Cybersecurity Using C# to steal tokens and gain system permissions
Intro Grzegorz Tworek recently published some C code demonstrating how to steal and impersonate Windows tokens from a process. The standard way to do this is with the OpenProcess, OpenProcessToken, DuplicateTokenEx, and ImpersonateLoggedOnUser APIs. Grzegorz shows how to achieve the same using Nt* APIs, specifically NtOpenProcess, NtOpenProcessToken, NtDuplicateToken, and NtSetInformationThread. Because I’m a C# junky, I…
Cybersecurity BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)
What is BadUSB? Using the STM32F407 development board, we’ll study HID device development and implement a low-cost BadUSB. This article uses the development board for testing. Those with the means can also create a PCB prototype and print the enclosure to create a highly realistic BadUSB.BadUSB is an attack that masquerades as a USB HID…
Cybersecurity MCP Security Vulnerabilities: Critical Risks Every Developer Must Know
Model Context Protocol (MCP) is gaining traction, but critical security gaps remain. This guide explores common MCP vulnerabilities in the 2025-06-18 release — from misconfigurations and credential leaks to command injection and remote code execution — helping developers secure their MCP deployments. MCP adoption is picking up quickly, so I have been digging into the…
Cybersecurity Use io_uring to evade security detection and targeted detection.
This article explores how ARMO researchers leveraged the io_uring mechanism to bypass popular Linux security monitoring tools such as Falco and Tetragon. It also demonstrates the workings of the open-source attack tool Curing, explaining its core calls, exploitation process, and potential defense strategies. Background The ARMO research team recently revealed a major flaw in Linux…
Cybersecurity Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial
This article details methods for debugging packaged Electron applications, including main/renderer process debugging techniques, ASAR file extraction and modification, debugging tool installation, and solutions for common issues like WebSockets request errors, ideal for Electron developers troubleshooting applications. Even after an Electron application has been packaged and distributed, it’s still possible to debug it using various…