<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>mkiesel.ch</title><link>https://mkiesel.ch/</link><description>Manu&amp;#39;s personal, mostly infosec-related blog</description><language>en</language><lastBuildDate>Mon, 09 Feb 2026 00:00:00 +0000</lastBuildDate><item><title>Roll with Advantage: Hacking Lenovo Vantage</title><description>A technical deep dive into the lands of Lenovo Vantage and its add-ins, including tooling to help you hunt for vulnerabilities</description><link>https://mkiesel.ch/posts/lenovo-vantage/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/lenovo-vantage/</guid><pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/lenovo-vantage/preview_hu_3b398b9783d0be9a.jpg</image></item><item><title>Getting SYSTEM by Changing an IP Address</title><description>LPE in the Cordaware bestinformed Infoclient (CVE-2025-0425)</description><link>https://mkiesel.ch/posts/cordaware/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/cordaware/</guid><pubDate>Tue, 18 Feb 2025 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/cordaware/preview_hu_be1ebe445c764523.jpg</image></item><item><title>Swiss Tax Adventures 2: The N-Day and the Rabbit Hole</title><description>Tales from installing 16 Swiss tax applications</description><link>https://mkiesel.ch/posts/swiss-tax-adventures-2/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/swiss-tax-adventures-2/</guid><pubDate>Fri, 29 Nov 2024 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/swiss-tax-adventures-2/preview_hu_310d0e83bc5cc3b2.jpg</image></item><item><title>Swiss Tax Adventures 1: The Forbidden Jar of XXE</title><description>Discovering a mass XXE in Swiss tax applications (CVE-2024-8602)</description><link>https://mkiesel.ch/posts/swiss-tax-adventures-1/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/swiss-tax-adventures-1/</guid><pubDate>Sun, 20 Oct 2024 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/swiss-tax-adventures-1/preview_hu_10f0c6a78df2c024.jpg</image></item><item><title>Running mitmproxy on a Raspberry Pi</title><description>A guide on how to set up mitmproxy on a Raspberry Pi for LAN and Wi-Fi MitM</description><link>https://mkiesel.ch/posts/rpi-mitmproxy/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/rpi-mitmproxy/</guid><pubDate>Wed, 09 Oct 2024 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/rpi-mitmproxy/build_hu_1798ab4d9af30a7a.jpg</image></item><item><title>Persistence with VSCode Plugin backdoors</title><description>How to achieve persistence by backdooring installed VSCode plugins</description><link>https://mkiesel.ch/posts/vscode-plugin-persistence/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/vscode-plugin-persistence/</guid><pubDate>Sun, 30 Jun 2024 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/vscode-plugin-persistence/plugin_persistence_preview_hu_2f08673a7be11704.jpg</image></item><item><title>Instrumentalizing Electron: Proxy Injection</title><description>How to force Electron applications into using your HTTP proxy</description><link>https://mkiesel.ch/posts/electron-proxy-injection/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/electron-proxy-injection/</guid><pubDate>Thu, 29 Feb 2024 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/electron-proxy-injection/appjs_preview_hu_84851e18aed33877.jpg</image></item><item><title>Exfiltrating Data Like It&amp;#39;s 1995</title><description>Bypassing USB poilicies using WebSerial and microcontrollers</description><link>https://mkiesel.ch/posts/comfiltrat0r/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/comfiltrat0r/</guid><pubDate>Wed, 25 Oct 2023 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/comfiltrat0r/comfiltrat0r_logo_preview_hu_d3c305ccd37be4b3.jpg</image></item><item><title>D-Link DNR-322L: Authenticated RCE</title><description>How I gained RCE on a DVR by uploading a malicious backup (CVE-2022-40799)</description><link>https://mkiesel.ch/posts/dlink-dnr322/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/dlink-dnr322/</guid><pubDate>Tue, 27 Sep 2022 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/dlink-dnr322/dnr322_preview_hu_5715de3c0c41b841.jpg</image></item><item><title>UART, uBoot, u root</title><description>Getting a root shell on the D-Link DCS-5222 by manipulating uBoot parameters via UART</description><link>https://mkiesel.ch/posts/dlink-dcs5222/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/dlink-dcs5222/</guid><pubDate>Tue, 23 Aug 2022 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/dlink-dcs5222/dcs5222_preview_hu_d0765e00993a2474.jpg</image></item><item><title>Abusing User Habits with Evil Bookmarks</title><description>Replacing bookmarks post-exploit for fun and profit</description><link>https://mkiesel.ch/posts/evilbookmark/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/evilbookmark/</guid><pubDate>Sun, 23 Jan 2022 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/evilbookmark/evilbookmark_preview_hu_2555e0d9c869caad.jpg</image></item><item><title>A Poor Attempt at Hacking My Toothbrush</title><description>Investigating possible planned obsolescence in my toothbrush</description><link>https://mkiesel.ch/posts/toothbrush/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/toothbrush/</guid><pubDate>Sat, 04 Sep 2021 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/toothbrush/tb_preview_hu_d998e20caa00e5d6.jpg</image></item><item><title>Post-Exploit Phishing with PowerShell</title><description>Using PowerShell to make post-exploit phishing forms</description><link>https://mkiesel.ch/posts/powerphish/</link><author>@rtfmkiesel</author><guid>https://mkiesel.ch/posts/powerphish/</guid><pubDate>Sun, 01 Aug 2021 00:00:00 +0000</pubDate><image>https://mkiesel.ch/posts/powerphish/powerphish_preview_hu_115c703862381985.jpg</image></item></channel></rss>