<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Posts on bigbingus.com</title><link>https://bigbingus.com/posts/</link><description>Recent content in Posts on bigbingus.com</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 13 May 2026 00:00:00 -0500</lastBuildDate><atom:link href="https://bigbingus.com/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>Stop Being Weird — Life After Call Stack Spoofing Under CET</title><link>https://bigbingus.com/posts/stop-being-weird/</link><pubDate>Wed, 13 May 2026 00:00:00 -0500</pubDate><guid>https://bigbingus.com/posts/stop-being-weird/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>For the past few weeks I&amp;rsquo;ve been experimenting with Control Flow Enforcement Technology (CET) mitigations and Elastic&amp;rsquo;s call stack spoofing detections. Specifically their &lt;a href="https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/windows/defense_evasion_api_call_via_jump_rop_gadget.toml">API Call via Jump ROP Gadget&lt;/a>, &lt;a href="https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/windows/defense_evasion_stack_spoofing_via_rop_gadget_for_dll_load.toml">Stack Spoofing via ROP Gadget for Dll Load&lt;/a> and &lt;a href="https://github.com/elastic/protections-artifacts/blob/main/behavior/rules/windows/defense_evasion_stack_spoofing_via_rop_gadget_for_memory_api.toml">Stack Spoofing via ROP Gadget for Memory API&lt;/a> rules and I wanted to share my understanding of the current situation and a potential way forward.&lt;/p>
&lt;p>&lt;em>Code: &lt;a href="https://github.com/Sizeable-Bingus/MassDriver">github.com/Sizeable-Bingus/MassDriver&lt;/a>&lt;/em>&lt;/p>
&lt;p>&lt;em>There are multiple ways of spoofing a call stack but I will be referring to what I see to be the most common which is gadget-based with synthetic frames.&lt;/em>&lt;/p></description></item></channel></rss>