1. |
Blog moved to https://code-white.com/blog |
CODE WHITE |
|
2. |
Java Exploitation Restrictions in Modern JDK Times |
Exploitation Technique ‧ Florian Hauser |
|
3. |
JMX Exploitation Revisited |
Exploitation Technique ‧ Markus Wulftange |
|
4. |
Attacks on Sysmon Revisited - SysmonEnte |
Unknown |
|
5. |
Bypassing .NET Serialization Binders |
Exploitation Technique ‧ Markus Wulftange |
|
6. |
.NET Remoting Revisited |
Exploitation Technique ‧ Markus Wulftange |
|
7. |
RCE in Citrix ShareFile Storage Zones Controller (CVE-2021-22941) – A Walk-Through |
Vulnerability Details ‧ Markus Wulftange |
|
8. |
About the Unsuccessful Quest for a Deserialization Gadget (or: How I found CVE-2021-21481) |
Unknown |
|
9. |
Sophos XG - A Tale of the Unfortunate Re-engineering of an N-Day and the Lucky Find of a 0-Day |
Vulnerability Details ‧ Unknown |
|
10. |
Liferay Portal JSON Web Service RCE Vulnerabilities |
Vulnerability Details ‧ Markus Wulftange |
|
11. |
CVE-2019-19470: Rumble in the Pipe |
Exploitation Technique ‧ Florian Hauser |
|
12. |
Exploiting H2 Database with native libraries and JNI |
Exploitation Technique ‧ Markus Wulftange |
|
13. |
Heap-based AMSI bypass for MS Excel VBA and others |
Evasion ‧ Unknown |
|
14. |
Telerik Revisited |
Exploitation Technique ‧ Markus Wulftange |
|
15. |
LethalHTA - A new lateral movement technique using DCOM and HTA |
Lateral Movement ‧ Unknown |
|
16. |
Marshalling to SYSTEM - An analysis of CVE-2018-0824 |
Unknown |
|
17. |
Poor RichFaces |
Gadget ‧ Markus Wulftange |
|
18. |
Exploiting Adobe ColdFusion before CVE-2017-3066 |
Unknown |
|
19. |
Handcrafted Gadgets |
Unknown |
|
20. |
SAP Customers: Make sure your SAPJVM is up to date! |
Unknown |
|
21. |
AMF – Another Malicious Format |
Exploitation Technique ‧ Markus Wulftange |
|
22. |
Return of the Rhino: An old gadget revisited |
Exploitation Technique ‧ CODE WHITE |
|
23. |
Infiltrate 2016 Slidedeck: Java Deserialization Vulnerabilities |
CODE WHITE |
|
24. |
Compromised by Endpoint Protection: Legacy Edition |
Vulnerability Details ‧ Markus Wulftange |
|
25. |
Java and Command Line Injections in Windows |
Vulnerability Details ‧ Markus Wulftange |
|