<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Software on Matt Suiche</title><link>https://www.msuiche.com/categories/software/</link><description>Recent content in Software on Matt Suiche</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 12 Aug 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://www.msuiche.com/categories/software/index.xml" rel="self" type="application/rss+xml"/><item><title>Azure Sphere Internals - Overview</title><link>https://www.msuiche.com/posts/azure-sphere-internals-overview/</link><pubDate>Wed, 12 Aug 2020 00:00:00 +0000</pubDate><guid>https://www.msuiche.com/posts/azure-sphere-internals-overview/</guid><description>&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/msuiche/ruby-square" target="_blank" rel="noopener"&gt;&lt;strong&gt;GitHub Repository&lt;/strong&gt;&lt;/a&gt;: &lt;a href="https://github.com/msuiche/ruby-square" target="_blank" rel="noopener"&gt;https://github.com/msuiche/ruby-square&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="introduction"&gt;Introduction &lt;a href="#introduction" class="anchor"&gt;🔗&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;In May, Microsoft announced a bounty for their new IoT platform called Azure
Sphere. The interesting part about it is that it&amp;rsquo;s created with security in
mind, which is a much needed initiative, so we decided to take a look.&lt;/p&gt;
&lt;p&gt;While we didn&amp;rsquo;t find any issues worth reporting, we thought it would be a waste
not to share what we&amp;rsquo;ve learned. Hopefully, this will be useful for others
wanting to research the platform or those considering to use it for their
projects.&lt;/p&gt;</description></item><item><title>SMBaloo - Building a RCE exploit for Windows ARM64 (SMBGhost Edition)</title><link>https://www.msuiche.com/posts/smbaloo-building-a-rce-exploit-for-windows-arm64-smbghost-edition/</link><pubDate>Wed, 01 Jul 2020 00:00:00 +0000</pubDate><guid>https://www.msuiche.com/posts/smbaloo-building-a-rce-exploit-for-windows-arm64-smbghost-edition/</guid><description>&lt;h1 id="smbaloo"&gt;SMBaloo &lt;a href="#smbaloo" class="anchor"&gt;🔗&lt;/a&gt;&lt;/h1&gt;&lt;p&gt;&lt;p class="markdown-image"&gt;
 &lt;img src="images/logo.png" alt="alt text" /&gt;
&lt;/p&gt;&lt;/p&gt;
&lt;p&gt;A CVE-2020-0796 (aka &amp;ldquo;SMBGhost&amp;rdquo;) exploit for Windows ARM64.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Because vulnerabilities and exploits don&amp;rsquo;t need to always have scary names and logos.&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.github.com/msuiche/smbaloo" target="_blank" rel="noopener"&gt;&lt;strong&gt;GitHub Repository&lt;/strong&gt;&lt;/a&gt;: &lt;a href="https://www.github.com/msuiche/smbaloo" target="_blank" rel="noopener"&gt;https://www.github.com/msuiche/smbaloo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.comae.com/posts/2020-06-25_smbaloo-building-a-rce-exploit-for-windows-arm64-smbghost-edition/" target="_blank" rel="noopener"&gt;&lt;strong&gt;Original post on Comae&amp;rsquo;s blog&lt;/strong&gt;&lt;/a&gt;: &lt;a href="https://www.comae.com/posts/2020-06-25_smbaloo-building-a-rce-exploit-for-windows-arm64-smbghost-edition/" target="_blank" rel="noopener"&gt;https://www.comae.com/posts/2020-06-25_smbaloo-building-a-rce-exploit-for-windows-arm64-smbghost-edition/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Author&lt;/strong&gt;: Matt Suiche (&lt;a href="https://www.twitter.com/msuiche" target="_blank" rel="noopener"&gt;@msuiche&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id="acknowledgments"&gt;Acknowledgments &lt;a href="#acknowledgments" class="anchor"&gt;🔗&lt;/a&gt;&lt;/h1&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/hugeh0ge" target="_blank" rel="noopener"&gt;@hugeh0ge&lt;/a&gt; for his great blogpost and &lt;a href="https://twitter.com/chompie1337" target="_blank" rel="noopener"&gt;@chompie1337&lt;/a&gt; for her excellent POC! On top of answering my questions on Twitter, their materials were really good and helped me immensely to understand the vulnerability and the exploitation part. Really HUGE kudos to both of them!&lt;/li&gt;
&lt;li&gt;ZecOps &amp;amp; Michael Maltsev (&lt;a href="https://twitter.com/m417z" target="_blank" rel="noopener"&gt;@m417z&lt;/a&gt;) for their write-ups.&lt;/li&gt;
&lt;li&gt;Special thanks to Stephen Ridley (&lt;a href="https://twitter.com/s7ephen" target="_blank" rel="noopener"&gt;@s7ephen&lt;/a&gt;) for being the ultimate ARM64 enabler and a great Aniki.&lt;/li&gt;
&lt;li&gt;Barnaby (RIP), I also gave a refresh to your APC injection technique. I hope you like it, we miss you.. Alex says hi.&lt;/li&gt;
&lt;li&gt;Thanks to Satoshi Tanda (&lt;a href="https://twitter.com/standa_t" target="_blank" rel="noopener"&gt;@standa_t&lt;/a&gt;) and Petr Beneš (&lt;a href="https://twitter.com/PetrBenes" target="_blank" rel="noopener"&gt;@PetrBenes&lt;/a&gt;) for helping me troubleshooting my original debugging set-up :)&lt;/li&gt;
&lt;li&gt;A big thanks to Sean Dillon (&lt;a href="https://twitter.com/zerosum0x0" target="_blank" rel="noopener"&gt;@zerosum0x0&lt;/a&gt;) for his prior work on SMB exploitation and our brainstorming sessions :)&lt;/li&gt;
&lt;li&gt;Laurent Gaffie (&lt;a href="https://twitter.com/PythonResponder" target="_blank" rel="noopener"&gt;@PythonResponder&lt;/a&gt;) for his prior work on SMB.&lt;/li&gt;
&lt;li&gt;The NSA for developing (or buying) (and leaking? Cheers to TheShadowBrokers) ETERNALBLUE and DOUBLEPULSAR, that exploit is soon gonna be 10 years old&amp;hellip; it almost feels like nothing new got released since then.&lt;/li&gt;
&lt;li&gt;Microsoft Platform Security Assurance &amp;amp; Vulnerability Research for finding CVE-2020-0796.&lt;/li&gt;
&lt;li&gt;Nicolas Economou (&lt;a href="https://twitter.com/NicoEconomou" target="_blank" rel="noopener"&gt;@NicoEconomou&lt;/a&gt;) and Alex Ionescu (&lt;a href="https://twitter.com/aionescu" target="_blank" rel="noopener"&gt;@aionescu&lt;/a&gt;) for their publications on HAL stuff.&lt;/li&gt;
&lt;li&gt;Nikita Karetnikov (&lt;a href="https://twitter.com/karetnikovn" target="_blank" rel="noopener"&gt;@karetnikovn&lt;/a&gt;) for the ARM ninjutsu.&lt;/li&gt;
&lt;li&gt;Souhail Hammou (&lt;a href="https://twitter.com/dark_puzzle?" target="_blank" rel="noopener"&gt;@Dark_Puzzle&lt;/a&gt;) for making fun of APC ETW.&lt;/li&gt;
&lt;li&gt;And the OPCDE community for the continuous support! Join us on &lt;a href="https://discord.gg/Wp8Nzxh" target="_blank" rel="noopener"&gt;Discord&lt;/a&gt; or go on our &lt;a href="www.opcde.com"&gt;website&lt;/a&gt; if the link is dead :)&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id="introduction"&gt;Introduction &lt;a href="#introduction" class="anchor"&gt;🔗&lt;/a&gt;&lt;/h1&gt;&lt;p&gt;Do not use this for anything else other than educational purposes, this was only tested on the only ARM64 machine (Windows 10 18362 ARM 64-bit (AArch64)) that I had a direct access to.
I have been happy enough that it was running consistently against it. Make sure that KB4551762 is not installed if you do some tests. I&amp;rsquo;m gonna try to make this write-up as readable as possible even if you have limited experience with exploit development, if you have any questions - do not hesitate just to come on Discord to ask them on the &lt;a href="https://discord.gg/Wp8Nzxh" target="_blank" rel="noopener"&gt;OPCDE Discord server&lt;/a&gt;.&lt;/p&gt;</description></item></channel></rss>