Meta Red Team X
BUGSABOUTHOME
  • The many meanings of "system app" in modern Android TOP NEW

    Jul 03, 2024 Tom Hebb, Red Team X About 6 mins

    Not all Android apps are created equal. The Settings app on an Android device, for example, can change numerous things that no “normal” app can, regardless of how many permissions that app requests. Apps with special privileges like Settings are often called “system apps.” But what makes an app a “system app”? In answering that question for ours... Read More

  • Becoming any Android app via Zygote command injection TOP NEW

    Jun 03, 2024 Tom Hebb, Red Team X About 24 mins

    We have discovered a vulnerability in Android that allows an attacker with the WRITE_SECURE_SETTINGS permission, which is held by the ADB shell and certain privileged apps, to execute arbitrary code as any app on a device. By doing so, they can read and write any app’s data, make use of per-app secrets and login tokens, change most system config... Read More

  • Bypassing the "run-as" debuggability check on Android via newline injection TOP NEW

    Mar 04, 2024 Tom Hebb, Red Team X About 11 mins

    An attacker with ADB access to an Android device can trick the “run-as” tool into believing any app is debuggable. By doing so, they can read and write private data and invoke system APIs as if they were most apps on the system—including many privileged apps, but not ones that run as the system user. Furthermore, they can achieve persistent code... Read More

  • Missing signs: how several brands forgot to secure a key piece of Android TOP NEW

    Jan 30, 2024 Tom Hebb, Red Team X About 18 mins

    We recently discovered that Android devices from multiple major brands sign APEX modules—updatable units of highly-privileged OS code—using private keys from Android’s public source repository. Anyone can forge an APEX update for such a device to gain near-total control over it. Rather than negligence by any particular manufacturer (OEM), we bel... Read More

  • CVE-2023-4039: GCC's -fstack-protector fails to guard dynamic stack allocations on ARM64 TOP NEW

    Sep 12, 2023 Tom Hebb, Red Team X About 18 mins

    GCC’s stack smashing protection, which keeps attackers from exploiting stack buffer overflow bugs in code it compiles, has no effect when the vulnerable buffer is a variable-length array or alloca() allocation and the target architecture is 64-bit ARM. This issue is a mitigation weakness and is not exploitable directly. A fix is now available o... Read More

  • Sandboxing ImageIO media parsing in macOS TOP NEW

    Sep 11, 2023 Nik Tsytsarkin, Red Team X About 7 mins

    While assessing the potential impact of the latest BLASTPASS Zero-Click, Zero-Day Exploit on our Family of Apps, we discovered a feature in ImageIO that moves image parsing to an out-of-process sandbox. This feature mitigates the effects of vulnerabilities related to image parsing on macOS similar to BLASTPASS. App developers can enable this fe... Read More

  • In-Memory Execution in macOS: the Old and the New TOP NEW

    Dec 19, 2022 Manish Bhatt, Red Team X About 14 mins

    As part of our work, it’s often interesting to try to find possible avenues of attack that bypass detections on EDR products. On macOS, EDR products specifically collect telemetry from fork and exec syscalls. macOS has alternative ways of executing code, which side-step these system calls by executing code directly in-memory. There are a few A... Read More

  • Uncovering Hidden .NET Assemblies TOP NEW

    Sep 21, 2022 Michael Henry, Red Team X About 8 mins

    We recently completed a security review of ControlUp Agent by ControlUp Technologies. The software is responsible for remote management and analytics of agent hosts on which it runs. The software is typically deployed in virtualization infrastructure environments. This writeup details the steps taken to assess the software, bypass obfuscation, ... Read More

  • All8
  • exploitation 3
  • mitigation 2
  • post-exploitation 1
  • reference 1
  • reversing 1
© 2022-2024 Meta Red Team X
Powered by Jekyll & Yat Theme.
Subscribe via RSS