APT::WTF - APTortellini's blog
The Collective
  • Feb 10, 2022

    🇬🇧 Gaining the upper hand(le)

    Author: last 

    Hunting for privilege escalations and UAC bypasses by looking for leaked handles in unprivileged processes

  • Feb 10, 2022

    🇮🇹 Gaining the upper hand(le)

    Author: last 

    Come trovare privilege escalation e bypass di UAC tramite leak di handle privilegiati

  • Jan 20, 2022

    🇬🇧 The ace(r) up your sleeve!

    Author: last 

    Privilege Escalation vulnerability in Acer Care Center (CVE-2021-45975)

  • Jan 20, 2022

    🇮🇹 The ace(r) up your sleeve!

    Author: last 

    Vulnerabilità Privilege Escalation nel software Acer Care Center (CVE-2021-45975)

  • Nov 25, 2021

    🇬🇧 Carrying the Tortellini's golf sticks

    Author: Her0_IT knifesec 

    Using Caddy to spin up fast and reliable C2 redirectors.

  • Oct 27, 2021

    🇬🇧 Tortellini in Brodobuf

    Author: Oblio MrSaighnal 

    How serializing data using Google’s Protobuf is not protecting your web app.

  • Sep 24, 2021

    🇬🇧 Stealing weapons from the Armoury

    Author: last 

    Root cause analysis of a privilege escalation vulnerability in ASUS ROG Armoury Crate Lite Service v4.2.8 (CVE-2021-40981)

  • Sep 24, 2021

    🇮🇹 Stealing weapons from the Armoury

    Author: last 

    Analisi della privilege escalation in ASUS ROG Armoury Crate Lite Service v4.2.8 (CVE-2021-40981)

  • Aug 21, 2021

    🇬🇧 The dying knight in the shiny armour

    Author: last 

    Killing Defender through NT symbolic links redirection while keeping it unbothered

  • Nov 16, 2020

    🇬🇧 Taking a detour inside LSASS

    Author: last 

    Extracting local hashes by hooking functions inside LSASS

Subscribe

  • Advanced Persistent Tortellini

Home of the Advanced Persistent Tortellini - aka APTortellini, an Italian collective of hackers publishing technical research regarding offensive security.