Skip to content
Home » Uncategorized

Uncategorized

Impact Assessment: How Guest Access Affects Threat Detection in Office 365

Currently working on a deep-dive into a critical Teams guest access behaviour I discovered during testing.
My research shows how attackers can spin up fresh M365 tenants and completely bypass Defender protections by pulling users into external guests.
I’m documenting the attack flow, detection queries, and practical steps organisations can take to reduce exposure — learning a lot along the way.

#CyberSecurity #LearningInPublic #ThreatResearch #RedTeam #BlueTeam #Microsoft365 #Defender #SecurityCommunity

Abusing Sudo’s chroot: CVE-2025-32463 Explained

CVE-2025-32463 – Local Privilege Escalation via Sudo’s chroot Option
I recently explored a vulnerability in Sudo that allows unprivileged users to escalate to root by abusing the rarely used -R (chroot) feature and manipulating nsswitch.conf. Tested on Parrot OS, this PoC demonstrates how easy it is to gain root shell access when Sudo < 1.9.17p1 is installed. If you're running Linux, patch immediately or compile Sudo from source to version 1.9.17p1 or later. Stay safe, patch early. #CyberSecurity #Linux #CVE2025 #PrivilegeEscalation #InfoSec #ExploitDevelopment #Sudo #BlueTeam #RedTeam #ParrotOS #ThreatHunting #VulnerabilityResearch

Hello world!

Welcome to A WP Life Demo Website Network. This is your first post. Edit or delete it, then start blogging!