EXPMON (@expmon_) 's Twitter Profile
EXPMON

@expmon_

Advanced sandbox-based system specifically designed and built for detecting file-based zero-day and hard-to-detect exploits. By @HaifeiLi.

ID: 1431684298705408001

linkhttps://pub.expmon.com calendar_today28-08-2021 18:28:44

53 Tweet

1,1K Followers

67 Following

EXPMON (@expmon_) 's Twitter Profile Photo

Well, this EXPMON submission is kinda interesting.. On Saturday, someone submitted a PDF sample that triggered a crash in Foxit Reader. EXPMON reported it as "potential zero-day attack". pub.expmon.com/analysis/14835… My manual analysis showed that this PDF indeed crashed the

Well, this EXPMON submission is kinda interesting..

On Saturday, someone submitted a PDF sample that triggered a crash in Foxit Reader. EXPMON reported it as "potential zero-day attack".

pub.expmon.com/analysis/14835…

My manual analysis showed that this PDF indeed crashed the
EXPMON (@expmon_) 's Twitter Profile Photo

Recently, two submitted PDF exploit samples were successfully detected by EXPMON's "detection-in-depth" feature! pub.expmon.com/analysis/13792… pub.expmon.com/analysis/14858… They're Adobe Reader exploits for CVE-2023-21608, based on the release at github.com/hacksysteam/CV…. #expmon

Recently, two submitted PDF exploit samples were successfully detected by EXPMON's "detection-in-depth" feature!

pub.expmon.com/analysis/13792…
pub.expmon.com/analysis/14858…

They're Adobe Reader exploits for CVE-2023-21608, based on the release at github.com/hacksysteam/CV….

#expmon
EXPMON (@expmon_) 's Twitter Profile Photo

Hey, if you're attending GovWare in Singapore 🇸🇬, be sure to check out booth L23 where EXPMON will be showcased! linkedin.com/posts/dennis-t…

EXPMON (@expmon_) 's Twitter Profile Photo

EXPMON System has been updated to v20241012! This is just for some small adjustments in the Detection Logic, for Microsoft Word and PDF exploit detection. pub.expmon.com

EXPMON (@expmon_) 's Twitter Profile Photo

EXPMON System has been updated to v20241103! This update brought enhanced detections against potential malicious PDF samples (including zero-day attacks) leaking local information. pub.expmon.com

Haifei Li (@haifeili) 's Twitter Profile Photo

Regarding my EXPMON project, well, I haven't touched it for months as busy on personal & the Office fuzzing project, I *might* need to take a look soon.. In fact, in Q4 EXPMON actually detected a "small risk" PDF sample which allows to leak local NTLM info to remote servers

EXPMON (@expmon_) 's Twitter Profile Photo

In December, there was a sample uploaded to EXPMON Public (pub.expmon.com/analysis/18899…). I just took some night time analyzing it manually and found that it's likely to be a WPS Office (previous) zero-day sample discussed at welivesecurity.com/en/eset-resear…. Please note that the public

EXPMON (@expmon_) 's Twitter Profile Photo

I've released the details of this x.com/HaifeiLi/statu…. Enjoy! Blog post: EXPMON detected "zero-day behavior" in PDF samples that leak local (net)NTLM information justhaifei1.blogspot.com/2025/01/expmon… #expmon #zeroday #0day #pdf #threatintel #threatdetection

Haifei Li (@haifeili) 's Twitter Profile Photo

This.. If you're worrying about email-based exploits targeting Outlook (including 0-click zero-days!), you probably want to try EXPMON , where I've put all my knowledge about Outlook exploitations there. :) #justsaying x.com/scriptjunkie1/…

EXPMON (@expmon_) 's Twitter Profile Photo

After the discovery of the PDF NTLM leaking "zero-day behavior", EXPMON Public has just identified a new one, which I just did a quick analysis on and found that it's indeed new and different from the previous one. Check out the following submissions: pub.expmon.com/analysis/19859…

After the discovery of the PDF NTLM leaking "zero-day behavior", EXPMON Public has just identified a new one, which I just did a quick analysis on and found that it's indeed new and different from the previous one.

Check out the following submissions:
pub.expmon.com/analysis/19859…
EXPMON (@expmon_) 's Twitter Profile Photo

I just noticed the PoC for this fresh critical Outlook/RTF bug (x.com/HaifeiLi/statu…) was shared at github.com/ynwarcs/CVE-20…, so I uploaded it to EXPMON and EXPMON successfully detected it as potential zero-day! Check it out: pub.expmon.com/analysis/20362…

I just noticed the PoC for this fresh critical Outlook/RTF bug (x.com/HaifeiLi/statu…) was shared at github.com/ynwarcs/CVE-20…, so I uploaded it to EXPMON and EXPMON successfully detected it as potential zero-day!

Check it out: pub.expmon.com/analysis/20362…
EXPMON (@expmon_) 's Twitter Profile Photo

Thanks. The other platforms have their focuses. Note that EXPMON is a great addition to existing security solutions, especially for those who have concerns about truly advanced zero-day attacks, as it uniquely "looks at things" from an exploit/vulnerability perspective (not a

Haifei Li (@haifeili) 's Twitter Profile Photo

More: well, I don't know the details, but at this moment I can give my quick advice from defense perspective for folks who worry about potential Office (zero-day) exploits, based on my experiences on Office security. 1. Make sure Office Protected View "always on" - this is very

Haifei Li (@haifeili) 's Twitter Profile Photo

There's another Office "intentional crash" detected by EXPMON (background for the 1st one: linkedin.com/posts/haifeili…), it's a bit different (as I just quickly analyzed) but I'd like to leave it to anyone who is interested in investigating. :) pub.expmon.com/analysis/25422…

EXPMON (@expmon_) 's Twitter Profile Photo

Another day, another "intentional crash" Office sample. Online detection: pub.expmon.com/analysis/26539… Background: x.com/HaifeiLi/statu…

Haifei Li (@haifeili) 's Twitter Profile Photo

For the background, EXPMON is on the mission to analyze tons of public & some very outdated Office/PDF samples, from a deep vulnerability/exploit perspective. Who knows what I will find?:) If you also have a lot of emails/Office/PDF samples to analyze & can be publicly shared,

EXPMON (@expmon_) 's Twitter Profile Photo

Finally I'm doing a maintenance on the EXPMON Public server, disabling the website access now, will update when it's back.

Haifei Li (@haifeili) 's Twitter Profile Photo

It's back! pub.expmon.com More than 150,000 samples were analyzed during this routine, and I will do a deeper BDA (Big Data Analytics) later. For those unfamiliar with the EXPMON approach (check it out here: pub.expmon.com/static/pdf/exp…), the BDA process is crucial for