Forrest Orr (@_forrestorr) 's Twitter Profile
Forrest Orr

@_forrestorr

Red Teamer, low level coding extremist and malware researcher. Windows exploit writer and bug hunter

ID: 908422622219825153

linkhttps://www.forrest-orr.net/ calendar_today14-09-2017 20:10:05

179 Tweet

4,4K Followers

526 Following

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

My personalized Windows 10 re-creation of the HYDSEVEN exploit chain used to target Coinbase. This chain involves the use of a Firefox RCE (CVE-2019-11707) and Firefox sandbox escape (CVE-2019-11708) for shellcode execution as Medium Integrity github.com/forrest-orr/Ex…

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

Thanks for bringing this to my attention Andrew, this would be a much more elegant way of filtering CLR JIT memory in Moneta.

waldoirc (@waldoirc) 's Twitter Profile Photo

Already released way earlier but I'm sharing on Twitter too just because. Blog post + poc on detecting malware through return addresses. Recommend also looking at the following made by thefLink github.com/thefLink/Hunt-… arashparsa.com/catching-a-mal…

maxpl0it (@maxpl0it) 's Twitter Profile Photo

Going to Blackhat USA this year? I’ll be teaching a 2-day training: Day 1 - Browser internals (Firefox and Chrome) Day 2 - Virtualisation Internals (VirtualBox and QEMU) Come learn from real source code and debug real world targets! blackhat.com/us-22/training…

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

Excellent work, I think you’ve found (what is at present) the most optimal fusion of stealth techniques for evasion in memory. It doesn’t get any more cutting edge than this when it comes to the memory dimension of malware design these days

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

Last summer I attended the Advanced Windows Heap Exploitation class given by ς๏гєɭคภς0๔3г ([email protected]) and cannot speak highly enough of his skill, dedication and enthusiasm for the topic. This is the training I recommend for learning memory corruption exploits. Truly one of a kind.

Connor McGarr (@33y0re) 's Twitter Profile Photo

Today I am releasing a blog about kernel exploitation in the age of HVCI. This post addresses calling arbitrary kernel-mode APIs, to go beyond “traditional token stealing” data-only attacks, while also dealing with kernel control flow integrity. connormcgarr.github.Io/hvci

Petar Jr. Pranic (@ipslav) 's Twitter Profile Photo

My first research and tool are finally out. If you want to deep dive into some CLR internals and understand how we can abuse it to blend-in within its own logic go check it out. Hope you'll enjoy the read. ipslav.github.io/2023-12-12-let…

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

Very well put together research that expands on some of the memory forensics articles I wrote several years ago, it’s excellent to see improvements are still being made to malware tradecraft in this niche

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

I’m surprised to have recently learned that there does not seem to be a trivial way to receive notifications of suspended process launches in Windows via kernel proc notif callback, kernel ETW or EtwTi. Any ideas on how to do this? Pavel Yosifovich

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

Is the ability of a non admin user to obtain a full query handle to a System integrity process and unravel its ASLR considered a security boundary? I know a PROCESS_QUERY_INFORMATION handle on a PPL is considered a breach of a security boundary even if the owner is local admin.

Forrest Orr (@_forrestorr) 's Twitter Profile Photo

Does anyone know what mechanisms can be used to detect suspended (non-UWP) and frozen UWP app processes, and how to programmatically wake them up in a safe and persistent way where they don't just immediately freeze again?