Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! π
Check out our first blog post on our journey to π₯ exploit five reputable security products to gain privileges via COM hijacking: neodyme.io/blog/com_hij...
Slides for our talk "The Key to COMpromise" (AV/EDR privilege escalation) are on GitHub.
If you want to discuss this stuff, you can find @k0lj4.bsky.social or me at the CTF area of #38c3
github.com/0x4d5a-ctf/3...
Yeah, totally agree. AVG did somehow block DLLs that weren't located in allow-listed folders, not really sure how it was implemented. However, C:/Windows/System32/* was allowed and System32/spool/drivers/color/ is user writeable...
Nice! I wasnt aware of your research, seems you beat us by a few years :D impressive to see that little changed regarding the attack surface and the actual vulns ...
Different privilege escalation vulns in security products? See our talk tomorrow :)