😈 [ HackAndDo, Pixis ]
Here we go, new articles are ready on a brand new and exciting topic, smart contracts security! ⛓️
⏩To get things off to a good start, here's the first article, Blockchain 101.
Happy reading!
🔗 https://en.hackndo.com/blockchain/
🐥 [ tweet ]
Here we go, new articles are ready on a brand new and exciting topic, smart contracts security! ⛓️
⏩To get things off to a good start, here's the first article, Blockchain 101.
Happy reading!
🔗 https://en.hackndo.com/blockchain/
🐥 [ tweet ]
не сильно увлекаюсь блокчейнами, но почитать можно раз от увОжаемого автора🔥4👍2
😈 [ sensepost, Orange Cyberdefense's SensePost Team ]
Read how you can JOIN @steampipeio on @pdiscoveryio to get structured output in your reconnaissance / footprinting / bugbounty data in this experimental steampipe plugin by @leonjza!
Code here:
🔗 https://sensepost.com/blog/2023/select-from-projectdiscovery-join-steampipe/
🔗 https://github.com/sensepost/steampipe-plugin-projectdiscovery
🐥 [ tweet ]
Read how you can JOIN @steampipeio on @pdiscoveryio to get structured output in your reconnaissance / footprinting / bugbounty data in this experimental steampipe plugin by @leonjza!
Code here:
🔗 https://sensepost.com/blog/2023/select-from-projectdiscovery-join-steampipe/
🔗 https://github.com/sensepost/steampipe-plugin-projectdiscovery
🐥 [ tweet ]
🔥2👍1
😈 [ Octoberfest73, Octoberfest7 ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
🔗 https://github.com/Octoberfest7/TeamsPhisher
🐥 [ tweet ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
🔗 https://github.com/Octoberfest7/TeamsPhisher
🐥 [ tweet ]
🔥3😁1
😈 [ SEKTOR7net, SEKTOR7 Institute ]
A guide to building your engagement infrastructure, by André Tschapeller (@hipstertrojan)
#redteam
🔗 https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/
🐥 [ tweet ]
A guide to building your engagement infrastructure, by André Tschapeller (@hipstertrojan)
#redteam
🔗 https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/
🐥 [ tweet ]
🔥1
😈 [ rayanlecat, Rayan Bouyaiche ]
Hello everyone ! This weekend I participated to @_leHACK_ where i could do the CrackMapExec workshop of @mpgn_x64 . I did a little writeup if you're interested
🔗 https://rayanlecat.ghost.io/write-up-workshop-cme-lehack-2023/
🐥 [ tweet ]
Hello everyone ! This weekend I participated to @_leHACK_ where i could do the CrackMapExec workshop of @mpgn_x64 . I did a little writeup if you're interested
🔗 https://rayanlecat.ghost.io/write-up-workshop-cme-lehack-2023/
🐥 [ tweet ]
🔥6
😈 [ eversinc33, eversinc33 ]
I was tired of manually creating wordlists or having to rely on python for pre2k sprays, so did some small adjustments to @dafthack's DomainPasswordSpray to run pre2k password spraying on all computer objects of a domain.
🔗 https://github.com/eversinc33/Invoke-Pre2kSpray
🐥 [ tweet ]
I was tired of manually creating wordlists or having to rely on python for pre2k sprays, so did some small adjustments to @dafthack's DomainPasswordSpray to run pre2k password spraying on all computer objects of a domain.
🔗 https://github.com/eversinc33/Invoke-Pre2kSpray
🐥 [ tweet ]
👍3
😈 [ EricaZelic, typedef struct _MALCOM { ]
Finally has some time to put the LDAP queries tweet in a blog post. Added some brief denoscriptions, how to enumerate nested group membership and members of Protected Users group.
🔗 https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations
🐥 [ tweet ]
Finally has some time to put the LDAP queries tweet in a blog post. Added some brief denoscriptions, how to enumerate nested group membership and members of Protected Users group.
🔗 https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations
🐥 [ tweet ]
🔥1
😈 [ cnotin, Clément Notin ]
📄 "How to read Windows serialized certificates"
Sharing a code sample to read binary files in "%APPDATA%\Microsoft\SystemCertificates\My\Certificates", which are serialized certificates, using CryptQueryObject() (and more!)
🔗 https://medium.com/tenable-techblog/code-for-reading-windows-serialized-certificates-8634d3487ec7
🐥 [ tweet ]
📄 "How to read Windows serialized certificates"
Sharing a code sample to read binary files in "%APPDATA%\Microsoft\SystemCertificates\My\Certificates", which are serialized certificates, using CryptQueryObject() (and more!)
🔗 https://medium.com/tenable-techblog/code-for-reading-windows-serialized-certificates-8634d3487ec7
🐥 [ tweet ]
🔥1
😈 [ 0x6d69636b, Michael Schneider ]
My colleague @m8r1us has written an article about hardware keyloggers:
🔗 https://www.scip.ch/en/?labs.20230706
🐥 [ tweet ]
My colleague @m8r1us has written an article about hardware keyloggers:
🔗 https://www.scip.ch/en/?labs.20230706
🐥 [ tweet ]
🔥1
😈 [ vxunderground, vx-underground ]
The classic Russian "Hacker" magazine had some of the coolest artwork in the 90s
🐥 [ tweet ]
The classic Russian "Hacker" magazine had some of the coolest artwork in the 90s
🐥 [ tweet ]
true🔥10👍1
😈 [ ShitSecure, S3cur3Th1sSh1t ]
After holding the talks at @x33fcon
and @WEareTROOPERS
done, I also finally managed to write down my latest research about userland hook evasion:
🔗 https://s3cur3th1ssh1t.github.io/Cat_Mouse_or_Chess/
🐥 [ tweet ]
After holding the talks at @x33fcon
and @WEareTROOPERS
done, I also finally managed to write down my latest research about userland hook evasion:
🔗 https://s3cur3th1ssh1t.github.io/Cat_Mouse_or_Chess/
🐥 [ tweet ]
🔥3
😈 [ Gi7w0rm, Gi7w0rm ]
Just released a new #blogpost, where I analyze the initial stages of a #vbs / #powershell based #GuLoader / #CloudEye infection.
Shoutout to @malware_traffic for being the first to find this sample (which I noticed after analyzing it myself ^^).
1/2
🔗 https://gi7w0rm.medium.com/cloudeye-from-lnk-to-shellcode-4b5f1d6d877
🐥 [ tweet ]
Just released a new #blogpost, where I analyze the initial stages of a #vbs / #powershell based #GuLoader / #CloudEye infection.
Shoutout to @malware_traffic for being the first to find this sample (which I noticed after analyzing it myself ^^).
1/2
🔗 https://gi7w0rm.medium.com/cloudeye-from-lnk-to-shellcode-4b5f1d6d877
🐥 [ tweet ]
🔥2
😈 [ washi_dev, Washi ]
I spent my Saturday on a dumb project answering the following question:
What is the smallest #dotnet Hello World binary?
Turns out, this rabbit hole is deeper than you may expect, so I wrote a blog post about it:
👉
#reversing #obfuscation #asmresolver
🔗 https://blog.washi.dev/posts/tinysharp/
🐥 [ tweet ]
I spent my Saturday on a dumb project answering the following question:
What is the smallest #dotnet Hello World binary?
Turns out, this rabbit hole is deeper than you may expect, so I wrote a blog post about it:
👉
#reversing #obfuscation #asmresolver
🔗 https://blog.washi.dev/posts/tinysharp/
🐥 [ tweet ]
🔥5
Offensive Xwitter
😈 [ ZeroMemoryEx, V2 ] Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes https://t.co/UGt7cd1DYu 🔗 https://github.com/ZeroMemoryEx/Terminator 🐥 [ tweet ]
😈 [ jsecurity101, Jonny Johnson ]
Do you remember the #blackout driver vulnerability discovered by @ZeroMemoryEx?
Well today I am releasing a blog going over my process of reversing the #blackout driver for which I found you can suspend any thread you want from medium IL.
Blog:
🔗 https://www.binarydefense.com/resources/blog/threadsleeper-suspending-threads-via-gmer64-driver/
🐥 [ tweet ]
Do you remember the #blackout driver vulnerability discovered by @ZeroMemoryEx?
Well today I am releasing a blog going over my process of reversing the #blackout driver for which I found you can suspend any thread you want from medium IL.
Blog:
🔗 https://www.binarydefense.com/resources/blog/threadsleeper-suspending-threads-via-gmer64-driver/
🐥 [ tweet ]
🔥4
Forwarded from RedTeam brazzers (sn🥶vvcr💥sh)
В выпуске «За кулисами Red Team» @Riocool упоминает, что на пентестах помимо скриншотов десктопа бывает сподручно делать снимки с веб-камеры на контролируемой рабочей станции, чтобы убедиться, находится ли юзверь в данный момент за ПеКа, либо же, к примеру, отлучился на свой закономерный обеденный перерыв. Раньше я не прибегал к подобному трюку, однако подсознательно часто испытывал потребность в такого рода проверках, ведь ворваться в GUI-сеанс определенного пользователя временами бывает просто необходимо.
Поискав готовые решения в сети, стало очевидно, что «из коробки» капчурить вебку умеет только дедушка meterpreter, а встраивать поделки на плюсах в свои проекты для выполнения из памяти не всегда удобно. Еще немного погуглив, наткнулся на этот интересный пост на Медиуме, где в параграфе Webcam Capture упоминается некий скрипт
🗒 DirectX.Capture Class Library
В свободное время было решено переписать
👨💻 https://github.com/snovvcrash/SharpDXWebcam
⚠️ Помним, что инструмент предназначен исключительно для образовательных целей и кейсов этичного тестирования на проникновение в рамках контракта, а блэчить плохо!
Всем остальным – happy (ethical) hacking!
Поискав готовые решения в сети, стало очевидно, что «из коробки» капчурить вебку умеет только дедушка meterpreter, а встраивать поделки на плюсах в свои проекты для выполнения из памяти не всегда удобно. Еще немного погуглив, наткнулся на этот интересный пост на Медиуме, где в параграфе Webcam Capture упоминается некий скрипт
MiniEye.ps1 от @xorrior, который якобы уже умеет делать все, что нам нужно (ссылка на скрипт из статьи отдает 404, инструмент переехал в корень репозитория – Get-DXWebcamVideo.ps1). Подход основан на использовании .NET-библиотеки DirectShowNET и обвязки для нее DirectX.Capture, блог автора которой на CodeProject также рекомендую к прочтению:В свободное время было решено переписать
Get-DXWebcamVideo.ps1 на фреймворк, чтобы не возиться лишний раз с запуском повершелла. Смержив зависимости с помощью dnMerge, можно получить standalone-сборку, готовую для выполнения из вашего любимого агента C2:Всем остальным – happy (ethical) hacking!
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥12👍4🥱1