bl4sty Profile Banner
blasty Profile
blasty

@bl4sty

Followers
16K
Following
2K
Media
262
Statuses
4K

irresponsible disclosure aficionado

The Netherlands
Joined April 2009
Don't wanna be here? Send us removal request.
@bl4sty
blasty
2 years
wholesome yet dystopian
Tweet media one
145
12K
183K
@bl4sty
blasty
10 months
the xz sshd backdoor rabbithole goes quite a bit deeper. I was just able to trigger some harder to reach functionality of the backdoor. there's still more to explore. 1/n
Tweet media one
32
1K
5K
@bl4sty
blasty
10 months
auth bypass confirmed!. > INFO:paramiko.transport:Authentication (password) successful!. mm_keyallowed_backdoor cmd 1 allows to override the response for mm_answer_authpassword with a custom one. if you set it to { u32(9), u8(13), u32(1), u32(0) } you can login with any pass 🤓.
14
145
1K
@bl4sty
blasty
10 months
xz bd engineer 1: bro, we need a way to probe the address space to make sure we never SEGV sshd.xz bd engineer 2: we'll just do a pselect syscall with empty fd sets, a timeout of 1 nanosecond and the addr we want to probe is passed as the sigmask pointer, EFAULT means unmapped
Tweet media one
22
133
987
@bl4sty
blasty
2 years
Decided to publish the Lexmark printer exploit + writeup + tools instead of sell it for peanuts. 0day at the time of writing: -- enjoy!.
17
285
940
@bl4sty
blasty
10 months
nothing to see here, just properly documenting the fixed defects in the backdoor code 😂
Tweet media one
2
114
851
@bl4sty
blasty
3 years
Hacked up a quick Dirty Pipe PoC that spawns a shell by hijacking (and restoring) the contents of a setuid binary.
Tweet media one
9
308
787
@bl4sty
blasty
2 years
. since this tweet is ballin' slightly outta control:.1) image was stolen from @njudah@sfba.social on the fediverse, not my neighbourhood (SF).2) all the printers I currently own will only display this quirky animation: -- who do I contact??.
@thezdi
Zero Day Initiative
2 years
While @bl4sty only scored a COLLISION (non-unique bug) - Peter definitely gets a boatload of STYLE POINTS for this hack on a Canon printer @ #P2OToronto #Pwn2Own
4
19
767
@bl4sty
blasty
10 months
you gotta appreciate the way they shipped the backdoored object file. added some "test" data to the source tree that gets unxz'd and (dd) carved in a specific way, that is fed into a deobfuscator written in. awk script and the result gets unxz'd again
Tweet media one
6
131
718
@bl4sty
blasty
10 months
whoever designed this stuff had to take a deep dive into openSSH(d) internals (and so did I for the past couple of days, oof) . hats off, once again :).
5
21
667
@bl4sty
blasty
3 years
enjoy, my fellow scriptkiddies.
14
195
654
@bl4sty
blasty
7 years
*facepalm*
Tweet media one
Tweet media two
27
292
589
@bl4sty
blasty
3 years
Dirty Pipe PoC ( works beautifully. 🤑
Tweet media one
1
171
544
@bl4sty
blasty
10 months
q3k from @DragonSectorCTF has figured out the string/symbol obfuscation in the xz backdoor! there's appears to be a lot more going on then reported in the initial report.
2
116
539
@bl4sty
blasty
3 years
Oh my god, this stuff is absolutely brutal. RCE on Apple, Tencent, Steam, Twitter.
7
187
476
@bl4sty
blasty
3 years
If you are hard at work scanning the internet for CVE-2021-41773 (apache 2.4.49 path traversal thing). also try /icons instead of just /cgi-bin, enjoy the increased success rate. :-P.
5
102
458
@bl4sty
blasty
10 months
some people asked for the code . so I decided to quickly refactor my scrappy paramiko script and turned it into an ssh agent implementation that works with a vanilla openssh client that has a single line patched out.
Tweet media one
8
127
449
@bl4sty
blasty
10 months
it requires sending a properly crafted command to the RSA_public_decrypt hook, which will then install another for the `mm_answer_keyallowed` sshd function. subsequently you offer N more fake ssh-rsa pubkeys which are crafted in a special way to chunk together . 2/n.
2
11
431
@bl4sty
blasty
4 years
Last night @lockedbyte showed you how we managed to exploit sudo with a partial overwrite of a funcptr and some small bruteforce. Today. we do it single-shot with some help of glibc/nss.
Tweet media one
9
141
394
@bl4sty
blasty
3 years
Quick writeup Exploit code
1
166
393
@bl4sty
blasty
10 months
currently I'm just triggering command 0x03 in this part of the code, which allows for a basic RCE through system() again. (also lets you set uid/gid). but there's more code that needs to be understood. it looks like a full auth bypass (interactive session) is possible!.
1
10
371
@bl4sty
blasty
3 years
that was trivial, just follow the steps outlined in the Qualys advisory for a reliable LPE ;-)
Tweet media one
10
58
373
@bl4sty
blasty
10 months
a "magic buffer" which contains more backdoor commands, this buffer also has two additional ed448 signatures. which like the ones for the RSA_public_decrypt portion of the backdoor are salted with the SHA256 digest of the hostkey.
1
8
365
@bl4sty
blasty
3 years
Weaponized the CVE-2021-43267 PoC. Will post exploit code (and maybe a small blogpost) in a bit. Need to overcome netlink/tipc ptsd first lol.
5
98
351
@bl4sty
blasty
1 year
To celebrate @WyzeCam's decision to release a firmware update a day before this years Pwn2Own Toronto competition. I've decided to release the exploit for my (killed) bugchain: maybe next time they will not withhold patches for critical bugs? 🙃.
11
96
344
@bl4sty
blasty
10 months
the final signature also takes into account the session_id (0x20 bytes) that is derived during the initial key exchange (KEX) for the SSH session. my current PoC implementation uses a heavily monkey patched paramiko (ssh client) library to achieve this.
2
7
330
@bl4sty
blasty
10 months
CtF hAs nOThInG tO dO wiTh AcTuAl SeCuRity ReSeArcH.
@ky1ebot
kylebot
10 months
Found a V8 sandbox bypass during @PlaidCTF . Let's see whether I will be the first one claiming the bounty 👀.
7
49
325
@bl4sty
blasty
4 years
New version of sudo exploit is up at (old archive has been replaced too). Made things more generic and added support for Debian Buster (sudo 1.8.27). More targets are welcome! :-) (Maybe some aspiring x-dev can code a finder)
Tweet media one
2
138
319
@bl4sty
blasty
10 months
(that conclusion is based on the fact that one of the mm_answer_keyallowed backdoor commands also hooks mm_answer_keyverify, eventually).
3
5
286
@bl4sty
blasty
1 year
I created a hyper realistic and handwavey re-enactment of the lockbit CVE-2023-3824 attack after some insights from PHP internals expert @cfreal_
Tweet media one
@cfreal_
Charles Fol
1 year
@bl4sty There are others. For instance, DirectoryIterator hits it too, and in this case the buffer overflows into a heap allocated char* pointer.
9
61
260
@bl4sty
blasty
1 year
new blog post and 0day exploit release for CANON ImageCLASS printers: 🖨️.
5
85
253
@bl4sty
blasty
3 years
This chrome sandbox escape writeup features some adorable supporting graphics.
Tweet media one
@starlabs_sg
starlabs
3 years
Our team mate @hungtt28 finished writing the blog post for that. We hope it's useful. Thanks to @TaDinhSung @bruce30262 @_jsoo_ & Frances for proof-reading and @buttburner for the cute cats.Don't worry, no cats were harmed during the entire process.
1
48
239
@bl4sty
blasty
1 year
.@WyzeCam I will not submit to your beg bounty program that only pays in "trust", "respect", "transparency" and "common good". [1]. none of those put bread on the table. 😂. [1]:
Tweet media one
17
40
230
@bl4sty
blasty
5 years
@thegrugq Enabling verbatim mode in Google (append &tbs=li:1 to URI or clickey clickey enable it via 'Tools') makes Google a lot more usable.
4
32
203
@bl4sty
blasty
3 years
what a wonderful disclosure timeline in @chompie1337's latest blog post. people attempt to hide vuln fix commits by redacting the e-mail address you report bugs with 😂
Tweet media one
4
28
202
@bl4sty
blasty
3 years
free advice: never let your hacker friends convince you to go clubbing at 4am if you have a hotel checkout at 11am.
11
8
201
@bl4sty
blasty
10 months
cursory examination leads me to believe contributor Jia Tan <jiat0218@gmail.com> was actually being complicit in this whole ordeal, or he was forced to for some reason. either that or someone who compromised his stuff is really good at LARP'ing as the guy.
7
7
188
@bl4sty
blasty
3 years
I've put together a small docker recipe that lets you try out CVE-2021-41773 in the comfort of your own lab. Also allows for RCE through mod_cgi(d):
1
61
191
@bl4sty
blasty
10 months
great stuff: -- we had independently confirmed the same details over the past 2 days. there's more to be uncovered/understood. the engineering effort of the xz backdoor is crazy. some weird design decisions though. .
2
39
184
@bl4sty
blasty
2 years
SSH agent forwarding just became even more dangerous. 😂-- leave it to the creative minds at Qualys to turn a series of dlopen()+dlclose() calls (of unrelated/benign shared libraries) into arbitrary code exec, hats off!.
1
58
173
@bl4sty
blasty
3 years
Qualys strikes again: you want to chmod -s `which pkexec` asap.
0
65
175
@bl4sty
blasty
9 months
video of my @nullcon Berlin talk "printer hacking adventures": 🖨️🐛🤓 . I can't hot-link the slides because X thinks my domain is harmful?.
6
54
171
@bl4sty
blasty
8 years
capstone + keystone + pyelftools + ugly glue = ropstone
5
95
156
@bl4sty
blasty
9 years
Here it is; my remote kernel exploit for CVE-2015-3036: http://t.co/ap0LecugG0 (targeted against my WNDR3700v5). Enjoy! #NoMoreDosPOCs ;-).
9
162
155
@bl4sty
blasty
3 years
Slightly revised copy of blasty-vs-pkexec.c available here: -- Might work better against your annoying ArchLinux coworkers and is more self contained as a bonus. (No more system("gcc") lol, thanks @_darrenmartyn and others for this suggestion).
4
30
161
@bl4sty
blasty
3 years
Wow, @theflow0 is a true visionary: 🥲.
@theflow0
Andy Nguyen
3 years
@bl4sty Predicted filename: blasty-vs-pkexec.c.
4
27
158
@bl4sty
blasty
1 year
I contributed a task to this year's @PotluckCTF that contains an emulator for a custom ISA. one of the players actually implemented a decompiler for it by lifting to binja's IL. mind you: this is a 24h long CTF! very neat to see current tooling makes things like this feasible!
Tweet media one
4
17
157
@bl4sty
blasty
4 months
I love it when bugs leak due to incompetence. I remember when we reported the catastrophic CVE-2012-1823 PHP-CGI bug and ended up disclosing it by accident because their bug tracker (written in PHP, of course) had a bug, making the "private" flag vanish.
@evilsocket
Simone Margaritelli
4 months
For the record: this is a coordinated disclosure because CERT's VINCE had a leak.
6
18
153
@bl4sty
blasty
6 years
RCE exploit (LAN, but probably WAN with some CSRF/SSRF imagination) for ZTE H368N/H369A (and probably others) modems. Dropped this (amongst other stuff) at @WarConPL last month. No time/energy/interest for contacting vendor, so enjoy the 0day!.
6
75
138
@bl4sty
blasty
4 years
Just spit out my coffee when @gamozolabs referred to the ARM stmfd instruction/mnemonic as "store the motherfucking data".
2
17
142
@bl4sty
blasty
9 years
Here's the UPC WPA2 pass recovery tool! Happy new year! ;-).
12
91
136
@bl4sty
blasty
4 years
The Linux (e)BPF bytecode verifier, the gift that keeps on giving! Wrote an exploit for CVE-2020-27194. :-) Shout out to @scannell_simon for the bug and @_manfp for exploitation strategy inspiration!
1
46
141
@bl4sty
blasty
3 months
our first entry worked! 🎉.
@thezdi
Zero Day Initiative
3 months
Verified! PHP Hooligans / Midnight Blue (@midnightbluelab) used a single bug to exploit the Canon imageCLASS MF656Cdw printer. They earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland
Tweet media one
5
10
142
@bl4sty
blasty
3 years
I've lost count of how many eBPF verifier vulns we've seen in Linux over the years. You want to make sure unprivileged bpf syscalls are not allowed on your machines (configurable through kernel.unprivileged_bpf_disabled).
2
23
136
@bl4sty
blasty
2 years
Got quite a few questions about the post-exploitation payload for the printer(s), here is the code: It even runs in the browser thanks to the power of Emscripten/WASM:
3
44
130
@bl4sty
blasty
2 years
New blog post is up! Dumping the AMLogic A113X/A113D BootROM (and eFUSE/OTP data):
3
38
122
@bl4sty
blasty
4 years
strstr(s, "zerodium") is the new strcmp(target, "ACIDBITCHEZ").
3
18
119
@bl4sty
blasty
1 year
EHLO mailserver.AUTH AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRRGGGHHHHHH. any actual details? 🙃.
@TheZDIBugs
TheZDIBugs
1 year
[ZDI-23-1469|CVE-2023-42115] (0Day) Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability (CVSS 9.8)
4
14
121
@bl4sty
blasty
11 months
thanks to everyone who attended my @nullcon talk! and thank you to the demo gods for allowing the live demo to work on the second try 🙏😅.
@nullcon
NULLCON
11 months
Printer Hacking at #nullconBerlin by @bl4sty
Tweet media one
6
7
118
@bl4sty
blasty
8 years
Intel AMT vulnerability (auth bypass) TL;DR:.strncmp(correct, user_input, strlen(user_input));.Wow.
5
91
108
@bl4sty
blasty
1 year
here I was hoping for the cURL bug to be something useful to upgrade a SSRF to have new superpowers or something similar. 🙃. good luck exploiting this heap overflow on a modern-ish libc in a remote context with valid hostname characters for the trigger.
4
20
110
@bl4sty
blasty
1 month
at #38c3 @rdjgr did a pretty good job at explaining the lore of how they scammed me before we ultimately joined forces. make sure to check out the full talk ("Dialing into the Past: RCE via the Fax Machine – Because Why Not?"), great stuff!
1
12
113
@bl4sty
blasty
2 years
Thanks everyone who attended my talk "Smart Speaker Shenanigans" at #HITB2013AMS -- as promised the exploit code and tools have been published at
1
41
105
@bl4sty
blasty
3 years
Just tuned in to a twitter spaces session of some enraged infosec people stomping on a charlatan 🍿.
8
1
99
@bl4sty
blasty
7 years
lol @ CERT singapore:
Tweet media one
4
63
96
@bl4sty
blasty
4 years
the Exim bloodbath by Qualys is🔥.
6
39
104
@bl4sty
blasty
7 years
Details of the recent Chrome OS exploit chain are out: -- much respect to gzobqq@gmail.com.
1
81
102
@bl4sty
blasty
9 years
Cute backdoor:.# chmod +s /usr/sbin/arp.$ arp -v -f /etc/shadow 2>&1 | egrep '^>>'.
4
51
100
@bl4sty
blasty
9 years
Ben was one of my dearest friends and a true inspiration. Here is some cool HW he built that I found in my drawer.
Tweet media one
3
38
96
@bl4sty
blasty
6 months
not gonna lie; I was skeptical when I first heard @phrack was (once again) under new management. but my 10 minute skim-reading session of phrack issue #71 did not disappoint so far! go check it out if you haven't yet :).
2
11
97
@bl4sty
blasty
4 years
I wrote a thing about numeric only shellcodes (x86):
2
21
99
@bl4sty
blasty
3 months
new 2 part blogpost on the Lexmark WTM stuff is now live!
2
39
100
@bl4sty
blasty
1 year
first ever interactive JS slidedeck to contain an emulator visualisation built with capstone and unicorn? neat!.
@LinaAsahi
Asahi Lina / 朝日リナ 🐘 @[email protected] 🦋 @lina.yt
1 year
I just posted the slides for today's collab stream with @CyanNyan6!!!. 「I hacked macOS!!!. CVE-2022-32947. With Lina✨ & Cyan💎」.
Tweet media one
2
10
94
@bl4sty
blasty
4 years
enjoy!.
@bl4sty
blasty
4 years
For what it's worth, should be a piece of cake to adapt to work with CVE-2020-8835 (as used by @_manfp at Pwn2Own 2020) as well. Not sure about releasing this code right now although personally I couldn't care less as the bugs are dead anyway. ;-).
0
31
93
@bl4sty
blasty
6 years
this is @qwertyoruiopz irl.
@PicturesFoIder
non aesthetic things
6 years
Tweet media one
3
7
88
@bl4sty
blasty
1 year
public announcement for Bad Actors™️ who are wget'ing/cURL'ing exploit code directly from my website to (potentially) vulnerable endpoints: please re-host the code elsewhere, I don't need to know where your shellz live. 😅.
2
19
91
@bl4sty
blasty
2 years
Which CTF will the the first to have a FoReNSiCs challenge that employs this one little trick?
Tweet media one
@onekey_rl
ONEKEY Research Labs
2 years
Let's explore how we turned a path traversal affecting binwalk into arbitrary code execution -
2
7
94
@bl4sty
blasty
10 months
here's an example of the obfuscated string resolution in action, 0x108 maps to "/usr/sbin/sshd"
Tweet media one
3
3
86
@bl4sty
blasty
10 months
a myriad of libcrypto routines are being resolved, password auth is likely bypassed as well. logging infra for sshd is hooked to prevent auth bypasses ending up in syslog. there's hooks for setresgid/setresuid, likely used to prevent privdrop when auth'ing as non-root.
1
4
88
@bl4sty
blasty
7 months
all parser bugs are just PERFECT BACKDOORS part of a TICKING TIMEBOMB 💣 😂.
@Perpetualmaniac
Zach Vorhies / Google Whistleblower
7 months
Update:. Crowdstrike came out and released a technical report confirming my analysis. They were reading in a bad data file and attempting to access invalid memory. This global crash was a two-part bomb. The detonator apparently, was NOT new. it was PRE-INSTALLED. /1.
2
9
86
@bl4sty
blasty
1 year
we hacked a thing! good job team 🦾.
@thezdi
Zero Day Initiative
1 year
Success! The Midnight Blue (@midnightbluelab) / PHP Hooligans team executed their attack against the Sony XAV-AX5500. They’re off to the disclosure room for confirmation. #Pwn2Own.
3
2
90
@bl4sty
blasty
2 years
Lexmark published an advisory in response to my published work: -- apparently it affects ~130 of their printer models, not a bad haul! *pats himself on the back* 🤣 Only took them 13 days to come up with a response/fix; irresponsible disclosure works!.
7
13
89
@bl4sty
blasty
9 years
"SQL Injection is a weakness which allows a troubled Russian teenager to speak directly to the database behind the web application" #LOL.
0
72
79
@bl4sty
blasty
3 months
love this ubuntu desktop LPE chain by @PsychoMario, reminds me quite a bit of his chromeOS chains :)
1
12
89
@bl4sty
blasty
8 years
A friend with ss7 access is trolling me using carrier messages :-(
Tweet media one
5
34
80
@bl4sty
blasty
10 months
'auth_root_allowed' is also resolved for sshd instances that don't allow root login (common), and there's a mystery string I haven't been able to find referenced in the code so far: "yolAbejyiejuvnup=Evjtgvsh5okmkAvj".
6
1
84
@bl4sty
blasty
4 years
Someone hacked and inserted two sloppy backdoor commits with references to @Zerodium LOL.
2
30
83
@bl4sty
blasty
1 year
We (@rdjgr, carlo from @midnightbluelab & me) landed 3rd place! 🎉. The payout could have been better (damn drawing) but fortunately none of our bugs were dupes. For one target we actually had 3 distinct exploits lined up and picked "the right one" last minute-ish.🙃.
@thezdi
Zero Day Initiative
1 year
The first ever #Pwn2Own Automotive is in the books! We awarded $1,323,750 throughout the event and discovered 49 unique zero-days. A special congratulations to @synacktiv, the Masters of Pwn! Stay with us here and at the ZDI blog as we prepare for Pwn2Own Vancouver in March.
Tweet media one
3
7
85
@bl4sty
blasty
3 years
Who will be the first to come up with a XSS NFT that auto-purchases itself by emptying your MetaMask? 😂.
@josephfcox
Joseph Cox
3 years
New: this NFT will steal your IP address. Viewing this and some other NFTs on marketplace OpenSea will send your IP to the NFT creator, because OpenSea lets people load custom code, including HTML. NFTs can gather data on viewers. Confirmed with my own IP
3
9
75
@bl4sty
blasty
8 years
CVE-2017-8073 PoC (to be ran from irssi, har har): /exec -o /bin/echo -e "\x01DCC SEND \" 1.2.3.4 1337 1\x01" #WeeChat #sorry.
3
44
78
@bl4sty
blasty
8 years
This is long overdue, but my son is 2 months old already! ;-] #happydad
Tweet media one
7
0
77
@bl4sty
blasty
5 years
Does my Android 0day chain need to work on all 3 million different devices and firmware images out there in order to be eligible for the $2.5M payout?.
@cBekrar
Chaouki Bekrar
5 years
Now @Zerodium is paying $2.5 million for Android full chains (iOS chains still at $2M) as Google/Samsung have considerably improved their security. iOS chains (1-click) e.g via Safari reduced to $1M as there’s a bunch of them on the market, sad but true.
6
8
74
@bl4sty
blasty
5 years
I have decided to give back to my community. All 0day sent to my address below will be sent back doubled. I am only doing a maximum of 50,000 0day. 0day@haxx.in. Enjoy! #0dayponzischeme.
2
11
77
@bl4sty
blasty
8 years
Yay, a PoC for the TCP off-path attack (CVE-2016-5696)
2
78
72
@bl4sty
blasty
3 months
/* XXX: property is only mutable at fixed interval */.blasty->age = 0x25;.
17
0
79
@bl4sty
blasty
6 months
great research/white paper from @alexjplaskett and @robHerrera_ on remotely pwning the Sonos (kernel rce!). thanks for the attribution, too!.
@alexjplaskett
Alex Plaskett
6 months
40 page whitepaper on Exploiting Sonos One Over-The-Air talk!.
Tweet media one
1
11
76
@bl4sty
blasty
9 years
Yup. This is happening. Small blasty in the making. Who would've thought? #happy :-)
Tweet media one
30
4
73
@bl4sty
blasty
7 years
Soo. McAfee's ultra secure crypto currency hardware (brain) wallet is an android phone with custom bezel? 😂Supply-chain attacks are probably trivial.
4
22
59