Theori BLOG
Empowering Innovation with Security
Explore expert insights into offensive security and threat intelligence.
Explore expert insights into offensive security and threat intelligence.
Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch
A new approach to the Overwriting modprobe_path technique is introduced, addressing changes in the Upstream kernel that prevent triggering via dummy files.
Finding Vulnerabilities in Firmware with Static Analysis Platform QueryX
QueryX, Theoriâs program analysis platform, automates variant analysis for vulnerability detection. Learn how its taint analysis module uncovered CVE-2023-39471.
Deep Dive into RCU Race Condition: Analysis of TCP-AO UAF (CVE-2024â27394)
CVE-2024-27394 is a TCP-AO Use-After-Free vulnerability caused by improper RCU API usage. Read the in-depth analysis and reliable triggering technique.
Chaining N-days to Compromise All: Part 6 â Windows Kernel LPE: Get SYSTEM
The final part of the N-day exploit series analyzes CVE-2023-36802, a privilege escalation vulnerability in mskssrv.sys, used to gain SYSTEM access on a VMware host.