Quarkslab's Avatar

Quarkslab

@quarkslab.bsky.social

Securing every bit of your data https://quarkslab.com

276 Followers  |  3 Following  |  36 Posts  |  Joined: 21.11.2024  |  1.8073

Latest posts by quarkslab.bsky.social on Bluesky

​πŸ–₯️​ cesi n'est pas une named pipe

​πŸ–₯️​ cesi n'est pas une named pipe

K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation.
A story of endpoint post-exploitation by Lucas Laise

blog.quarkslab.com/k7-antivirus...

02.12.2025 15:51 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Bitcoin Core Audit Complete! – OSTIF.org

We've been a bit excited about this one.
We are excited and honored to have partnered with Bitcoin, brink, Chaincode Labs, and @quarkslab.bsky.social to collaborate on a security audit of Bitcoin Core. This was Bitcoin Core's first external audit.
Read more at our blog: ostif.org/bitcoin-core...

19.11.2025 15:31 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Bitcoin Core audit - Quarkslab's blog The Open Source Technology Improvement Fund, Inc. mandated Quarkslab to perform the first public security audit of Bitcoin core, the reference open-source implementation of the Bitcoin decentralized p...

Quarkslab engineers Robin David, Mihail Kirov and Kaname just completed the first public security audit of Bitcoin Core, led by
@ostifofficial.bsky.social and funded by Brink.dev

Details on the blog post:
blog.quarkslab.com/bitcoin-core...
Congrats to developers for such software masterpiece !

19.11.2025 15:40 β€” πŸ‘ 6    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
Announcing the results of our Security Audit | KubeVirt.io As part of our application to Graduate, KubeVirt has a security audit performed by a third-party, organised through the CNCF and OSTIF.

We are pleased to announce that the KubeVirt Security Audit report has been published, in collaboration with @quarkslab.bsky.social and @ostifofficial.bsky.social

Check out our blog post for all the details: kubevirt.io/2025/Announc...

12.11.2025 08:22 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

KubeVirt is open source virtualization technology for Kubernetes.
Recently we worked with the @kubevirt team on a security audit sponsored by @OSTIFofficial πŸ™

Read a summary of our findings and find the full report here:
blog.quarkslab.com/kubevirt-sec...

07.11.2025 16:26 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Our 2025-2026 internship season has started.
Check out the list of openings and apply for fun and knowledge!

blog.quarkslab.com/internship-offers-for-the-2025-2026-season.html

21.10.2025 09:51 β€” πŸ‘ 2    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers - Quarkslab's blog This article details two bugs discovered in the NVIDIA Linux Open GPU Kernel Modules and demonstrates how they can be exploited. The bugs can be triggered by an attacker controlling a local unprivileg...

From kernel oops to kernel exploit: How two little bugs (CVE-2025-23330, CVE-2025-23280) in #NVIDIA open GPU #Linux driver can lead to full system compromise.

Full technical breakdown inside, #vmalloc exploitation technique included!

blog.quarkslab.com/nvidia_gpu_k...

14.10.2025 16:37 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
Unsigned FTW!

Unsigned FTW!

Finding a buggy driver is one thing, abusing it is another🧠
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! πŸš€

➑️ blog.quarkslab.com/exploiting-l...

09.10.2025 16:22 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
Signal: Yo dawg! I heard you liked ratchets, so we added a ratchet to our Double Ratchet.

Signal: Yo dawg! I heard you liked ratchets, so we added a ratchet to our Double Ratchet.

Quantum computers are not quite here yet, but now's the time to get ready. After updating their protocol in 2023, @signal.org is now proposing a post-quantum version of their Double Ratchet for message encryption.

Let's see what Signal looks like now!
blog.quarkslab.com/triple-threa...

07.10.2025 14:25 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 1
Preview
Identifying obfuscated code through graph-based semantic analysis of binary code - Applied Network Science Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one of the most used techniques to ensure such a protection. Consequently, attackers must first detect and characterize obfuscation before launching any attack against it. This paper investigates the problem of function-level obfuscation detection using graph-based approaches, comparing algorithms, from classical baselines to advanced techniques like Graph Neural Networks (GNN), on different feature choices. We consider various obfuscation types and obfuscators, resulting in two complex datasets. Our findings demonstrate that GNNs need meaningful features that capture aspects of function semantics to outperform baselines. Our approach shows satisfactory results, especially in a challenging 11-class classification task and in two practical binary analysis examples. It highlights how much obfuscation and optimization are intertwined in binary code and that a better comprehension of these two principles are fundamental in order to obtain better detection results.

Brand new paper with Roxane Cohen, Robin David (both from @quarkslab.bsky.social ) and Florian Yger on obfuscation detection in binary code doi.org/10.1007/s411... We show that carefully selected features can be leveraged by graph neural networks to outperform classical solutions.

30.09.2025 17:03 β€” πŸ‘ 12    πŸ” 7    πŸ’¬ 1    πŸ“Œ 1
RW physical memory pages with a side of LSTAR MSR overwrite? YOLO!

RW physical memory pages with a side of LSTAR MSR overwrite? YOLO!

BYOVD is a well-known technique commonly used by threat actors to kill EDR πŸ”ͺ
However, with the right primitives, you can do much more.
Find out how Luis Casvella found and exploited 4 vulns (CVE-2025-8061) in a signed Lenovo driver.
πŸ‘‡
blog.quarkslab.com/exploiting-l...

23.09.2025 17:01 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Security review of PHP documentation - Quarkslab's blog The Open Source Technology Improvement Fund, Inc., engaged with Quarkslab to perform a security audit of the code snippets in the English version of PHP documentation, focused on some specific pages.

RTFM they say but if you read the manual and copy code examples from it you may inadvertently introduce vulns in your code πŸ™€
In April we audited the PHP code. Now we followed up with a review of the code snippets in PHP documentation and found 81 issues πŸ‘‡
blog.quarkslab.com/security-rev...

22.09.2025 15:51 β€” πŸ‘ 6    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Yo dawg, I heard you like Improved Bounds Checking
So I improved the bound checks of the bound checks

Yo dawg, I heard you like Improved Bounds Checking So I improved the bound checks of the bound checks

The two bytes that make size matter:
Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by Madimodi Diawara

blog.quarkslab.com/patch-analys...

04.09.2025 16:09 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
The Barbhack 2025 logo
m000000

The Barbhack 2025 logo m000000

Hacking & Barbecue in the south of France. What could possibly be better?
Barbhack starts this Saturday in Toulon and we're giving away a ticket to a student nearby looking to live the experience

Send us a Chat msg with your name and school
We will notify the winner tonight
www.barbhack.fr/2025/fr/

26.08.2025 15:05 β€” πŸ‘ 7    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
ControlPlane Local Privilege Escalation Vulnerability on macOS - Quarkslab's blog A technical exploration of Local Privilege Escalation Vulnerability in ControlPlane on macOS.

πŸš€Ever heard of ControlPlane, software to help you automate tasks on macOS? Turns out, it might also help you become root.
Oops! 😱 @coiffeur0x90 found a Local Privilege Escalation vulnerability.
Read before someone automates your admin rights
πŸ‘‰ blog.quarkslab.com/controlplane...

15.07.2025 17:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

You finally pwned the Holy Confluence server. What now? Create a user? Reset a password?
🚨Best way to trigger an alert
What if you craft your own Personal Access Token πŸ”‘ for the Admin account ?
Find out how in this blog post by Quarkslab's Red Teamer YV
blog.quarkslab.com/a-story-abou...

03.07.2025 15:56 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
leHACK 2025 incoming! - leHACK false

The leHack conference (@le-hack.bsky.social) starts tomorrow at the CitΓ© des Sciences et de l’Industrie in Paris.
We will be there to meet with peers and friends.
3 technical talks, a cool challenge & our famous Car in a Box to play with.
Come and say hi at booth 20.

Full program here:
lehack.org

26.06.2025 12:36 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A Go gopher surfing over a Wireshark shark

A Go gopher surfing over a Wireshark shark

Are you a network protocol reverse engineer? Tired of writing Wireshark plugins in memory unsafe or esoteric languages named after celestial objects?
Now you can do it in a few lines of Go, Python or Rust with Wirego.
Benoit Girard explains how here:
blog.quarkslab.com/getting-star...

10.06.2025 16:28 β€” πŸ‘ 2    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0

Attention ✨WomenAtSSTIC✨
We meet at 18:00 today at L'Equinoxe:
3 Place des Lices, 35000 Rennes

See you there!
#sstic2025

04.06.2025 12:07 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Sondage - Women@sstic 2025 - Framadate Framadate est un service en ligne permettant de planifier un rendez-vous ou prendre des dΓ©cisions rapidement et simplement.

Are you a cyber professional, or a future one, coming to #sstic2025 next week?

Come to ✨WomenATsstic✨, an informal and unofficial friendly meetup on Wednesday, June 4th at 6 pm.

We will reserve a bar/cafΓ© near the Halle Martenot. Register here:
framadate.org/hH2t9FcRtgEG...

30.05.2025 15:01 β€” πŸ‘ 4    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1
Post image

Good morning Singapore!

The amazing Off by One Conference 2025 starts today.
If you are attending don't miss Fred Raynal's (our fearless CEO) keynote at 9:35am:

"Spyware for rent & the world of offensive cyber"

The full agenda is available here:
offbyone.sg/agenda

07.05.2025 23:57 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Julio Loayza Meneses talking about Crypto Condor at RWC2005 Paris
The top bird of crypto implemetation testing

Julio Loayza Meneses talking about Crypto Condor at RWC2005 Paris The top bird of crypto implemetation testing

Quarkslab was glad to sponsor the Real World Cryptography Paris Meetup 4 hosted by @Ledger last night.
Julio Loayza Meneses talked about crypto-condor, our open source tool to test cryptography implementations.
You can learn more about it here:
quarkslab.github.io/crypto-condo...

30.04.2025 15:32 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Proxybloby, the read teamer's mascot that will byte your SOCKS if left alone in your internal network

Proxybloby, the read teamer's mascot that will byte your SOCKS if left alone in your internal network

Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS?
It's ProxyBlob, a reverse proxy over Azure.

Check out Alexandre Nesic's article on how it came to exist after an assumed breach mission ‡️
πŸ‘‰ blog.quarkslab.com/proxyblobing...

29.04.2025 17:32 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1
a TOCTOU bug in Moodle's core

a TOCTOU bug in Moodle's core

While casually reading Moodle's code Mathieu Farrell found a SSRF bug exploitable by any authenticated user.
Fun twist? This vuln matches exactly the example Orange Tsai presented at Black Hat 2017.
Real life imitates conference slides πŸ˜…
Details here:
blog.quarkslab.com/auditing-moo...

22.04.2025 16:04 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

We are so excited to announce the publication of our audit of PHP core! This work was made possible through a collaboration between OSTIF, @thephpf.bsky.social, and @quarkslab.bsky.social with funding provided by @sovereign.tech. For the report and further links, check out ostif.org/php-audit-co...

10.04.2025 19:12 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
PHP Core Security Audit Results The PHP Foundation β€” Supporting, Advancing, and Developing the PHP Language

We are pleased to announce the completion of security audit of PHP core!
Executed by @quarkslab.bsky.social in partnership with @ostifofficial.bsky.social and commissioned by the @sovereign.tech.

Learn more: thephp.foundation/blog/2025/04...

10.04.2025 14:54 β€” πŸ‘ 19    πŸ” 11    πŸ’¬ 0    πŸ“Œ 0
Security audit of PHP-SRC The Open Source Technology Improvement Fund, Inc, thanks to funding provided by Sovereign Tech Fund, engaged with Quarkslab to perform a security audit of PHP-SRC, the interpreter of the PHP language.

Quarkslab audited PHP-SRC, the open source interpreter of PHP.
The security audit, sponsored by @ostifofficial.bsky.social with funding from @sovereign.tech, aimed at strengthening the project's security ahead of the upcoming PHP 8.4 release.
Here's what we found:
blog.quarkslab.com/security-aud...

10.04.2025 15:18 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
A small bug in the signature verification of AOSP OTA packages A signature verification bypass in a function that verifies the integrity of ZIP archives in the AOSP framework

There is a small bug in the signature verification of OTA packages in the Android Open Source Framework.
Official builds doing normal double verification of packages are not vulnerable but OEMs and third party apps may be.
JΓ©rΓ©my Jourdois explains it here:
blog.quarkslab.com/aosp_ota_sig...

08.04.2025 17:51 β€” πŸ‘ 5    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Who let the RATs in? why, CCleaner v1  did.

Who let the RATs in? why, CCleaner v1 did.

New GUI or root access? Choose wisely!

Exploiting a Local Privilege Escalation vulnerability in CCleaner version 1 for MacOS, by @Coiffeur0x90

blog.quarkslab.com/ccleaner_lpe...

25.03.2025 18:22 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A CTF challenge in PHP, what could possibly not be a RCE?

A CTF challenge in PHP, what could possibly not be a RCE?

Next week at the Hack The Box 0x4d meetup in Lille, France @rayanle.cat will talk about PwnShop, the challenge he prepared for the PwnMe CTF 2025 and how he accidentally discovered a RCE 0day while doing so.

Join him next Monday at Campus Cyber Hauts-the-France:
www.meetup.com/hack-the-box...

25.03.2025 14:01 β€” πŸ‘ 7    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

@quarkslab is following 3 prominent accounts