<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Exploit &#8211; SCRT Team Blog</title>
	<atom:link href="/category/exploit/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Tue, 20 May 2025 09:26:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>Exploit &#8211; SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hijacking the Windows &#8220;MareBackup&#8221; Scheduled Task for Privilege Escalation</title>
		<link>/2025/05/20/hijacking-the-windows-marebackup-scheduled-task-for-privilege-escalation/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Tue, 20 May 2025 09:26:14 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Pentest]]></category>
		<guid isPermaLink="false">/?p=7033</guid>

					<description><![CDATA[The built-in &#8220;MareBackup&#8221; scheduled task is susceptible to a trivial executable search order hijacking, which can be abused by a low-privileged user to gain SYSTEM privileges whenever a vulnerable folder is prepended to the system&#8217;s PATH environment variable (instead of being appended). As I was working on a semi-automated research project on an unrelated subject, &#8230; <a href="/2025/05/20/hijacking-the-windows-marebackup-scheduled-task-for-privilege-escalation/" class="more-link">Continue reading <span class="screen-reader-text">Hijacking the Windows &#8220;MareBackup&#8221; Scheduled Task for Privilege Escalation</span></a>]]></description>
		
		
		<enclosure url="/wp-content/uploads/2025/05/poc_compressed.webm" length="609694" type="video/webm" />

			</item>
		<item>
		<title>Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</title>
		<link>/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 13:34:08 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=5725</guid>

					<description><![CDATA[As part of our continuous pentesting offering, we try to identify solutions used by multiple clients to guide our research efforts to deliver the greatest impact. That is why, recently, we spent some time searching for vulnerabilities within Sitecore to find what we initially thought to be a 0-day, but ended up having been already &#8230; <a href="/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/" class="more-link">Continue reading <span class="screen-reader-text">Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exploiting KsecDD through Server Silos</title>
		<link>/2024/11/11/exploiting-ksecdd-through-server-silos/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 13:13:58 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5731</guid>

					<description><![CDATA[Earlier this year, an intriguing admin-to-kernel technique was published by @floesen_ in the form of a proof-of-concept (PoC) on GitHub. The author mentioned a strong limitation involving LSASS and Server Silos, without providing much details about it. This piqued our interest, so we decided to give it a second look&#8230; This blog post was coauthored &#8230; <a href="/2024/11/11/exploiting-ksecdd-through-server-silos/" class="more-link">Continue reading <span class="screen-reader-text">Exploiting KsecDD through Server Silos</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Getting code execution on Veeam through CVE-2023-27532</title>
		<link>/2024/09/10/getting-code-execution-on-veeam-through-cve-2023-27532/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Tue, 10 Sep 2024 13:32:28 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=4313</guid>

					<description><![CDATA[While several blog posts have shown how to retrieve credentials through this vulnerability, we decided to dig deeper and see whether it was possible to execute arbitrary code through this issue. DISCLAIMER: This blog post was written a year and a half ago and we have postponed publication upon Veeam&#8217;s request, but given a recent &#8230; <a href="/2024/09/10/getting-code-execution-on-veeam-through-cve-2023-27532/" class="more-link">Continue reading <span class="screen-reader-text">Getting code execution on Veeam through CVE-2023-27532</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ghost in the PPL Part 3: LSASS Memory Dump</title>
		<link>/2024/09/02/ghost-in-the-ppl-part-3-lsass-memory-dump/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Mon, 02 Sep 2024 14:06:18 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5136</guid>

					<description><![CDATA[Following my failed attempt to achieve arbitrary code execution within a protected LSASS process using the BYOVDLL technique and an N-day exploit in the KeyIso service, I took a step back, and reconsidered my life choices opted for a less ambitious solution: a (not so) simple memory dump. After all, when it comes to LSASS, &#8230; <a href="/2024/09/02/ghost-in-the-ppl-part-3-lsass-memory-dump/" class="more-link">Continue reading <span class="screen-reader-text">Ghost in the PPL Part 3: LSASS Memory Dump</span></a>]]></description>
		
		
		<enclosure url="/wp-content/uploads/2024/06/poc-lsass-autodial.webm" length="36446" type="video/webm" />
<enclosure url="/wp-content/uploads/2024/06/exploit.webm" length="177407" type="video/webm" />

			</item>
		<item>
		<title>Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASS</title>
		<link>/2024/08/15/ghost-in-the-ppl-part-2-from-byovdll-to-arbitrary-code-execution-in-lsass/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Thu, 15 Aug 2024 09:46:21 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5133</guid>

					<description><![CDATA[In the previous part, I showed how a technique called &#8220;Bring Your Own Vulnerable DLL&#8221; (BYOVDLL) could be used to reintroduce known vulnerabilities in LSASS, even when it&#8217;s protected. In this second part, I&#8217;m going to discuss the strategies I considered and explored to improve my proof-of-concept, and hopefully achieve arbitrary code execution. The User-After-Free &#8230; <a href="/2024/08/15/ghost-in-the-ppl-part-2-from-byovdll-to-arbitrary-code-execution-in-lsass/" class="more-link">Continue reading <span class="screen-reader-text">Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASS</span></a>]]></description>
		
		
		<enclosure url="/wp-content/uploads/2024/06/system-informer-lsass-opening-powershell-handle.webm" length="103794" type="video/webm" />
<enclosure url="/wp-content/uploads/2024/06/system-informer-lsass-opening-sspi-poc-handle.webm" length="106798" type="video/webm" />

			</item>
		<item>
		<title>Ghost in the PPL Part 1: BYOVDLL</title>
		<link>/2024/08/09/ghost-in-the-ppl-part-1-byovdll/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Fri, 09 Aug 2024 07:37:19 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5052</guid>

					<description><![CDATA[In this series of blog posts, I will explore yet another avenue for bypassing LSA Protection in Userland. I will also detail the biggest challenges I faced while developing a proof-of-concept, and discuss some novel techniques and tricks to load an arbitrary DLL in LSASS, or even dump its memory. Bring Your Own Vulnerable DLL &#8230; <a href="/2024/08/09/ghost-in-the-ppl-part-1-byovdll/" class="more-link">Continue reading <span class="screen-reader-text">Ghost in the PPL Part 1: BYOVDLL</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Apache Solr 8.3.1 RCE from exposed administration interface</title>
		<link>/2023/05/01/solr-rce-from-exposed-administration-interface/</link>
		
		<dc:creator><![CDATA[Nicolas Brunner]]></dc:creator>
		<pubDate>Mon, 01 May 2023 07:41:54 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[RCE]]></category>
		<category><![CDATA[Solr]]></category>
		<guid isPermaLink="false">/?p=2803</guid>

					<description><![CDATA[Back in 2020, during an external pentest, I stumbled upon a visible Solr administration panel. With nothing else of interest, I focused on this specific application to test what was hidden underneath. The version of Apache Solr was 8.3.1 and running on Windows. Note that this pentest was performed in 2020, way before the discovery &#8230; <a href="/2023/05/01/solr-rce-from-exposed-administration-interface/" class="more-link">Continue reading <span class="screen-reader-text">Apache Solr 8.3.1 RCE from exposed administration interface</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Attacking Android Antivirus Applications</title>
		<link>/2023/03/29/attacking-android-antivirus-applications/</link>
		
		<dc:creator><![CDATA[2Dai]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 12:43:00 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">/?p=3848</guid>

					<description><![CDATA[Although the usefulness of security tools such as Antivirus, VPN and EDR is now indisputable in business circles, these solutions often need a lot of privileges and permissions to work properly, also making them an excellent target for an attacker. The presence of a bug in one of these types of solutions could allow a &#8230; <a href="/2023/03/29/attacking-android-antivirus-applications/" class="more-link">Continue reading <span class="screen-reader-text">Attacking Android Antivirus Applications</span></a>]]></description>
		
		
		<enclosure url="/wp-content/uploads/2023/02/poc.mp4" length="514750" type="video/mp4" />

			</item>
		<item>
		<title>Bypassing PPL in Userland (again)</title>
		<link>/2023/03/17/bypassing-ppl-in-userland-again/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Fri, 17 Mar 2023 15:54:34 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=4008</guid>

					<description><![CDATA[This post is a sequel to Bypassing LSA Protection in Userland and The End of PPLdump. Here, I will discuss how I was able to bypass the latest mitigation implemented by Microsoft and develop a new Userland exploit for injecting arbitrary code in a PPL with the highest signer type. The current state of PP(L)s &#8230; <a href="/2023/03/17/bypassing-ppl-in-userland-again/" class="more-link">Continue reading <span class="screen-reader-text">Bypassing PPL in Userland (again)</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
