StreyPaws
Dissecting a 1-Day Vulnerability in Linux’s XFRM Subsystem
An exploration of the Linux XFRM subsystem, including patch analysis and vulnerability insights for CVE-2025-39965 (recently submitted as a kernelCTF entry).
Dissecting a 1-Day Vulnerability in Linux’s XFRM Subsystem
🔗 Link
#exploitation
#linux
#kernel
———
🆔 @Infosec_Fortress
🔗 Link
#exploitation
#linux
#kernel
———
🆔 @Infosec_Fortress
🔥2
YouTube
ReVault! Compromised by your Secure SoC with Philippe Laulheret
We all love security, right? And when we trust a security component to safeguard our most valuable assets, such as passwords, key material and biometrics, we want to believe they're doing a good job at it. But what happens when this assumption is flawed,…
ReVault! Compromised by your Secure SoC with Philippe Laulheret
📹 Video
#vr
#exploitation
#conference
———
🆔 @Infosec_Fortress
📹 Video
#vr
#exploitation
#conference
———
🆔 @Infosec_Fortress
👍2🔥1
SSD Secure Disclosure
LPE via refcount imbalance in the af_unix of Ubuntu's Kernel - SSD Secure Disclosure
Affected Versions Vendor Response The vendor has released an updated kernel on the 18th of September Credit The vulnerability was disclosed during our TyphoonPWN 2025 Linux category and won first place. Vulnerability Details The vulnerability is caused by…
LPE via refcount imbalance in the af_unix of Ubuntu’s Kernel
🔗 Link
#exploitation
#linux
#kernel
———
🆔 @Infosec_Fortress
🔗 Link
#exploitation
#linux
#kernel
———
🆔 @Infosec_Fortress
🔥1
Exodus Intelligence
Microsoft Windows Cloud Files Minifilter TOCTOU Privilege Escalation - Exodus Intelligence
By Michele Campa Overview In this blog post we take a look at a race condition we found in Microsoft Windows Cloud Minifilter (i.e. cldflt.sys ) in March 2024. This vulnerability was patched in October 2025 and assigned CVE-2025-55680 . The vulnerability…
Microsoft Windows Cloud Files Minifilter TOCTOU Privilege Escalation
🔗 Link
#exploitation
#windows
#kernel
———
🆔 @Infosec_Fortress
🔗 Link
#exploitation
#windows
#kernel
———
🆔 @Infosec_Fortress
🔥5
Out of Bounds
Four Bytes, One Lie: A SMAP-Free Confidence Trick on Kernel Pointers
A deep-dive technical analysis of CVE-2025-50168, a Windows kernel vulnerability (Type Confusion in DirectComposition) presented at Pwn2Own Berlin 2025. This post details how a 4-byte OOB write is escalated into an AAR/AAW primitive using IoRing to achieve…
Four Bytes, One Lie: A SMAP-Free Confidence Trick on Kernel Pointers
🔗 Link
#windows
#exploitation
#vr
#kernel
#pwn2own
———
🆔 @Infosec_Fortress
🔗 Link
#windows
#exploitation
#vr
#kernel
#pwn2own
———
🆔 @Infosec_Fortress
YouTube
A Journey into Advanced Theoretical Reverse Engineering
Unveiling the Mysteries of Qualcomm's QDSP6 JTAG: A Journey into Advanced Theoretical Reverse Engineering
This talk invites you on an exploration of advanced reverse engineering techniques applied to sophisticated proprietary hardware. Rather than focusing…
This talk invites you on an exploration of advanced reverse engineering techniques applied to sophisticated proprietary hardware. Rather than focusing…
A Journey into Advanced Theoretical Reverse Engineering
📹 Video
#conference
#blackhat
#hardware
#reverse
———
🆔 @Infosec_Fortress
📹 Video
#conference
#blackhat
#hardware
#reverse
———
🆔 @Infosec_Fortress
🔥4
Race Condition Symphony: From Tiny Idea to Pwnie
#slides
#exploitation
#race_condition
#linux
———
🆔 @Infosec_Fortress
#slides
#exploitation
#race_condition
#linux
———
🆔 @Infosec_Fortress
XploitBengineer
Exploiting CVE-2025-21479 on a Samsung S23
Motivation A couple of years ago, I picked up a few of Samsung S23’s at Pwn2Own.
Exploiting CVE-2025-21479 on a Samsung S23
🔗 Link
#exploitation
#android
#kernel
#samsung
———
🆔 @Infosec_Fortress
🔗 Link
#exploitation
#android
#kernel
#samsung
———
🆔 @Infosec_Fortress
faith2dxy.xyz
Extending Kernel Race Windows Using '/dev/shm'
Recently, I came across this kernelCTF submission where the author mentions a novel technique for extending race windows in the Linux kernel: I learned…
Extending Kernel Race Windows Using '/dev/shm'
🔗 Link
#exploitation
#kernel
#kCTF
#linux
———
🆔 @Infosec_Fortress
🔗 Link
#exploitation
#kernel
#kCTF
#linux
———
🆔 @Infosec_Fortress
YouTube
Can't Stop the ROP: Weaponizing ROP on Windows to Bypass System DLLs
While high entropy ASLR is supposed to prevent ASLR bypasses, ROP can be used to provide a bypass of ASLR. We will explore how - given an existing way to utilize ROP on a 64-bit application, ROP can be used to bypass ASLR for system DLLs, thus expanding the…
Can't Stop the ROP: Weaponizing ROP on Windows to Bypass System DLLs
📹 Video
#exploitation
#windows
#rop
———
🆔 @Infosec_Fortress
📹 Video
#exploitation
#windows
#rop
———
🆔 @Infosec_Fortress
🔥3
🔥2
Synacktiv
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey
🔗 Link
#exploitation
#synology
#pwn2own
———
🆔 @Infosec_Fortress
🔗 Link
#exploitation
#synology
#pwn2own
———
🆔 @Infosec_Fortress
🔥1