Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Automating COM/DCOM vulnerability research

published on 2025-10-30 20:24:07 UTC by /u/TangeloPublic9554
Content:

COM (Component Object Model) and DCOM (Distrubuted COM) have been interesting components in Windows from a security perspective for many years. In the past, COM has been a target for many purposes. Not only have many vulnerabilities been discovered in COM, but it is also used for lateral movement or bypassing techniques.

This white paper describes how COM/DCOM works and what complications it has. In the next chapters, the white paper will describe how security research can be automated using the fuzzing approach. Since this approach comes with some problems, it describes how these problems were overcome (at least partially).

submitted by /u/TangeloPublic9554
[link] [comments]
Article: Automating COM/DCOM vulnerability research - published about 18 hours ago.

https://www.reddit.com/r/netsec/comments/1okanf4/automating_comdcom_vulnerability_research/   
Published: 2025 10 30 20:24:07
Received: 2025 10 30 20:40:14
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Views: 5

Custom HTML Block

Click to Open Code Editor