{"id":1582,"date":"2019-09-18T16:59:10","date_gmt":"2019-09-18T14:59:10","guid":{"rendered":"http:\/\/hacktivity.com\/?p=1582"},"modified":"2019-09-19T09:57:34","modified_gmt":"2019-09-19T07:57:34","slug":"shelob-streams-endlessly-logic-bugs","status":"publish","type":"post","link":"https:\/\/2022.hacktivity.com\/index.php\/shelob-streams-endlessly-logic-bugs\/","title":{"rendered":"S(H)ELOB – Streams Endlessly Logic Bugs"},"content":{"rendered":"
We have developed a system that discovers 0day vulnerabilities automatically.<\/span><\/p>\n<\/div>\n <\/p>\n It was pretty clear at the beginning of this process that simply grepping the logs to find<\/span> “NOT<\/span> FOUND” and such will result in more false-positive records then valuable hints. <\/span><\/b><\/p>\n So we decided to create a system that can <\/b>“rebuild”<\/b><\/span> processes by the logs and can understand the events by the time they occur. By this approach, the system can easily make differences between events that are good for nothing, and taking care of them is just a waste of time or events that may highlight vulnerabilities that can be exploited for sure.\u00a0<\/b><\/span><\/p>\n<\/div>\nFinding bugs automatically<\/span><\/h2>\n<\/div>\n
\nThe leader of this project is Attila Marosi-Bauer. In his free time, he likes to dive deep in the process of reverse engineering to get a better understanding of how these products are operating, and more importantly to find the vulnerabilities and weaknesses of these kinds of software.<\/span><\/div>\n
\nOk, we recognized that we have the obsession to find software bugs on Windows systems. One of the easiest test cases is to run the tested application while Sysinternals ProcMon or any kind of system monitoring service running to collect information about the discussion of the application and the Operation System. <\/span>After harvesting enough behavior information, the one that can query well may find software vulnerabilities.<\/b><\/span><\/div>\n\n
\n
\n
\n
\n
How deep is the rabbit hole?<\/span><\/h2>\n<\/div>\n
VMware Workstation 14.1.5 \/ VMware Player 15 – Host VMX Process COM Class Hijack Privilege Escalation<\/b><\/span><\/span><\/h3>\n
\n
\n
\n
\n
\n
AntiVirus systems<\/b><\/span><\/span><\/h3>\n
Vulnerabilities overall<\/b><\/span><\/span><\/h3>\n