December 1, 2022

I started today’s newsletter by typing in “December 1” and then taking five to just repeat “WTF? December? How? WTF…”

-

-

This paper was linked in an earlier newsletter. Here’s a nice summary and another link to the paper.

-

-

-

Bypass CrowdStrike Falcon EDR protection against process dump like lsass.exe 🤔

“TL;DR Do a memory dump of the RAM with any forensics tool like (dumpit.exe, MAGNET RAM Capture ) and from the dump extract the lsass process using volatility or extract the hashed directly from it.”

https://medium.com/@balqurneh/bypass-crowdstrike-falcon-edr-protection-against-process-dump-like-lsass-exe-3c163e1b8a3e

-

Here’s a look at the various pieces of proposed legislation that impact E2EE. Spoiler alert: They all suck.

-

-

-

-

Ping! Ping! 😂

-

-

-

-

Someone sent in the complete exploitation framework for a collection of 0days that were used from 2018 until probably 2021/22. This is some good intel for people who are tracking bug collisions. It seems that some were killed by internal bug fixes, but they were alive for quite a while first.

But, really, wtf! Someone turned over the entire exploit framework along with additional exploits. It’s wild. What’s the story here?? I’d love to know.

-

-

-

Reply

or to participate.