<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Research &#8211; SCRT Team Blog</title>
	<atom:link href="/category/research/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Mon, 02 Feb 2026 13:30:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>Research &#8211; SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Blinding EDRs: A deep dive into WFP manipulation</title>
		<link>/2025/08/25/blinding-edrs-a-deep-dive-into-wfp-manipulation/</link>
		
		<dc:creator><![CDATA[Florian Audon]]></dc:creator>
		<pubDate>Mon, 25 Aug 2025 08:22:56 +0000</pubDate>
				<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=7176</guid>

					<description><![CDATA[This article complements existing research referenced in the Further Reading section. Endpoint Detection and Response (EDR) solutions are essential to modern defensive architectures. Their abilities to monitor, block, and respond to threats are important for containment and remediation. However, like all complex systems, EDRs rely on components that can be turned against them. One of &#8230; <a href="/2025/08/25/blinding-edrs-a-deep-dive-into-wfp-manipulation/" class="more-link">Continue reading <span class="screen-reader-text">Blinding EDRs: A deep dive into WFP manipulation</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>SonicDoor &#8211; Cracking SonicWall&#8217;s SMA 500</title>
		<link>/2025/06/04/sonicdoor-attacking-sonicwalls-sma-500/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 09:36:07 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=6642</guid>

					<description><![CDATA[While attempting to compare the security level of various VPN vendors, I kept falling down the path of searching for vulnerabilities instead. This blog post details the ones I discovered in SonicWall&#8217;s SMA 500, which were patched in December 2024. This post has been delayed to coincide with my talk at SecurityFest on this exact &#8230; <a href="/2025/06/04/sonicdoor-attacking-sonicwalls-sma-500/" class="more-link">Continue reading <span class="screen-reader-text">SonicDoor &#8211; Cracking SonicWall&#8217;s SMA 500</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>The effect of granting Azure Reader role on Azure Container Registry instances</title>
		<link>/2024/12/13/understanding-azure-container-registry-permissions-a-security-concern/</link>
		
		<dc:creator><![CDATA[Quentin Brusa]]></dc:creator>
		<pubDate>Fri, 13 Dec 2024 08:27:13 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[research]]></category>
		<guid isPermaLink="false">/?p=6672</guid>

					<description><![CDATA[We observed that granting Azure Reader role at subscription or resource group level allows users to pull container images from Azure Container Registry instances, thus potentially reveling confidential or sensitive data to unauthorised parties. In a recent security configuration review of one our client’s Azure workloads,&#160;we uncovered a significant issue regarding the Azure Container Registry &#8230; <a href="/2024/12/13/understanding-azure-container-registry-permissions-a-security-concern/" class="more-link">Continue reading <span class="screen-reader-text">The effect of granting Azure Reader role on Azure Container Registry instances</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Attacking Cortex XDR from an unprivileged user perspective</title>
		<link>/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective/</link>
		
		<dc:creator><![CDATA[Romain Melchiorre]]></dc:creator>
		<pubDate>Thu, 05 Dec 2024 12:49:41 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=6405</guid>

					<description><![CDATA[In late 2023, we launched a new form of service where multiple customers could co-fund research time on a given product they are all using. The goal of the Co-funded research is to find vulnerabilities and possible weaknesses within the product that could impact not only our customers&#8217; security, but anyone using the product. The &#8230; <a href="/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective/" class="more-link">Continue reading <span class="screen-reader-text">Attacking Cortex XDR from an unprivileged user perspective</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</title>
		<link>/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 13:34:08 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=5725</guid>

					<description><![CDATA[As part of our continuous pentesting offering, we try to identify solutions used by multiple clients to guide our research efforts to deliver the greatest impact. That is why, recently, we spent some time searching for vulnerabilities within Sitecore to find what we initially thought to be a 0-day, but ended up having been already &#8230; <a href="/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/" class="more-link">Continue reading <span class="screen-reader-text">Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exploiting KsecDD through Server Silos</title>
		<link>/2024/11/11/exploiting-ksecdd-through-server-silos/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 13:13:58 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5731</guid>

					<description><![CDATA[Earlier this year, an intriguing admin-to-kernel technique was published by @floesen_ in the form of a proof-of-concept (PoC) on GitHub. The author mentioned a strong limitation involving LSASS and Server Silos, without providing much details about it. This piqued our interest, so we decided to give it a second look&#8230; This blog post was coauthored &#8230; <a href="/2024/11/11/exploiting-ksecdd-through-server-silos/" class="more-link">Continue reading <span class="screen-reader-text">Exploiting KsecDD through Server Silos</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Privilege escalation through TPM Sniffing when BitLocker PIN is enabled</title>
		<link>/2024/10/28/privilege-escalation-through-tpm-sniffing-when-bitlocker-pin-is-enabled/</link>
		
		<dc:creator><![CDATA[Julien Oberson]]></dc:creator>
		<pubDate>Mon, 28 Oct 2024 08:45:51 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=6045</guid>

					<description><![CDATA[This blog post offers additional insights following the presentation delivered at the Swiss Cyber Storm conference in Bern on October 22, 2024. Introduction TPM sniffing attacks are well documented and have been used for at least the last five years. In a nutshell, these attacks take advantage of two weaknesses related to the way discrete &#8230; <a href="/2024/10/28/privilege-escalation-through-tpm-sniffing-when-bitlocker-pin-is-enabled/" class="more-link">Continue reading <span class="screen-reader-text">Privilege escalation through TPM Sniffing when BitLocker PIN is enabled</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Ghost in the PPL Part 3: LSASS Memory Dump</title>
		<link>/2024/09/02/ghost-in-the-ppl-part-3-lsass-memory-dump/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Mon, 02 Sep 2024 14:06:18 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5136</guid>

					<description><![CDATA[Following my failed attempt to achieve arbitrary code execution within a protected LSASS process using the BYOVDLL technique and an N-day exploit in the KeyIso service, I took a step back, and reconsidered my life choices opted for a less ambitious solution: a (not so) simple memory dump. After all, when it comes to LSASS, &#8230; <a href="/2024/09/02/ghost-in-the-ppl-part-3-lsass-memory-dump/" class="more-link">Continue reading <span class="screen-reader-text">Ghost in the PPL Part 3: LSASS Memory Dump</span></a>]]></description>
		
		
		<enclosure url="/wp-content/uploads/2024/06/poc-lsass-autodial.webm" length="36446" type="video/webm" />
<enclosure url="/wp-content/uploads/2024/06/exploit.webm" length="177407" type="video/webm" />

			</item>
		<item>
		<title>Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASS</title>
		<link>/2024/08/15/ghost-in-the-ppl-part-2-from-byovdll-to-arbitrary-code-execution-in-lsass/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Thu, 15 Aug 2024 09:46:21 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5133</guid>

					<description><![CDATA[In the previous part, I showed how a technique called &#8220;Bring Your Own Vulnerable DLL&#8221; (BYOVDLL) could be used to reintroduce known vulnerabilities in LSASS, even when it&#8217;s protected. In this second part, I&#8217;m going to discuss the strategies I considered and explored to improve my proof-of-concept, and hopefully achieve arbitrary code execution. The User-After-Free &#8230; <a href="/2024/08/15/ghost-in-the-ppl-part-2-from-byovdll-to-arbitrary-code-execution-in-lsass/" class="more-link">Continue reading <span class="screen-reader-text">Ghost in the PPL Part 2: From BYOVDLL to Arbitrary Code Execution in LSASS</span></a>]]></description>
		
		
		<enclosure url="/wp-content/uploads/2024/06/system-informer-lsass-opening-powershell-handle.webm" length="103794" type="video/webm" />
<enclosure url="/wp-content/uploads/2024/06/system-informer-lsass-opening-sspi-poc-handle.webm" length="106798" type="video/webm" />

			</item>
		<item>
		<title>Ghost in the PPL Part 1: BYOVDLL</title>
		<link>/2024/08/09/ghost-in-the-ppl-part-1-byovdll/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Fri, 09 Aug 2024 07:37:19 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5052</guid>

					<description><![CDATA[In this series of blog posts, I will explore yet another avenue for bypassing LSA Protection in Userland. I will also detail the biggest challenges I faced while developing a proof-of-concept, and discuss some novel techniques and tricks to load an arbitrary DLL in LSASS, or even dump its memory. Bring Your Own Vulnerable DLL &#8230; <a href="/2024/08/09/ghost-in-the-ppl-part-1-byovdll/" class="more-link">Continue reading <span class="screen-reader-text">Ghost in the PPL Part 1: BYOVDLL</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
