<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SCRT Team Blog</title>
	<atom:link href="/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Thu, 26 Mar 2026 09:17:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Insomni’Hack 2026 &#8211; Golden Payout writeup</title>
		<link>/2026/03/25/insomnihack-2026-the-golden-payout-writeup/</link>
		
		<dc:creator><![CDATA[Frédéric Bourla]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 23:35:02 +0000</pubDate>
				<category><![CDATA[Analytics]]></category>
		<category><![CDATA[Insomni'hack]]></category>
		<category><![CDATA[forensics]]></category>
		<category><![CDATA[writeup]]></category>
		<guid isPermaLink="false">/?p=7338</guid>

					<description><![CDATA[The challenge A massive data breach has just hit our corporate network. Highly sensitive documents have been spotted on a prominent Darknet leaking platform. Preliminary network telemetry has flagged suspicious outbound traffic originating from a specific workstation belonging to one of our DBAs. As part of the Rapid Response Investigation Team, you have been assigned &#8230; <a href="/2026/03/25/insomnihack-2026-the-golden-payout-writeup/" class="more-link">Continue reading <span class="screen-reader-text">Insomni’Hack 2026 &#8211; Golden Payout writeup</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Blinding EDRs: A deep dive into WFP manipulation</title>
		<link>/2025/08/25/blinding-edrs-a-deep-dive-into-wfp-manipulation/</link>
		
		<dc:creator><![CDATA[Florian Audon]]></dc:creator>
		<pubDate>Mon, 25 Aug 2025 08:22:56 +0000</pubDate>
				<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=7176</guid>

					<description><![CDATA[This article complements existing research referenced in the Further Reading section. Endpoint Detection and Response (EDR) solutions are essential to modern defensive architectures. Their abilities to monitor, block, and respond to threats are important for containment and remediation. However, like all complex systems, EDRs rely on components that can be turned against them. One of &#8230; <a href="/2025/08/25/blinding-edrs-a-deep-dive-into-wfp-manipulation/" class="more-link">Continue reading <span class="screen-reader-text">Blinding EDRs: A deep dive into WFP manipulation</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>SonicDoor &#8211; Cracking SonicWall&#8217;s SMA 500</title>
		<link>/2025/06/04/sonicdoor-attacking-sonicwalls-sma-500/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 09:36:07 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=6642</guid>

					<description><![CDATA[While attempting to compare the security level of various VPN vendors, I kept falling down the path of searching for vulnerabilities instead. This blog post details the ones I discovered in SonicWall&#8217;s SMA 500, which were patched in December 2024. This post has been delayed to coincide with my talk at SecurityFest on this exact &#8230; <a href="/2025/06/04/sonicdoor-attacking-sonicwalls-sma-500/" class="more-link">Continue reading <span class="screen-reader-text">SonicDoor &#8211; Cracking SonicWall&#8217;s SMA 500</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Hijacking the Windows &#8220;MareBackup&#8221; Scheduled Task for Privilege Escalation</title>
		<link>/2025/05/20/hijacking-the-windows-marebackup-scheduled-task-for-privilege-escalation/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Tue, 20 May 2025 09:26:14 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Pentest]]></category>
		<guid isPermaLink="false">/?p=7033</guid>

					<description><![CDATA[The built-in &#8220;MareBackup&#8221; scheduled task is susceptible to a trivial executable search order hijacking, which can be abused by a low-privileged user to gain SYSTEM privileges whenever a vulnerable folder is prepended to the system&#8217;s PATH environment variable (instead of being appended). As I was working on a semi-automated research project on an unrelated subject, &#8230; <a href="/2025/05/20/hijacking-the-windows-marebackup-scheduled-task-for-privilege-escalation/" class="more-link">Continue reading <span class="screen-reader-text">Hijacking the Windows &#8220;MareBackup&#8221; Scheduled Task for Privilege Escalation</span></a>]]></description>
		
		
		<enclosure url="/wp-content/uploads/2025/05/poc_compressed.webm" length="609694" type="video/webm" />

			</item>
		<item>
		<title>Insomni’hack 2025 – GuLosity writeup</title>
		<link>/2025/03/19/insomnihack-2025-gulosity-writeup/</link>
		
		<dc:creator><![CDATA[Frédéric Bourla]]></dc:creator>
		<pubDate>Wed, 19 Mar 2025 20:43:27 +0000</pubDate>
				<category><![CDATA[Insomni'hack]]></category>
		<category><![CDATA[forensics]]></category>
		<category><![CDATA[writeup]]></category>
		<guid isPermaLink="false">/?p=6964</guid>

					<description><![CDATA[The challenge A malware was provided from a real DFIR case that occurred in January 2024. The final payloads were disarmed here, to allow the analysts to dissect the binary safely until they fully understand the execution chain of a reflective shellcode loader named GuLoader [which initially led to the delivery of Remcos RAT with &#8230; <a href="/2025/03/19/insomnihack-2025-gulosity-writeup/" class="more-link">Continue reading <span class="screen-reader-text">Insomni’hack 2025 – GuLosity writeup</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Reinventing PowerShell in C/C++</title>
		<link>/2025/02/18/reinventing-powershell-in-c-c/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Tue, 18 Feb 2025 08:16:47 +0000</pubDate>
				<category><![CDATA[Pentest]]></category>
		<guid isPermaLink="false">/?p=6726</guid>

					<description><![CDATA[I like PowerShell, I like it a lot! I like its versatility, its ease of use, its integration with the Windows operating system, but it also has a few features, such as AMSI, CLM, and other logging capabilities, that slow it down. You know, I&#8217;m thinking about the performance gain here. I believe my scripts &#8230; <a href="/2025/02/18/reinventing-powershell-in-c-c/" class="more-link">Continue reading <span class="screen-reader-text">Reinventing PowerShell in C/C++</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>The effect of granting Azure Reader role on Azure Container Registry instances</title>
		<link>/2024/12/13/understanding-azure-container-registry-permissions-a-security-concern/</link>
		
		<dc:creator><![CDATA[Quentin Brusa]]></dc:creator>
		<pubDate>Fri, 13 Dec 2024 08:27:13 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[azure]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[research]]></category>
		<guid isPermaLink="false">/?p=6672</guid>

					<description><![CDATA[We observed that granting Azure Reader role at subscription or resource group level allows users to pull container images from Azure Container Registry instances, thus potentially reveling confidential or sensitive data to unauthorised parties. In a recent security configuration review of one our client’s Azure workloads,&#160;we uncovered a significant issue regarding the Azure Container Registry &#8230; <a href="/2024/12/13/understanding-azure-container-registry-permissions-a-security-concern/" class="more-link">Continue reading <span class="screen-reader-text">The effect of granting Azure Reader role on Azure Container Registry instances</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Attacking Cortex XDR from an unprivileged user perspective</title>
		<link>/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective/</link>
		
		<dc:creator><![CDATA[Romain Melchiorre]]></dc:creator>
		<pubDate>Thu, 05 Dec 2024 12:49:41 +0000</pubDate>
				<category><![CDATA[Antivirus]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=6405</guid>

					<description><![CDATA[In late 2023, we launched a new form of service where multiple customers could co-fund research time on a given product they are all using. The goal of the Co-funded research is to find vulnerabilities and possible weaknesses within the product that could impact not only our customers&#8217; security, but anyone using the product. The &#8230; <a href="/2024/12/05/attacking-cortex-xdr-from-an-unprivileged-user-perspective/" class="more-link">Continue reading <span class="screen-reader-text">Attacking Cortex XDR from an unprivileged user perspective</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</title>
		<link>/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/</link>
		
		<dc:creator><![CDATA[Alain Mowat]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 13:34:08 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">/?p=5725</guid>

					<description><![CDATA[As part of our continuous pentesting offering, we try to identify solutions used by multiple clients to guide our research efforts to deliver the greatest impact. That is why, recently, we spent some time searching for vulnerabilities within Sitecore to find what we initially thought to be a 0-day, but ended up having been already &#8230; <a href="/2024/11/25/arbitrary-web-root-file-read-in-sitecore-before-v10-4-0-rev-010422/" class="more-link">Continue reading <span class="screen-reader-text">Arbitrary web root file read in Sitecore before v10.4.0 rev. 010422</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exploiting KsecDD through Server Silos</title>
		<link>/2024/11/11/exploiting-ksecdd-through-server-silos/</link>
		
		<dc:creator><![CDATA[Clément Labro]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 13:13:58 +0000</pubDate>
				<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=5731</guid>

					<description><![CDATA[Earlier this year, an intriguing admin-to-kernel technique was published by @floesen_ in the form of a proof-of-concept (PoC) on GitHub. The author mentioned a strong limitation involving LSASS and Server Silos, without providing much details about it. This piqued our interest, so we decided to give it a second look&#8230; This blog post was coauthored &#8230; <a href="/2024/11/11/exploiting-ksecdd-through-server-silos/" class="more-link">Continue reading <span class="screen-reader-text">Exploiting KsecDD through Server Silos</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
