected attack vector.
π Read more about the findings:
neodyme.io/en/blog/wazu...
Just published a blog post about some critical vulnerabilities I discovered in Wazuh last year! The post covers details on how I found these vulnerabilities and highlights why security tools like EDRs can themselves become valuable targets for attackers.
#infosec
neodyme.io/en/blog/wazu...