Security Blog

Vulnerability analyses, exploit deep dives, and research notes on web, Android, and Windows security.

2 posts

BlueHammer: Fixing the Bugs in a Windows Zero-Day LPE PoC

Deep dive into BlueHammer — a Windows local privilege escalation exploit that chains Windows Defender RPC abuse, Volume Shadow Copy Service, opportunistic locks and SAM offline parsing to reach SYSTEM without any kernel bug or memory corruption. Full root-cause analysis, broken code walkthrough, and fixes.

Dirty Stream: Weaponizing Android's ContentProvider — CVE-2024-35205

A technical deep dive into CVE-2024-35205 — how a rogue FileProvider turns Android's inter-app file sharing into an arbitrary write primitive. Covers vulnerability background, PoC dissection, full attack chain analysis, detection strategies, and mitigations.