codewhitesec.bsky.social's Avatar

codewhitesec.bsky.social

@codewhitesec.bsky.social

Red Teaming. Security Research. Continuous Penetration Testing. Threat Intelligence.

62 Followers  |  12 Following  |  9 Posts  |  Joined: 19.01.2024  |  1.3892

Latest posts by codewhitesec.bsky.social on Bluesky

Preview
CODE WHITE | A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS How the n-day research for a suspected vulnerability in Microsoft WSUS (CVE-2025-59287) led to the surprising discovery of a new `SoapFormatter` vulnerability added by the Patch Tuesday updates of Oct...

Latest β‰  Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange.bsky.social who loves converting n-days to 0-days code-white.com/blog/wsus-cv...

29.10.2025 13:05 β€” πŸ‘ 7    πŸ” 5    πŸ’¬ 0    πŸ“Œ 1
ULMageddon Logo

ULMageddon Logo

CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun 🀘 and #applyIfYouCan

15.09.2025 07:40 β€” πŸ‘ 5    πŸ” 6    πŸ’¬ 0    πŸ“Œ 1
Preview
FAUST CTF 2025 | FAUST CTF 2025 FAUST CTF 2025 is an online attack-defense CTF competition run by FAUST, the CTF team of Friedrich-Alexander University Erlangen-NΓΌrnberg

We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net

28.08.2025 12:22 β€” πŸ‘ 7    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - codewhitesec/NewRemotingTricks: New exploitation tricks for hardened .NET Remoting servers New exploitation tricks for hardened .NET Remoting servers - codewhitesec/NewRemotingTricks

We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...

05.08.2025 15:11 β€” πŸ‘ 4    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1

To clarify: we did not discover these bugs - all credit goes to @_l0gg (on X). We diffed the patches, quickly built a working exploit internally (and identified another auth bypass afterwards)

21.07.2025 08:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social

14.07.2025 13:00 β€” πŸ‘ 4    πŸ” 5    πŸ’¬ 1    πŸ“Œ 2
CODE WHITE | Analyzing the Attack Surface of Ivanti's DSM Ivanti's Desktop & Server Management (DSM) product is an old acquaintance that we have encountered in numerous red team and internal assessments. The main purpose of the product is the centralized dis...

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-...

13.05.2025 06:45 β€” πŸ‘ 8    πŸ” 8    πŸ’¬ 0    πŸ“Œ 1
Exploiting IngressNightmare: A Deep Dive Wiz recently discovered an unauthenticated remote code execution (RCE) vulnerability in the Ingress NGINX admission controller. I found the exploit chain particularly intriguing and decided to recreat...

blog.flomb.net/posts/ingres...

31.03.2025 14:28 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

Our crew members @mwulftange.bsky.social & @frycos.bsky.social discovered & responsibly disclosed several new RCE gadgets that bypass #Veeam 's blacklist for CVE-2024-40711 & CVE-2025-23120 + further entry points after @sinsinology.bsky.social & @chudypb.bsky.social 's blog. Replace BinaryFormatter!

28.03.2025 16:35 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 0    πŸ“Œ 2
Walkthrough 2023

Ever wondered how Kurts Maultaschenfabrikle got hacked in 2023? The full story, all technical details, out now ;-) apply-if-you-can.com/walkthrough/...

21.02.2025 10:31 β€” πŸ‘ 7    πŸ” 10    πŸ’¬ 0    πŸ“Œ 0

@codewhitesec is following 12 prominent accounts