WinGet can be more than a package manager. We show how .๐ ๐๐๐๐๐ configs + a self-referencing LNK become a viable initial access payload when Microsoft Store is enabled. Includes detection queries & mitigation tips.
blog.compass-security.com/2026/03/wing...
#RedTeam #Windows #LOLBins #InitialAccess
03.03.2026 16:15
๐ 4
๐ 3
๐ฌ 0
๐ 0
John Ostrowski (Compass Security) and Manuel Kiesel (Cyllective AG) worked together on CVE-2025-13154, a Lenovo Vantage LPE. Even after Microsoft closed a known primitive, collaboration led to a working PoC.
blog.compass-security.com/2026/02/from...
#Windows #CVE #SecurityResearch #PrivEsc
10.02.2026 08:33
๐ 6
๐ 4
๐ฌ 0
๐ 0
A night full of exciting happenings. Compass #Pwn2Own team chained zero days to run code on the Canada built Grizzl-e Smart level 2 charger. Colleagues also demoed the manipulation of of the charging control protocol. Well earned 25โ000 USD!
21.01.2026 06:31
๐ 7
๐ 4
๐ฌ 2
๐ 0
We have exciting news to share. Compass folks made the Alpine car infotainment system to run arbitrary code and earn a 10โ000 USD. ๐๐๐
21.01.2026 06:22
๐ 8
๐ 4
๐ฌ 2
๐ 0
Confirmed! Cyrill Bannwart, Emanuele Barbeno, Yves Bieri, Lukasz D., and Urs Mueller of Compass Security (@compasssecurity) exploited one exposed dangerous method/function bug on the Alpine iLX-F511, winning Round 2 for $10,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto
21.01.2026 04:16
๐ 3
๐ 5
๐ฌ 0
๐ 1
How do we keep our security analysts up to date?
Our latest blog post looks inside our internal training week, from Kubernetes security to red teaming and our annual Security Boot Camp.
blog.compass-security.com/2026/01/cont...
#CyberSecurity #Learning #Pentesting #Kubernetes
20.01.2026 13:34
๐ 3
๐ 0
๐ฌ 0
๐ 0
Here we are again! Finally on the ground for #Pwn2Own Automotive in Tokyo ๐๏ธ๐ป Our team is ready, and weโre just waiting for the Tuesday draw to see when weโre up. Big week ahead! Stay tuned! ๐ ๏ธ๐ฅ
19.01.2026 08:56
๐ 4
๐ 0
๐ฌ 0
๐ 1
co//aborationโฆftw! Thanks for the kudos!
17.01.2026 21:05
๐ 1
๐ 1
๐ฌ 0
๐ 0
The final stage would not have been possible without John Ostrowski from @compass-security.com thanks for the Swiss infosec collaboration! ๐ซ๐ค
17.01.2026 13:36
๐ 3
๐ 2
๐ฌ 1
๐ 0
co//aborationโฆ ftw. Thanks for the Kudos!
16.01.2026 15:03
๐ 2
๐ 1
๐ฌ 0
๐ 0
Thank you #BugHunters for your relentless curiosity and clean reports that keep our customers #BugBountyProgram sharp.
Soon to announce: Switzerland's highest max. bounty ever, new programs and budget refills. Stay tuned! For now: shutdown, enjoy the festive season and recharge.
18.12.2025 12:43
๐ 2
๐ 0
๐ฌ 0
๐ 1
Fuzzing and AFL++
YouTube video by Compass Security
In a new video, Nicolรฒ @rationalpsyche.bsky.social walks through how to fuzz with AFL++, how to pick targets, avoid common pitfalls, and boost effectiveness. Find performance tips, fuzzing theory, and AFL++ internals.
Watch here: youtu.be/L5Tin7m5sbE?...
#security #fuzzing #AFLplusplus #appsec
16.12.2025 08:38
๐ 3
๐ 2
๐ฌ 0
๐ 0
300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race
YouTube video by Compass Security
New video out!
Security analyst John Ostrowski show the hands-on process behind discovering CVE-2025-24076 and CVE-2025-24994 described in our recent blog post.
Watch here: youtu.be/YwNcTuHxnAI
#security #pentest #windowsinternals #vulnresearch
02.12.2025 09:45
๐ 4
๐ 2
๐ฌ 0
๐ 0
300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race
YouTube video by Compass Security
New video out!
Security analyst John Ostrowski show the hands-on process behind discovering CVE-2025-24076 and CVE-2025-24994 described in our recent blog post.
Watch here: youtu.be/YwNcTuHxnAI
#security #pentest #windowsinternals #vulnresearch
02.12.2025 09:45
๐ 4
๐ 2
๐ฌ 0
๐ 0
NTLM relay works against HTTPS if channel binding is missing. Our new blog post explains why, shows how tooling evolved, and highlights defensive measures.
blog.compass-security.com/2025/11/ntlm...
26.11.2025 09:53
๐ 3
๐ 3
๐ฌ 0
๐ 0
Windows Access Tokens - From Authentication to Exploitation
YouTube video by Compass Security
Want to understand how Windows handles authentication and access tokens? Security analyst @emanuelduss.ch explains how theyโre created, used, and abused - with live demos.
๐ฅPresentation: youtu.be/_ODdwpxXRR4?...
#Security #Pentest #WindowsInternals
04.11.2025 12:37
๐ 3
๐ 1
๐ฌ 1
๐ 0
๐Success. Our #Pwn2own team combined #zeroday bugs to #exploit @home-assistant.io green which earned them $20'000 and 4 pts. Congratz to @bcyrill.bsky.social Emanuele, Lukasz @muukong.bsky.social and @yvesbieri.bsky.social.
Respect to @stephenfewer.bsky.social and the Summoning Team for the wins.
22.10.2025 07:57
๐ 5
๐ 1
๐ฌ 0
๐ 1
So proud. Congratz. This is pwntastic!
21.10.2025 17:14
๐ 8
๐ 1
๐ฌ 1
๐ 0
๐งญ Navigation complete! The team from Compass Security just charted a course straight into @home_assistant Green at #Pwn2Own. They head off to the disclosure room to spill how they did it. #P2OIreland
21.10.2025 15:28
๐ 5
๐ 3
๐ฌ 0
๐ 0
#Pentest of gRPC-Web apps is tricky due to the binary format. We are releasing bRPC-Web, a @portswigger.net @burpsuite.bsky.social extension developed by our @muukong.bsky.social that helps manipulate #gRPC-Web traffic, even in absence of #protobuf schemas. blog.compass-security.com/2025/10/brpc...
21.10.2025 11:38
๐ 7
๐ 3
๐ฌ 0
๐ 0
Heading to Cork for #Pwn2Own Ireland ๐ฎ๐ช. Watch the live draw at 15:00 (Swiss time) to see which target weโll be taking on ๐๐ www.linkedin.com/events/pwn2o...
20.10.2025 09:51
๐ 3
๐ 1
๐ฌ 0
๐ 0
Vulnerability in FortiProxy
Security analyst Emanuel Duss identified a vulnerability in FortiProxy.
Learn about a FortiProxy Domain Fronting Protection bypass discovered by our analyst @emanuelduss.ch. Details in the advisory: www.compass-security.com/en/news/deta...
Curious how web filters are evaded? Read his blog series: blog.compass-security.com/2025/03/bypa...
#cve #pentest #bypass
15.10.2025 11:03
๐ 2
๐ 1
๐ฌ 0
๐ 0
The leaked LockBit chats give a rare inside look at ransomware ops.
Read our blog for an analysis and lessons for defenders: blog.compass-security.com/2025/10/lock...
#CyberSecurity #Ransomware #LockBit
07.10.2025 07:36
๐ 2
๐ 0
๐ฌ 0
๐ 1
NIS2 means stricter rules and steep fines.
Penetration testing is key to proving compliance & improving security, uncovering flaws before attackers do.
Our latest blog explains why you need it now: blog.compass-security.com/2025/09/ensu...
#CyberSecurity #NIS2 #Pentesting
23.09.2025 11:19
๐ 2
๐ 0
๐ฌ 0
๐ 0
Kerberos Deep Dive Part 6 - Resource-Based Constrained Delegation
YouTube video by Compass Security
The final episode of our Kerberos deep dive is live!
RBCD opens new attack paths in Kerberos. Learn how misconfigs enable privilege escalation and how to defend.
youtu.be/l97RDnzdrXY?...
#Kerberos #ActiveDirectory
18.09.2025 05:19
๐ 4
๐ 3
๐ฌ 0
๐ 0
Kerberos Deep Dive Part 5 - Constrained Delegation
YouTube video by Compass Security
Episode 5 of our Kerberos deep dive is live. Constrained delegation isnโt bulletproof. See how attackers exploit it, and how to defend with monitoring & best practices.
youtu.be/rnhr02eKU0I?...
#Kerberos #ActiveDirectory
16.09.2025 06:55
๐ 3
๐ 2
๐ฌ 0
๐ 0
Kerberos Deep Dive Part 4 - Unconstrained Delegation
YouTube video by Compass Security
Episode 4 of our Kerberos deep dive is live. Unconstrained delegation can expose critical credentials. Learn how attackers abuse it. And how to lock down your systems.
youtu.be/_6FYZRTJQ-s?...
#Kerberos #ActiveDirectory
11.09.2025 17:52
๐ 3
๐ 1
๐ฌ 0
๐ 0