wetw0rk's Avatar

wetw0rk

@wetw0rk7.bsky.social

14 Followers  |  5 Following  |  18 Posts  |  Joined: 06.12.2024  |  1.6916

Latest posts by wetw0rk7.bsky.social on Bluesky

0x09 - Return of the Windows Kernel Stack Overflow In the last tutorial we exploited one of the most notorious bug classes in the entire industry - Race Conditions. In this tutorial we’re going back to a bug class we have exploited before - The Stack ...

Anyone hungry for a🍪? Today we learn about Stack Cookies! Also known as Canaries!

This will be the last tutorial within the Windows Kernel Exploitation series.

As of today all 10 tutorials are available for English speakers!

wetw0rk.github.io/posts/0x09-r...

09.02.2025 00:08 — 👍 0    🔁 0    💬 0    📌 0
0x07 - Introduction to Windows Kernel Race Conditions In the last tutorial we successfully exploited a Type Confusion vulnerability against Windows 11 (x64). In this tutorial we’ll introduce a new vulnerability type - a Race Condition, more specifically ...

Are you ready for an introduction to Windows Kernel Race Conditions?

You can find the tutorial below :)

wetw0rk.github.io/posts/0x07-i...

25.01.2025 16:13 — 👍 0    🔁 0    💬 0    📌 0
0x06 - Acercándose a Windows Kernel Type Confusions Modernos En el último tutorial explotamos una “Type Confusion” dentro del kernel de Windows 7 (x86). Habiendo obtenido un base sólido para esta vulnerabilidad, podemos proceder a intentar aprovechalo dentro de...

Type Confusions pueden ser... difícil, especialmente cuando se trata de una versión más moderna de Windows. Hoy explotamos uno contra Windows 11 (x64). Un saludo a
@w4fz5uck5 y @xct_de! Por ayudarme a superar esto!

Puedes encontrar el tutorial aquí:

wetw0rk.github.io/posts/0x06-a...

20.01.2025 04:38 — 👍 0    🔁 0    💬 0    📌 0
0x06 - Approaching Modern Windows Kernel Type Confusions In the last tutorial we exploited a Type Confusion within the Windows 7 (x86) Kernel. Having obtained a solid foundation on approaching this vulnerability, we can now proceed to attempt exploitation o...

Type Confusions can be… confusing, especially when targeting a more modern version of Windows. Today we exploit one against Windows 11 (x64). Shoutout to @w4fz5uck5 and @xct_de for helping me get through this one!

You can find the tutorial here:

wetw0rk.github.io/posts/0x06-a...

18.01.2025 18:08 — 👍 0    🔁 0    💬 0    📌 0
0x05 - Introducción a Windows Kernel Type Confusion Vulnerabilidades En el último tutorial aprovechamos un “Write-What-Where” o un “Escribir Qué Dónde” dentro de Windows 7 (x86) y Windows 11 (x64). Igual que en los últimos tutoriales, introduciremos una nueva falla en ...

Mmm… Hrmmmmm… Mmm… mmm… Mm! Oh-hoh! Perdóname. Estaba absorto en mis pensamientos. Esta semana veremos una introducción a Type Confusions dentro del kernel de Windows! Más específicamente Windows 7 (x86).

Puedes encontrar el tutorial aquí!

wetw0rk.github.io/posts/0x05-i...

10.01.2025 15:37 — 👍 0    🔁 0    💬 0    📌 0
0x05 - Introduction to Windows Kernel Type Confusion Vulnerabilities In the last tutorial we exploited a “Write-What-Where” vulnerability within Windows 7 (x86) and Windows 11 (x64). As with previous tutorials we will begin exploiting a new flaw against the Windows 7 (...

Mmm… Hrmmmmm… Mmm… mmm… Mm! Oh-hoh! Forgive me. I was absorbed in thought. This week, we’ll get an Introduction to Type Confusions within the Windows Kernel! More specifically Windows 7 (x86).

You can find the link to the tutorial down below!

wetw0rk.github.io/posts/0x05-i...

09.01.2025 15:24 — 👍 0    🔁 0    💬 0    📌 0
0x04 - Introducción a Windows Kernel "Write What Where" Vulnerabilidades Si has seguido los tutoriales desde el principio, sientete orgulloso de superar el “Use After Free” en el Windows Kernel! Ahora vamos a aprovechar un “Write What Where” vulnerabilidad en Windows 7 (x8...

Se me ocurrió algo más gracioso que 24… 25. Qué mejor manera de comenzar 2025 que con una introducción a una vulnerabilidad Write-What-Where dentro del kernel de Windows 7 (x86) y Windows 11 (x64)!

Puedes encontrar el tutorial aquí:

wetw0rk.github.io/posts/0x04-e...

06.01.2025 05:16 — 👍 1    🔁 0    💬 0    📌 0
0x04 - Introduction to Windows Kernel Write What Where Vulnerabilities First off, if you’re following the series from the start, great job getting past the Use After Free in the Windows Kernel! We’ll now be exploiting a Write What Where vulnerability on Windows 7 (x86) t...

I thought of something funnier than 24… 25. What better way to start 2025 than with an introduction to a Write-What-Where vulnerability within the Windows 7 (x86) and Windows 11 (x64) Kernel!

You can find the tutorial here:

wetw0rk.github.io/posts/0x04-w...

04.01.2025 23:06 — 👍 0    🔁 0    💬 0    📌 0
0x03 - Acercándose al Heap Moderno del Windows Kernel Habiendo aprovechado el UaF en Windows 7 (x86), hemos obtenido una idea sólida de cómo funciona esta vulnerabilidad, es hora de intentar esto en Windows 11 (x64). Es importante tener en cuenta que, au...

La semana pasada aprovechamos una vulnerabilidad de heap en el Windows 7 (x86) Kernel. Esta semana, un sistema más moderno - Windows 11 (x64)!

El tutorial se puede encontrar aquí:

wetw0rk.github.io/posts/0x03-a...

21.12.2024 22:25 — 👍 0    🔁 0    💬 0    📌 0
0x03 - Approaching the Modern Windows Kernel Heap Having exploited the UaF in Windows 7 (x86) we have obtained a solid idea of how this vulnerability works, it’s time to attempt exploitation on Windows 11 (x64). It’s important to note, although we co...

Last week, we successfully exploited a Windows Kernel vulnerability in the heap on a Windows 7 (x86) system. This week, we're targeting a more modern OS - Windows 11 (x64)!

Check out the tutorial here:

wetw0rk.github.io/posts/0x03-a...

21.12.2024 22:24 — 👍 0    🔁 0    💬 0    📌 0
Preview
GitHub - wetw0rk/Sickle: Payload development framework Payload development framework. Contribute to wetw0rk/Sickle development by creating an account on GitHub.

Sickle v3.1.0 is out!! Shellcode generation is now supported and I've added 9 new payloads including a reflective loader for Linux on both AARCH64 and x64! Along with a new module asm_shell which supports x86, x64, and AARCH64!

Check it out here:

github.com/wetw0rk/Sickle

17.12.2024 06:12 — 👍 0    🔁 0    💬 0    📌 0
0x02 - Introducción a Windows Kernel Use After Frees (UaFs) Si has estado siguiendo la serie de Windows Kernel Exploitation consecutivamente, deberías haber exploited un Stack Overflow básico contra Windows 7 (x86) y Windows 10 (x64). Aunque este es un salto g...

En la serie de Windows Kernel Exploitation hemos aprovechado la vulnerabilidad de “Stack Overflow” contra Windows 7 (x86) y Windows 11 (x64). Esta semana volveremos a Windows 7 (x86) y vamos a exploit un Use-After-Free dentro del Windows Kernel!

wetw0rk.github.io/posts/0x02-i...

16.12.2024 03:26 — 👍 0    🔁 0    💬 0    📌 0
0x02 - Introduction to Windows Kernel Use After Frees (UaFs) If you’ve been following the series consecutively, by now you should have exploited a basic Stack Overflow both within Windows 7 (x86) and Windows 10 (x64). Although this is a major accomplishment the...

So far in the Windows Kernel Exploitation series we have successfully exploited a Stack Overflow against both Windows 7 (x86) and Windows 11 (x64). This week you'll be getting an introduction on how to exploit a Use-After-Free within the Windows Kernel!

wetw0rk.github.io/posts/0x02-i...

15.12.2024 00:49 — 👍 0    🔁 0    💬 0    📌 0
Video thumbnail

Demo can be seen below :)

14.12.2024 04:06 — 👍 0    🔁 0    💬 0    📌 0
Post image

It’s that time of the year, when you put your elf on a shelf and your ELFs in memory. Sickle now supports payload generation for reflective ELF loading!

Currently AARCH64 (ARM64) and x86-64 supported.

May your ELF payloads never touch disk!

github.com/wetw0rk/Sickle

14.12.2024 04:05 — 👍 1    🔁 0    💬 1    📌 0
Video thumbnail

Se me olvidó el gif 😭

08.12.2024 22:19 — 👍 0    🔁 0    💬 0    📌 0
0x01 - Matándo Windows Kernel Mitigaciones Esto fue posible por trabajo duro y determinación. No te sientas frustrado si estas cosas no las entiendes inmediatamente, y recordarte la fuente de la verdad siempre será el código. Y, para nosotros,...

Es hora de aprender a evitar las mitigaciones modernas de Windows! Como parte de este próximo tutorial, estoy revelando Violet Phosphorous, una técnica para evadir SMEP/VBS!

Puedes encontrar el primer tutorial aqí:

wetw0rk.github.io/posts/0x01-m...

08.12.2024 22:18 — 👍 0    🔁 0    💬 1    📌 0
Post image

It's time to learn how to bypass the latest mitigations deployed on Windows. As part of this next tutorial, I am dropping Violet Phosphorous, a SMEP/VBS bypass tested against the latest Windows 11 (x64) build as of today!

You can find the post here:

wetw0rk.github.io/posts/0x01-k...

07.12.2024 07:12 — 👍 1    🔁 0    💬 0    📌 0

@wetw0rk7 is following 5 prominent accounts