Attacking EDRs Part 2: Driver Analysis Results
The second part describes the process and results of the EDR driver security analysis of Palo Alto Cortex using manual analysis and Sophos Intercept X using snapshot fuzzing. Only minor vulnerabilities were identified (CVE-2024-5905).
2025-02-17
|
3599 words
|
18 minutes
Attacking EDRs Part 1: Intro & Security Analysis of EDR Drivers
This article gives an overview of the attack surface of EDR software and describes the process to search for attack surface on EDR drivers from a low-privileged user.
2025-02-10
|
2340 words
|
12 minutes
Tear Down The Castle - Part 2
To gain insight into common issues and patterns of misconfiguration, we analyzed 250 PingCastle reports collected from Incident Response cases and Compromise Assessments.
2025-01-23
|
1514 words
|
8 minutes
Tear Down The Castle - Part 1
To gain insight into common issues and patterns of misconfiguration, we analyzed 250 PingCastle reports collected from Incident Response cases and Compromise Assessments.
2025-01-19
|
1814 words
|
9 minutes
Breaking CAPTCHAs with image recognition
Mario Bischof
This article explains how image recognition services can be used to bypass (i.e. auto-solve) classical alphanumeric CAPTCHAs.
2023-09-09
|
1339 words
|
7 minutes
1
2