Welcome to BFS Labs
Here you will be presented with the latest and most exciting security research activities undertaken by the Blue Frost Security research team. You will find whitepapers, tools, advisories and blog posts.
Microsoft Hyper-V: Multiple Vulnerabilities in vmswitch.sys
Multiple bugs are present in WPP code when handling set OID requests, one of them allowing to dereference (read access) an attacker controlled pointer, and the rest causing out of bounds read accesses
Microsoft Hyper-V Type Confusion leading to Arbitrary Memory Dereference
A bug present in the Hyper-V (hvix64) hash-table implementation allows to dereference memory near (or belonging to) the hash-table struct object.
Microsoft Hyper-V NULL Pointer Dereference Denial of Service
A bug present in Hyper-V's (hvix64) emulation handler for VMLAUNCH/VMRESUME allows a malicious L2 hypervisor to trigger a NULL pointer dereference in the L1 hypervisor.
Microsoft Hyper-V Stack Overflow Denial of Service
A bug present in the hvix64 module (hypervisor) causes infinite recursion, leading to a stack overflow.
A bug collision tale
The inside story of our CVE-2019-2025 exploit
Exploiting Trusted Apps on Samsung’s TEE
Abusing GDI for Ring0 Exploit Primitives: Evolution
Windows 10 kernel exploitation techniques based on the latest Windows 10 RS3 insider preview
Look Mom! I Don’t Use Shellcode
A Browser Exploitation Case Study for Internet Explorer 11
Exploiting CVE-2014-4113 on Windows 8.1
Analysis of the Windows kernel vulnerability CVE-2014-4113, demonstrating how it can successfully be exploited on Windows 8.1.
BFS Ekoparty 2022 Exploitation Challenges
Show us your skills, to get a free invite to the BFS VIP dinner/party as well as an opportunity to join our team!
Windows Segment Heap: Attacking the VS Allocator
Abusing the Windows segment heap metadata to turn a heap overflow into an overlapping chunk allocation
BFS Hiring Challenge
Show us your skills, and get an opportunity to join BFS!
Meltdown Reloaded: Breaking Windows KASLR by Leaking KVA Shadow Mappings
This blogpost explains how Meltdown can still be used to leak some specific kernel data and break Windows KASLR in the latest Windows versions, including "Windows 10" 20H1, despite the KVA Shadow mechanism introduced to mitigate Meltdown.
Exploiting CVE-2020-0041 - Part 2: Escalating to root
Exploiting the kernel with CVE-2020-0041 to achieve root privileges
We are growing our browser vulnerability research team! Full time Chrome research, flexible hours, huge bonuses and… https://t.co/hBYsS9v5KO
2 months ago
RT @offensive_con: We are proud to announce the Keynote speakers for #OffensiveCon23: @daveaitel and @windknown !
2 months, 2 weeks ago
RT @offensive_con: It's time everybody!!! the OffensiveCon23 ticket shop is now open! Get your tickets quickly, as they tend to run ou… https://t.co/r1343AETPP
2 months, 3 weeks ago
RT @offensive_con: #OffensiveCon23 CFP is now officially open! https://t.co/lBV7A3YwOk Don't wait until the last minute to submit!
3 months, 1 week ago
RT @Rewzilla: @tykawaii98 @bluefrostsec Nice work, and great write-up! :) I solved this one as well. Was waiting to publish to a… https://t.co/5o2yEvAZ09
4 months, 1 week ago