Security Research

Deep Threat Modeling &
Defensive Architecture

Original security research focusing on Active Directory attack surfaces, GPO exploitation paths, Linux kernel vulnerabilities, detection engineering, and defense-in-depth hardening frameworks. Blue Team perspective on emerging threat models with DSC configurations, SACL auditing, page cache exploitation, and SIEM detection rules.

Threat Modeling Blue Team AD Research Detection Eng Hardening Kernel Exploit
Research Stats
2
Papers
5
Logic Flaws
3
Attack Vectors
9
DSC Resources
About
QA210
QA210
10th Grade • Vietnam

High school student from Vietnam passionate about offensive security, binary exploitation, and Active Directory attacks. Member of W4LLZ CTF team.

“Nothing is secure, everything has bugs, and humans are the biggest vulnerability.”
Research Topics
GPO Abuse Kernel Exploit Page Cache SYSVOL SACL Auditing LPE rxgk COW Bypass DSC Hardening SIEM Detection LOLBin Scheduled Tasks KQL Sigma Rules Registry.xml MITRE ATT&CK Defensive Architecture Blue Team Credential Guard PowerShell Logging DFS-R
Research Areas
GPO Preference Exploitation 1 paper
Linux Kernel LPE 1 paper
Page Cache Vulnerabilities 1 paper
State-Injection Attacks 1 paper
Detection Engineering 1 paper
DSC Hardening Frameworks 1 paper
SIEM Rule Development 1 paper
Active Directory Security 1 paper
~40%
Enterprises Vulnerable
0
Perimeter Tools Detect
~85%
Detection Gap (4702)
Filter:
Linux Kernel Exploitation
Kernel Research LPE Critical

DirtyDecrypt / DirtyCBC — CVE-2026-31635

Local privilege escalation to root via rxgk_decrypt_skb — a missing COW guard vulnerability in the Linux kernel rxgk module that allows bypassing Copy-On-Write protection and writing directly into the page cache. This research analyzes the root cause, a 5-step exploit chain from unprivileged user to root shell, comparison with the Page Cache vulnerability family (Copy Fail, Dirty Frag, Fragnesia), disclosure timeline, mitigation, and a Red Team perspective. Affected distros: Fedora, Arch Linux, openSUSE. Public PoC available, no in-the-wild exploitation recorded yet.

GPO Preference Exploitation
GPO Research Blue Team Critical

ShadowPolicy — GPO Preference State-Injection

Advanced detection and auditing framework for the ShadowPolicy threat model: exploiting GPO Preference Scheduled Task XML injection via SYSVOL state modification in Windows Server 2022 / Active Directory environments. Covers the complete attack chain from GPO Editor access to SYSTEM-level RCE across the entire domain, four critical logic flaws in GPO Preference design, alternative execution vectors (ScheduledTasks.xml + Registry.xml), and a full defensive architecture built on PowerShell DSC hardening, SACL auditing, integrity monitoring, and SIEM detection rules (KQL + Sigma).