{"id":9875,"date":"2013-03-15T17:57:45","date_gmt":"2013-03-15T16:57:45","guid":{"rendered":"https:\/\/www.corelan.be\/?p=9875"},"modified":"2013-03-15T17:57:45","modified_gmt":"2013-03-15T16:57:45","slug":"blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/","title":{"rendered":"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless"},"content":{"rendered":"<p><a href=\"http:\/\/blackhat.com\/eu-13\/briefings.html#JWilliams\">Jake Williams<\/a> (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some good time looking at Cloud synchronization services and is presenting some findings in this talks.<\/p>\n<p>First of all, think of Dropbox (or any similar tools) as a C&amp;C botnet channel by design. \u00a0The talk is not just about Dropbox, but most of the other tools appeared to be easier to break. \u00a0 Cloud sync services will take just any file placed in a synced folder and sync it to any other device that is connected to the service with that account, using the cloud as the central platform. \u00a0Infecting files destined for a backup site would be interesting too, Jake says.<\/p>\n<p>Dropbox has a history of security issues. \u00a0In 2011, researchers detected a horrible \"free beer\" authentication issue, allowing anyone to log in without a password. \u00a0 Some people also discovered that mobile file metadata could be retrieved in the clear. \u00a0Frank McClain and Derek Newton reversed the Dropbox database format and published the details, triggering the Dropbox devs to change the format. \u00a0In 2012, Ruff and Ledoux reverse engineered the software, build their own python interpreter to analyze the internal security\u2026 \u00a0triggering the Dropbox devs to continue to play the \"cat and mouse game\" and change logic again. \u00a0In short, Dropbox has been broken numerous times. \u00a0Again, Jake explains that he doesn't want to pick on Dropbox. \u00a0The current version of Dropbox sets the standard for similar tools and other similar tools might still contain the same issues that were fixed in Dropbox already.<\/p>\n<p>One of Jakes clients requested a \"no holds barred\" pen test, allowing him to simulate an APT attack. \u00a0 He looked at web portals, checked patch levels on internet facing services, tried social engineering tricks, but wasn't particularly successfull at that. \u00a0Spam-based attacks didn't work (but Jake still continued to use the technique, just in case he got lucky at a certain point in time). Browser based XSS-type-of-exploits didn't work either, so it was time for plan B.<\/p>\n<p>Jake found a way to get the CIO's personal email address via Facebook, by \"'attacking\" his kids. \u00a0Jake sent him a spear phishing email, asking some question about the fundraising project he's involved with (based on Facebook data) which eventually lead to owning his work laptop. \u00a0While looking at what he could find on the laptop, Jake discovered that a lot of corporate data were stored on the laptop, and synchronized into the cloud using Dropbox. \u00a0 Using this laptop, it is possible to send a file to any device used by the CIO. \u00a0 The ultimate goal would be to have a running implant, providing a reverse shell from inside the corporate network.<\/p>\n<p>So, what if the CIO is using Dropbox on the corporate machine\/desktop (behind the firewall) too? We already know he has corporate data on his laptop, synced via Dropbox. So far so good, but a standard reverse shell might be blocked by the firewall. Perhaps it would be possible to use the Dropbox C&amp;C channel as a reverse comm channel.<\/p>\n<h3>DropSmack<\/h3>\n<p>That's how DropSmack was born, which is a new PoC malware designed to use file sync services to provide a C&amp;C comm channel. \u00a0It's not realtime, but thanks to improvements made by Dropbox, syncing is become faster. The idea is that, by using a reverse shell on the home laptop, and using DropSmack, it would be possible to exfiltrate data and communicate with the malware on the corporate computer, simply using the fact that Dropbox will sync anything.<\/p>\n<p>Jake says that DropSmack is slow and ugly and can probably be improved, but it works just fine from a PoC point of view.\u00a0DropSmack contains the following basic commands:<\/p>\n<ul>\n<li>PUT<\/li>\n<li>GET<\/li>\n<li>DELETE<\/li>\n<li>EXECUTE<\/li>\n<li>SLEEP<\/li>\n<li>MOVE<\/li>\n<\/ul>\n<div>To get a command to execute, create a text file that contains the command and copy it into the Dropbox folder. \u00a0DropSmack will detect the new file, execute the command, and remove the file again. \u00a0 Dropbox will show a popup when a new file is added or deleted, but this popup disappears automatically. In general, pick \"smart\" names when exfiltrating\/injecting new files, because dropbox will show the filename to the end user.<\/div>\n<p>To install DropSmack:<\/p>\n<ol>\n<li>Embed it in a file that is already synced<\/li>\n<li>Add some macro goodness \u00a0(msfencode with vbs payload works well)<\/li>\n<li>Load the file back to the machine you can access<\/li>\n<li>File automatically syncs<\/li>\n<li>Wait until the user opens the file\u2026.<\/li>\n<\/ol>\n<p>Waiting until the user opens the file is not\u2026 ideal. \u00a0But since the user probably created the original file himself, it might be trivial to use a social engineering trick to get him to open \"his own\" file.<\/p>\n<h3>Detecting DropSmack<\/h3>\n<ul>\n<li>Traditional IDS systems won't work. Dropbox uses SSL encryption.<\/li>\n<li>Firewalls mostly won't work either.<\/li>\n<li>Antivirus\u2026 can be fooled as well.<\/li>\n<li>Most DLP Software doesn't care either<\/li>\n<\/ul>\n<p>You may be able to detect DropSmack if you have an application whitelist policy, because it might alert\/prevent the execution of DropSmack applications\/processes. \u00a0On the other hand, there may be ways around this (powershell injection etc). \u00a0 In the end, it comes down to a black &amp; white decision on whether to allow sync services such as Dropbox.<\/p>\n<p>All of the detection methods are focused on finding illicit synchronisation software installations. \u00a0If you allow the software, you also allow the communication channel, which means it can be abused, by design. \u00a0To further detect installations, you could:<\/p>\n<ul>\n<li>Look for traces of the Dropbox LanSync protocol (TCP\/UDP 17500).<\/li>\n<li>Look for DNS requests to servers related to sync services (might be a bit painful)<\/li>\n<li>Block access to Amazon SE (which is used by the Dropbox back-end)\u2026 but breaks other stuff<\/li>\n<li>Scan user profile directories for illicit installations. \u00a0The reason these apps are installed in the profile folder is because this doesn't trigger the UAC prompt. In any case, this is probably the best way to detect the use of Dropbox.<\/li>\n<li>Check for DropBoxSync.exe (which is the DropSmack process)<\/li>\n<li>Check the \"deleted files\" log, because those should\/might indicate the creation\/deletion of DropSmack command files.<\/li>\n<li>Keep in mind that other people might have been using similar techniques to do this.<\/li>\n<li>Don't forget to agree on a policy with company management, communicate it, and take pro-active &amp; reactive measures to detect &amp; remove illicit installations if that is what management agrees with.<\/li>\n<li>If you HAVE to use a sync service, pick one that at least encrypts their local (sqlite) database.<\/li>\n<\/ul>\n<hr \/>\n<p>This concludes my coverage of BlackHat Europe 2013. \u00a0It was a great conference, and - as usual - the perfect opportunity to meet old friends and make new ones. \u00a0Hope to see you at another conference some time soon.<\/p>\n<p>Take care &amp; stay safe !<\/p>\n<p>Peter<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some good time looking at Cloud synchronization services and is presenting some findings in this talks. First of all, think of Dropbox (or any similar tools) as a &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[2681,2676,2583,261,67],"class_list":["post-9875","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-blackhat","tag-reverse-engineering","tag-malware","tag-corelan","tag-san"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some good time looking at Cloud synchronization services and is presenting some findings in this talks. First of all, think of Dropbox (or any similar tools) as a &hellip; Continue reading &quot;BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-15T16:57:45+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless\",\"datePublished\":\"2013-03-15T16:57:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/\"},\"wordCount\":1147,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"blackhat\",\"reverse engineering\",\"malware\",\"corelan\",\"san\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/\",\"name\":\"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2013-03-15T16:57:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackHatEU2013 &#8211; Day2 &#8211; DropSmack: How cloud synchronization services render your corporate firewall worthless\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/","og_locale":"en_US","og_type":"article","og_title":"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some good time looking at Cloud synchronization services and is presenting some findings in this talks. First of all, think of Dropbox (or any similar tools) as a &hellip; Continue reading \"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless\"","og_url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2013-03-15T16:57:45+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless","datePublished":"2013-03-15T16:57:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/"},"wordCount":1147,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["blackhat","reverse engineering","malware","corelan","san"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/","url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/","name":"BlackHatEU2013 - Day2 - DropSmack: How cloud synchronization services render your corporate firewall worthless - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2013-03-15T16:57:45+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-dropsmack-how-cloud-synchronization-services-render-your-corporate-firewall-worthless\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"BlackHatEU2013 &#8211; Day2 &#8211; DropSmack: How cloud synchronization services render your corporate firewall worthless"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":8859,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=9875"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9875\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=9875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=9875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=9875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}