Think your speech model is secure?
It might be quietly leaking what it was trained on.
In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
π neodyme.io/en/blog/memb...
@d0ntrash.bsky.social
Security Researcher @neodyme.io | CTF, Fuzzing, Embedded Security
Think your speech model is secure?
It might be quietly leaking what it was trained on.
In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
π neodyme.io/en/blog/memb...
At #Pwn2Own Ireland 2024, we successfully targeted the SOHO Smashup category. π¨οΈ
Starting with a QNAP QHora-322 NAS, we pivoted to the Canon imageCLASS MF656Cdw - and ended up with shellcode execution.
Read the full vulnerability deep dive here π neodyme.io/en/blog/pwn2...
From iframes and file reads to full RCE. π₯
We found an HTML-to-PDF API allowing file reads and SSRF - then chained it into remote code execution via a Chromium 62 WebView exploit.
π Read the full write-up here: neodyme.io/en/blog/html...
Interested in learning about Windows exploitation?
This August, join us in Las Vegas for an intensive, hands-on 4-day DEFCON training:
Binary Exploitation on Windows, led by Felipe and Kolja!
ποΈ When: August 9β12, 2025
π Where: Las Vegas Convention Center
Wrapping up our COM hijacking series! π
In the final part, we discuss a custom IPC protocol, use a registry write to gain SYSTEM privileges, and explore Denial of Service attacks on security products. π₯π»
Don't miss it! neodyme.io/en/blog/com_...
πͺIntroducing HyperHook! πͺ
A harnessing framework for snapshot-based #fuzzing using Nyx. βοΈ
HyperHook simplifies guest-to-host communication & automates repetitive tasks, making snapshot-fuzzing easier & more efficient!
π Read more: neodyme.io/en/blog/hype...
πPart 2 of our COM hijacking series is live!
This time, we discuss a vulnerability in AVG Internet Security, where we bypass an allow-list, disable self-protection, and exploit an update mechanism to escalate privileges to SYSTEM ππ»
neodyme.io/en/blog/com_...
From startups to large companies, we've seen this setup used by many corporate clients in the wild. Here's why this is so difficult to fix and Microsoft has not changed the exploitable default settings yet: neodyme.io/blog/bitlock...
17.01.2025 14:20 β π 3 π 2 π¬ 0 π 0If you are using BitLocker and hardware attacks were not enough to convince you to enable preboot authentication, check out my colleague's posts on a software-only attack to dump the encryption key from RAM.
17.01.2025 14:32 β π 1 π 0 π¬ 0 π 0Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! π
Check out our first blog post on our journey to π₯ exploit five reputable security products to gain privileges via COM hijacking: neodyme.io/blog/com_hij...
Kids these days don't even know how much opportunity they have to learn hacking from actual pros.
I know there is a lot of content out there, so it can be hard to find the good stuff. But 10 years ago you had to be lucky to find at least something.
Anyway, watch this π
Slides for our talk "The Key to COMpromise" (AV/EDR privilege escalation) are on GitHub.
If you want to discuss this stuff, you can find @k0lj4.bsky.social or me at the CTF area of #38c3
github.com/0x4d5a-ctf/3...
To little surprise it seems that multiple #antivirus vendors have been ignoring COM hijacking as a self-defense bypass and LPE vector since at least 2018, when I first published about this technique (see my prev post).
At #38c3 guys from Neodyme demonstrated some more elegant
1/2
ND people are @ #38C3 in Hamburg, Germany. Be sure to check out our two talks about LPEs in AV/EDR Products (Saturday, 4 PM YELL) and a not yet mitigated Bitlocker Flaw! (Saturday, 7:15 PM HUFF)
27.12.2024 17:51 β π 2 π 3 π¬ 1 π 1Watch the recording of my #ekoparty talk "Advanced #Fuzzing with #LibAFL" here:
youtu.be/FI7C37lz4Rg?...
Thanks @fede-k.bsky.social for this amazing event!
Thanks for sharing! π
Let me know if you have questions/feedback π
Reversing C++ structures can be tricky. Binary Ninja makes it easier. I wrote up a walkthrough to clean up those pesky vtables. @binary.ninja
www.seandeaton.com/gotta-re-em-...
#binaryninja #reverseengineering #ghidra #ida
Honored to see my own work on the list! π
29.11.2024 18:59 β π 3 π 0 π¬ 1 π 0π₯When security software itself becomes a target! π₯
Learn how we've uncovered critical vulnerabilities in Wazuh, turning a powerful security tool into an unexpected attack vector.
π Read more about the findings:
neodyme.io/en/blog/wazu...
I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...
Confirmed! Team Neodyme (@Neodyme) used a stack-based buffer overflow to exploit the HP Color LaserJet Pro MFP 3301fdw printer. The earn $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland
22.10.2024 10:58 β π 6 π 3 π¬ 1 π 0Don't really know the purpose of starter packs yet, but here's some people who fuzz(ed). Let me know who I forgot
go.bsky.app/EhGFSVj
Slides for my @ekoparty talk "Advanced Fuzzing
With LibAFL"
- >
docs.google.com/presentation...
Just published a blog post about some critical vulnerabilities I discovered in Wazuh last year! The post covers details on how I found these vulnerabilities and highlights why security tools like EDRs can themselves become valuable targets for attackers.
#infosec
neodyme.io/en/blog/wazu...