My name is Federico a.k.a. last, I’m an Italian security researcher and member of the Advanced Persistent Tortellini collective. I study and develop offensive software, hold a bunch of certs, enjoy lockpicking and acrobatic quadcopter crashing flying. I also play CTFs with my mates @ JBZ Team and I’m a huge fan of XKCD. If you want to have a look at the shitty code I write head to my GitHub profile. Other than that I don’t have much to showcase to be honest… ¯\_(ツ)_/¯

Certifications:

External blog posts:

CVEs:

  • CVE-2021-40981: privilege escalation I found in Asus ROG Armoury Crate. Blogpost here.
  • CVE-2021-45975: privilege escalation I found in Acer Care Center for Windows. Blogpost here.

Projects:

  • PersistenceSniper: Powershell script that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. The script is also available on Powershell Gallery.
  • RIPPL: C++ tool, forked from PPLDump which abuses a flaw in the way Windows manages PPL processes, allowing the operator to tamper, disrupt or, more generally, interact with PPL processes like EDRs, antimalware etc. The flaw has been patched with Windows 10 v21H2 Build 19044.1826.
  • unDefender: C++ tool which abuses a flaw in the way Windows loads Defender’s WDFilter.sys driver by redirecting a NT symbolic link in order to make Defender load an arbitrary driver. The full explanation of the technique is available here.
  • DefenderSwitch: C++ tool to disable Windows Defender by abusing MsMpEng.exe’s misconfigured ACL. The misconfiguration is now patched.
  • HppDLL: C++ DLL that can be injected into LSASS in order to dump local password hashes without touching the registry. The full explanation of the technique is available here.
  • Hybris: C++ tool to spawn arbitrary processes running as NT AUTHORITY\SYSTEM by abusing Winlogon’s token impersonation.
  • UpperHandler: C++ tool to automatically look for privileged handle leaks which may lead to privilege escalation vulnerabilities. The full explanation of the technique is available here. Not yet released.
  • GRIP: Go RIP Injection Program is a tool written in Go that can be used to inject fake routes in a RIPv2 network. The full explanation of the technique is available here.

Public talks:

You can find me at last AT notso DOT pro or on Twitter.