We identified three independent remote code execution (RCE) vulnerabilities in the popular Counter-Strike: Global Offensive game. Each vulnerability can be triggered when the game client connects to our malicious python CS:GO server. This post details our journey through the CS:GO binary and conducts a technical deep dive into various identified bugs. We conclude by presenting a proof of concept (POC) exploit that leverages four different logic bugs into remote code execution in the game’s client, triggered when a client connects to the server.
Our team of experienced pentesters with strong CTF backgrounds will approach every scenario with a true hacker mindset.
Keep your systems secure with our experienced pentesting team. Our offensive experts use state-of-the-art tools and thorough analysis to assess your systems' security. Thinking outside the box, we help you to efficiently find and remediate vulnerabilities.
- Web Application Pentesting
- Fat/Thin Client Security Testing
- Red Teaming / TIBER
For evaluating your company's security, our teams comprise experts with complementary skills ranging from reviewing source code to analysing corporate environments. We provide an extensive report detailing the vulnerabilities and recommendations to avoid these and similar issues in the future.
- Network Vulnerability Reporting
- Active Directory Assessments
- Source Code Security Reviews
For high-level solutions custom-made for your security needs, we offer security consulting services tailored to your demands. We analyse your organization's risk profile, compile recommendations for a security architecture and develop plans on how to improve your company's IT security permanently.
- Security Concept Reviews
- EDR Product Evaluation
- Cyber Risk Assessments
“The collaboration with Neodyme is always professional and uncomplicated. We appreciate the fast communication channels and efficient processes. The employees are competent and distinguish themselves through high creativity. Here you also think outside the box!”
Find more content
in our Blog
Our blog features posts from the world of cybersecurity, reverse engineering, research projects, solana and other blockchains, cryptography, and much more. If you're a developer, a security professional, or just an interested person, we are sure you will find something exciting to read! Here are some of our favorite posts to get you started!
The sensor uses TLS-PSK over USB. We overwrite the PSK and are able to read images.
We recently discovered a critical bug in the token-lending contract of the Solana Program Library (SPL). This blog post details our journey from discovery, through exploitation and coordinated disclosure, and finally the fix. The total TVL at risk was about 2.600.000.000 USD. Some low-value coins are not economically viable to steal, but the potential profit was easily in the hundreds of millions. The bug was fixed, and dapps updated promptly to close the vulnerability.
This blog post is about a MacOS LPE chain I wrote and reported back in February. It features three logic bugs to go from user to root with System Integrity Protection (SIP) bypass to kernel. Since I’m not exploiting any memory corruptions or other vulnerabilities that aren’t 100% deterministic, this chain is fully reliable which I think is cool ;). It runs on MacOS < 10.15.5