core-jmp

core-jmp

death of core jump

  • Home
  • About
  • Privacy Policy

Home

All posts by : oxfemale

Rooting the TP-Link Tapo C200 Rev.5

Rooting the TP-Link Tapo C200 Rev.5

March 5, 2026
by oxfemale dumpfilesystemfirmwareHardwareIoTReverse EngineeringrootUART

A analyze the TP-Link Tapo C200 camera firmware by dumping flash via UART and U-Boot, reversing AES-encrypted rootfs headers, and modifying the firmware to gain remote root access for deeper dynamic security analysis of the device.

Read More
Breaking Flash Encryption on Espressif ESP32: Side-Channel Attacks Against Embedded Security

Breaking Flash Encryption on Espressif ESP32: Side-Channel Attacks Against Embedded Security

March 4, 2026
by oxfemale EncryptionESP32firmwareFlashHardwareIoT

Researchers demonstrated that flash encryption on Espressif ESP32 chips can be broken using side-channel power analysis. By measuring power traces during AES operations, attackers can recover encryption keys and potentially decrypt firmware stored in flash memory.

Read More
EDR-Redir V2: Blind EDR With Fake Program Files

EDR-Redir V2: Blind EDR With Fake Program Files

March 3, 2026
by oxfemale AntivirusBypassingDefenderEDRwindows

A technique leveraging Windows bind link features to redirect and loop parent folders (like Program Files/ProgramData) so an EDR sees attacker-controlled files as its own, enabling stealthy evasion and potential DLL hijacks.

Read More
Defeating Windows DEP Using ROP Chains Leveraging VirtualAlloc

Defeating Windows DEP Using ROP Chains Leveraging VirtualAlloc

March 2, 2026
by oxfemale buffer overflowDebugDEPexploitationROPshellcodeWinDBGwindows

Uses manual Return-Oriented Programming (ROP) to chain existing code fragments and call VirtualAlloc, changing memory permissions to bypass Windows DEP and then execute shellcode in exploited process memory.

Read More
Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM

Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM

March 2, 2026
by oxfemale DebugEscalationexploitationPoCPrivilegeuser-modewindows

A Windows elevation-of-privilege flaw in the Recall scheduled task let low-privileged users trigger it via WNF and abuse unsafe directory cleanup to execute arbitrary actions as NT AUTHORITY\SYSTEM.

Read More
Using ReadFile with Handle of Opened .blf Log File Produces an Unrecoverable State in CLFS.sys Causing a BSoD

Using ReadFile with Handle of Opened .blf Log File Produces an Unrecoverable State in CLFS.sys Causing a BSoD

February 26, 2026
by oxfemale BSoDCLFSDriverexploitationPoCwinapiwinapiWinDBGwindows

CVE-2026-2636 Logic bug in Windows’ CLFS driver: calling ReadFile on a .blf log handle pushes CLFS.sys into an unrecoverable state and triggers an immediate BSoD — local DoS with only user privileges.

Read More
ROP the ROM: Exploiting a Stack Buffer Overflow on STM32H5 in Multiple Ways

ROP the ROM: Exploiting a Stack Buffer Overflow on STM32H5 in Multiple Ways

February 25, 2026
by oxfemale ASMbuffer overflowHardwarepowershellROPSTM32H5

Article details exploiting a stack buffer overflow on an STM32H5. It demonstrates basic shellcode injection, then bypassing a non-executable stack (XN/MPU) using Return-Oriented Programming (ROP) with gadgets from the chip’s ROM code to dump firmware, showcasing advanced embedded exploitation techniques.

Read More
Multiple vulnerabilities in CPSD CryptoPro Secure Disk for BitLocker

Multiple vulnerabilities in CPSD CryptoPro Secure Disk for BitLocker

February 25, 2026
by oxfemale BitLockerCryptoProexploitationPoCwindows

SEC Consult found two high-impact vulnerabilities in CryptoPro Secure Disk for BitLocker (<7.6.6/7.7.1). An attacker with physical access can bypass integrity checks to gain root access (CVE-2025-10010) and read sensitive network data stored in cleartext. Patches are available.

Read More
Hacking a stolen laptop: bypassing Windows security (BitLocker etc.) using PCI connector.

Hacking a stolen laptop: bypassing Windows security (BitLocker etc.) using PCI connector.

February 24, 2026
by oxfemale BitLockerBypassingDMAPCITPM

The article outlines security researcher Pierre-Nicolas Allard-Coutu’s demonstration of attacking a stolen Windows laptop using a PCIe connector to bypass protections like BitLocker, TPM, and Kernel DMA Protection, showing how to gain SYSTEM access.

Read More
Windows Kernel Debugging

Windows Kernel Debugging

February 23, 2026
by oxfemale DebugEscalationkernelkernel-modeNetworkPrivilegeProtectionSecurityWinDBGwindows

The article explains how to set up Windows kernel debugging over a network using WinDBG and a host/target configuration. It covers enabling debug mode, connecting WinDBG to a remote VM, and using kernel debug infrastructure for low-level inspection and manipulation.

Read More
  • First
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
  • Last

Recent Posts

  • Crimes against NTDLL – Implementing Early Cascade Injection
  • How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection
  • Active Directory Security Assessment: Password Spraying, Privilege Escalation, and Kerberoasting
  • Reverse engineering undocumented Windows Kernel features to work with the EDR
  • Silent Harvest: Extracting Windows Secrets Under the Radar

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025

Categories

  • access
  • ACE
  • ACL
  • Active Directory
  • AD CS
  • Administrator
  • alloc
  • ALPC
  • Antivirus
  • APC
  • ASM
  • ASR
  • attaks
  • Audio
  • AV
  • BitLocker
  • Bluetooth
  • BSoD
  • buffer overflow
  • BYOVD
  • Bypassing
  • Cache
  • Callbacks
  • CLFS
  • cmd
  • Containers
  • cpp
  • CPU
  • Credential Attacks
  • Crypt
  • Cryptography
  • CryptoPro
  • Debug
  • Defender
  • DEP
  • DFIR
  • DMA
  • Driver
  • dump
  • EDR
  • Encryption
  • Escalation
  • ESP32
  • Evasion
  • Eventlog
  • exploitation
  • filesystem
  • firmware
  • Flash
  • Gadgets
  • GATT
  • Ghidra
  • Hardware
  • impact
  • Injection
  • IoT
  • kernel
  • kernel-mode
  • Library
  • Linux
  • LNK
  • Loader
  • LSA
  • Malware
  • MS-DOS
  • MS-EVEN
  • MS-LSAD
  • MS-SAMR
  • Network
  • PBA
  • PCI
  • PEB
  • Penetration Testing
  • Plugins
  • PoC
  • powershell
  • powershell
  • PPL
  • Privilege
  • Protection
  • PXE
  • QEMU
  • RCE
  • RedTeam
  • Registry
  • Reverse Engineering
  • root
  • ROP
  • RPC
  • Rust
  • SAM
  • Secure Boot
  • Security
  • shellcode
  • Shortcut
  • STM32H5
  • TEB
  • Telegram
  • TPM
  • UAC
  • UART
  • Uncategorized
  • user-mode
  • Warbird
  • WASM
  • winapi
  • winapi
  • WinDBG
  • windows
Log in
© 2026 core-jmp. All rights reserved.
Shopping Basket