Piotr Bazydło
@chudypb.bsky.social
170 followers 63 following 22 posts
Principal Vulnerability Researcher at the watchTowr | Previously: @thezdi | https://chudypb.github.io
Posts Media Videos Starter Packs
Pinned
[2/n] My OffensiveCon 2024 talk about Exchange PowerShell Remoting. It includes details concerning PowerShell Remoting deserialization and custom Exchange converters.

Several RCE chains included.

www.youtube.com/watch?v=AxNO...
OffensiveCon24 - Piotr Bazydlo - Half Measures and Full Compromise
YouTube video by OffensiveCon
www.youtube.com
I've done small (but fun) .NET Framework research, and I found a new exploitation primitive (vulnerable behavior). In many cases, it may directly lead to RCE.

I'll discuss it during Black Hat EU and I'll drop a paper afterwards 🫡

www.blackhat.com/eu-25/briefi...
Black Hat
Black Hat
www.blackhat.com
Research is fun. One month ago, I thought that I'll never again make a research as good as my .NET deserialization one.

Here I am today, writing a new whitepaper. You never know the day 😅
Some serious question about a larg-scale usage of AI in Vuln Research.

Aren't you afraid of missing some key datails by outsourcing huge tasks to AI? I am.

If you rely on a tool, you're as good as your tool. If AI screws in a huge project, you probably won't even notice that.
😉
Our crew members @mwulftange.bsky.social & @frycos.bsky.social discovered & responsibly disclosed several new RCE gadgets that bypass #Veeam 's blacklist for CVE-2024-40711 & CVE-2025-23120 + further entry points after @sinsinology.bsky.social & @chudypb.bsky.social 's blog. Replace BinaryFormatter!
Great news: I got invited to Microsoft Zero Day Quest onsite event.

Bad news: It overlaps with my kid's estimated due date 😅

Happy hacking to all of you who's planning to go to Redmond 😎
How long does it take for MITRE to reserve a CVE now?

I haven't done that for several years, and it seems that the wait time is much bigger nowadays 🤔
I had a blast during my first month at watchTowr :)
Reposted by Piotr Bazydło
This year again, I am lucky enough to get nominated twice for the Top Ten Hacking Techniques, for my research on iconv and PHP, and lightyear. This time feels a bit special however, as these are my last blog posts on ambionics.
www.ambionics.io/blog/iconv-c...
www.ambionics.io/blog/lightye...
I'm happy to be on the nominations list second year in the row! This time, it's with "Half Measures and Full Compromise: Exploiting Microsoft Exchange PowerShell Remoting" research and some nice RCE chains on Exchange:)

chudypb.github.io/exchange-powershell.html
I'm happy to announce that I have recently joined watchTowr as a Principal Vulnerability Researcher. The break is over, it's time to do some new research 🫡
Does anyone use 34" 21:9 screen?

Does it work for a setup with a VM on a half of the screen and browser/IDE on the second half?🤔
After amazing (almost) 3 years, this is my last day at @thezdi.bsky.social. Huge thanks to the entire team, it was an honour to work with you folks!

New challenges and adventures are starting in 2025 :)

PS. Watch out for the ZDI blog, as several of my posts should appear there in 2025.
[4/n] My Hexacon 2023 talk about .NET Deserialization. New gadgets, insecure serialization (RCE through serialization) and custom gadgets found in the products codebase.

Talk: www.youtube.com/watch?v=_CJm...

White paper: github.com/thezdi/prese...
HEXACON2023 - Exploiting Hardened .NET Deserialization by Piotr Bazydło
YouTube video by Hexacon
www.youtube.com
[2/n] My OffensiveCon 2024 talk about Exchange PowerShell Remoting. It includes details concerning PowerShell Remoting deserialization and custom Exchange converters.

Several RCE chains included.

www.youtube.com/watch?v=AxNO...
OffensiveCon24 - Piotr Bazydlo - Half Measures and Full Compromise
YouTube video by OffensiveCon
www.youtube.com
You can use it for the NTLM Relaying, but I guess the success depends on the AD environment etc :)
I wrote a fun, little blog post. Remote pre-auth file deletion in SolarWinds ARM allowed to achieve LPE on AD machines 🙃
Reposted by Piotr Bazydło
Rapid7 has disclosed the vulns from our exploit chain targeting the Lorex 2K Indoor Wi-Fi Security Camera, which we entered at this year's Pwn2Own Ireland. A 2 phase exploit, built upon 5 vulns - phase 1 is an auth bypass, whilst phase 2 is RCE. Disclosure, analysis and exploit here: t.co/J9VDwMDRsI
https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/
t.co
Great post! BTW, thanks for the shout-out Steven :)