The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1
In this series of blog posts, we cover how we could exploit five reputable security products to gain SYSTEM privileges with COM hijacking. If you've never heard of this, no worries. We introduce all r...
Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! ๐
Check out our first blog post on our journey to ๐ฅ exploit five reputable security products to gain privileges via COM hijacking: neodyme.io/blog/com_hij...
15.01.2025 15:11
๐ 5
๐ 5
๐ฌ 0
๐ 0
Yeah, totally agree. AVG did somehow block DLLs that weren't located in allow-listed folders, not really sure how it was implemented. However, C:/Windows/System32/* was allowed and System32/spool/drivers/color/ is user writeable...
28.12.2024 16:47
๐ 1
๐ 0
๐ฌ 1
๐ 0
Nice! I wasnt aware of your research, seems you beat us by a few years :D impressive to see that little changed regarding the attack surface and the actual vulns ...
28.12.2024 16:22
๐ 2
๐ 0
๐ฌ 1
๐ 0
Different privilege escalation vulns in security products? See our talk tomorrow :)
27.12.2024 21:45
๐ 6
๐ 0
๐ฌ 0
๐ 0