<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://incendium.rocks/</id><title>Remco van der Meer</title><subtitle>Security blog of Remco van der Meer</subtitle> <updated>2025-12-28T20:51:00+01:00</updated> <author> <name>Remco van der Meer</name> <uri>https://incendium.rocks/</uri> </author><link rel="self" type="application/atom+xml" href="https://incendium.rocks/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://incendium.rocks/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 Remco van der Meer </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Remotely crashing the Spooler service</title><link href="https://incendium.rocks/posts/Remotely-crashing-spooler/" rel="alternate" type="text/html" title="Remotely crashing the Spooler service" /><published>2025-11-19T04:33:00+01:00</published> <updated>2025-11-19T20:03:38+01:00</updated> <id>https://incendium.rocks/posts/Remotely-crashing-spooler/</id> <content type="text/html" src="https://incendium.rocks/posts/Remotely-crashing-spooler/" /> <author> <name>remco</name> </author> <category term="Research" /> <category term="Windows" /> <category term="Exploit" /> <summary>Showcasing a vulnerability in Windows that causes the Spooler service to crash remotely.</summary> </entry> <entry><title>Deleting the BCD through COM as low privileged user (external)</title><link href="https://incendium.rocks/posts/CVE-2025-59253/" rel="alternate" type="text/html" title="Deleting the BCD through COM as low privileged user (external)" /><published>2025-11-15T04:33:00+01:00</published> <updated>2025-11-27T21:26:26+01:00</updated> <id>https://incendium.rocks/posts/CVE-2025-59253/</id> <content type="text/html" src="https://incendium.rocks/posts/CVE-2025-59253/" /> <author> <name>remco</name> </author> <category term="Research" /> <category term="Windows" /> <summary>CVE-2025-59253: Demonstrating a vulnerability in Windows that leads to a low privileged user being able to delete the boot configuration data (BCD) through COM.</summary> </entry> <entry><title>Automating COM/DCOM vulnerability research</title><link href="https://incendium.rocks/posts/Automating-COM-Vulnerability-Research/" rel="alternate" type="text/html" title="Automating COM/DCOM vulnerability research" /><published>2025-10-30T04:33:00+01:00</published> <updated>2025-10-30T04:33:00+01:00</updated> <id>https://incendium.rocks/posts/Automating-COM-Vulnerability-Research/</id> <content type="text/html" src="https://incendium.rocks/posts/Automating-COM-Vulnerability-Research/" /> <author> <name>remco</name> </author> <category term="Research" /> <category term="Windows" /> <summary>Diving into COM/DCOM and how to automate vulnerability research using a fuzzing approach.</summary> </entry> <entry><title>Exploit development for vulnerabilities in Windows over MS-RPC</title><link href="https://incendium.rocks/posts/Exploit-Development-For-MSRPC/" rel="alternate" type="text/html" title="Exploit development for vulnerabilities in Windows over MS-RPC" /><published>2025-07-31T05:33:00+02:00</published> <updated>2025-07-31T05:33:00+02:00</updated> <id>https://incendium.rocks/posts/Exploit-Development-For-MSRPC/</id> <content type="text/html" src="https://incendium.rocks/posts/Exploit-Development-For-MSRPC/" /> <author> <name>remco</name> </author> <category term="Research" /> <category term="Windows" /> <summary>Showcasing some different ways to craft exploits for vulnerabilities over MS-RPC</summary> </entry> <entry><title>Revisiting automating MS-RPC vulnerability research and releasing the tool</title><link href="https://incendium.rocks/posts/Revisiting-MS-RPC-Vulnerability-Research-automation/" rel="alternate" type="text/html" title="Revisiting automating MS-RPC vulnerability research and releasing the tool" /><published>2025-07-14T05:33:00+02:00</published> <updated>2025-07-14T05:33:00+02:00</updated> <id>https://incendium.rocks/posts/Revisiting-MS-RPC-Vulnerability-Research-automation/</id> <content type="text/html" src="https://incendium.rocks/posts/Revisiting-MS-RPC-Vulnerability-Research-automation/" /> <author> <name>remco</name> </author> <category term="Research" /> <category term="Windows" /> <summary>Partially solving the problem for procedures that need valid complex parameter types to fuzz, and open sourcing the tool</summary> </entry> </feed>
