😈 [ eversinc33 🩸🗡️ @eversinc33 ]
New blogpost and small tool release: Wrote a naive anti-rootkit driver that detects mapped drivers, and talk about some bypasses for those detections in part I of my new (anti-)-anti-rootkit series.
More research on rootkit evasion coming soon : )
🔗 https://eversinc33.com/posts/anti-anti-rootkit-part-i/
🐥 [ tweet ]
New blogpost and small tool release: Wrote a naive anti-rootkit driver that detects mapped drivers, and talk about some bypasses for those detections in part I of my new (anti-)-anti-rootkit series.
More research on rootkit evasion coming soon : )
🔗 https://eversinc33.com/posts/anti-anti-rootkit-part-i/
🐥 [ tweet ]
👍1🔥1
😈 [ Melvin langvik @Flangvik ]
Had an absolute blast on stream today, thank you so much to everyone who showed up☺ VOD is on YouTube if you missed it👏 Allot of people came with input, so naturally I 100% blame chat for this now OFFICIAL OFFSEC EDR TIER LIST
🔗 https://youtube.com/live/2H-Wlxq1kpo
🐥 [ tweet ]
Had an absolute blast on stream today, thank you so much to everyone who showed up☺ VOD is on YouTube if you missed it👏 Allot of people came with input, so naturally I 100% blame chat for this now OFFICIAL OFFSEC EDR TIER LIST
🔗 https://youtube.com/live/2H-Wlxq1kpo
🐥 [ tweet ]
Kaspersky - B, вы поняли🥱7
Forwarded from 1N73LL1G3NC3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2024-1086 Linux kernel LPE
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
A full write-up of the exploit - including background information and loads of useful diagrams - can be found in the Flipping Pages blogpost.
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
A full write-up of the exploit - including background information and loads of useful diagrams - can be found in the Flipping Pages blogpost.
🔥18👍1
😈 [ The Haag™ @M_haggis ]
Code blocks are free!!!
🔗 https://www.zscaler.com/blogs/security-research/european-diplomats-targeted-spikedwine-wineloader
🐥 [ tweet ]
Code blocks are free!!!
🔗 https://www.zscaler.com/blogs/security-research/european-diplomats-targeted-spikedwine-wineloader
🐥 [ tweet ]
🔥1
😈 [ Nettitude Labs @Nettitude_Labs ]
Introducing SharpConflux, a .NET tool built to facilitate Confluence exploration during Red Team engagements.
Find out more and download SharpConflux in our latest LRQA Nettitude Labs article.
🔗 https://labs.nettitude.com/blog/introducing-sharpconflux/
🐥 [ tweet ]
Introducing SharpConflux, a .NET tool built to facilitate Confluence exploration during Red Team engagements.
Find out more and download SharpConflux in our latest LRQA Nettitude Labs article.
🔗 https://labs.nettitude.com/blog/introducing-sharpconflux/
🐥 [ tweet ]
🔥5👍1🥱1
😈 [ Zoro @Evi1cg ]
atexec-pro
🔗 https://github.com/ridter/atexec-pro
🔗 https://www.zcgonvh.com/post/Advanced_Windows_Task_Scheduler_Playbook-Part.3_from_RPC_to_lateral_movement.html
🐥 [ tweet ]
atexec-pro
🔗 https://github.com/ridter/atexec-pro
🔗 https://www.zcgonvh.com/post/Advanced_Windows_Task_Scheduler_Playbook-Part.3_from_RPC_to_lateral_movement.html
🐥 [ tweet ]
люблю такой креатив👍4
😈 [ Cody Thomas @its_a_feature_ ]
I created a draft blog post that goes over the general concepts for making changes to agents, Mythic, and even Mythic's UI. If there's something specific you're hoping to see though, let me know and I can probably add it!
🔗 https://medium.com/@its_a_feature_/agent-customization-in-mythic-tailoring-tools-for-red-team-needs-1746fd02177f
🐥 [ tweet ]
I created a draft blog post that goes over the general concepts for making changes to agents, Mythic, and even Mythic's UI. If there's something specific you're hoping to see though, let me know and I can probably add it!
🔗 https://medium.com/@its_a_feature_/agent-customization-in-mythic-tailoring-tools-for-red-team-needs-1746fd02177f
🐥 [ tweet ]
👍2
😈 [ @thunderysteak@mastodon.social @ThunderySteak ]
totally forgot that naming your wifi after mimikatz noscript makes windows eat itself
🐥 [ tweet ]
totally forgot that naming your wifi after mimikatz noscript makes windows eat itself
🐥 [ tweet ]
😁26👍1🔥1😢1
😈 [ Andrew Oliveau @AndrewOliveau ]
👀👀🫵💥 "SeeSeeYouExec: Windows Session Hijacking via CcmExec"
New @Mandiant Red Team blog explores how SCCM's CcmExec service can be utilized for session hijacking and introduces a new tool, CcmPwn, to weaponize this technique! Defense tips included 🔵
🔗 https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec
🐥 [ tweet ]
👀👀🫵💥 "SeeSeeYouExec: Windows Session Hijacking via CcmExec"
New @Mandiant Red Team blog explores how SCCM's CcmExec service can be utilized for session hijacking and introduces a new tool, CcmPwn, to weaponize this technique! Defense tips included 🔵
🔗 https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec
🐥 [ tweet ]
👍2🔥2
Forwarded from 1N73LL1G3NC3
Пост-эксплуатация Windows с использованием виртуальных VPN-каналов / Обход NAT при пивотинге против Windows
NAT может создать проблемы для пентестера, когда он проводит пивотинг, особенно если мы говорим о скромпрометированных машинах на Windows. В этой статье я продолжу демонстрировать концепцию L2-туннелирования против скомпрометированных машин на Windows, но уже учитывая наличие NAT.
https://teletype.in/@casterbyte/witchhammer
https://teletype.in/@casterbyte/witchhammervip
Thx @casterwire
NAT может создать проблемы для пентестера, когда он проводит пивотинг, особенно если мы говорим о скромпрометированных машинах на Windows. В этой статье я продолжу демонстрировать концепцию L2-туннелирования против скомпрометированных машин на Windows, но уже учитывая наличие NAT.
https://teletype.in/@casterbyte/witchhammer
https://teletype.in/@casterbyte/witchhammervip
Thx @casterwire
🔥8🥱6🤯3👍2😁1
😈 [ Kali Linux @kalilinux ]
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today:
🔗 https://www.helpnetsecurity.com/2024/03/29/cve-2024-3094-linux-backdoor/
🔗 https://www.openwall.com/lists/oss-security/2024/03/29/4
🔗 https://threadreaderapp.com/thread/1773786266074513523.html
🔗 https://tukaani.org/xz-backdoor/
🐥 [ tweet ]
⚠️ UPDATE ASAP ⚠️
The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today:
sudo apt update && sudo apt install --only-upgrade liblzma5
🔗 https://www.helpnetsecurity.com/2024/03/29/cve-2024-3094-linux-backdoor/
🔗 https://www.openwall.com/lists/oss-security/2024/03/29/4
🔗 https://threadreaderapp.com/thread/1773786266074513523.html
🔗 https://tukaani.org/xz-backdoor/
🐥 [ tweet ]
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥11👍6😁3
😈 [ Matt Creel @Tw1sm ]
Been working to improve my BOF/C dev skills, created some BOFs mimicking SQLRecon modules as a fun learning exercise
🔗 https://github.com/Tw1sm/SQL-BOF
🐥 [ tweet ]
Been working to improve my BOF/C dev skills, created some BOFs mimicking SQLRecon modules as a fun learning exercise
🔗 https://github.com/Tw1sm/SQL-BOF
🐥 [ tweet ]
👍4
😈 [ 0xdf @0xdf_ ]
I learned so much about Kerberos solving Rebound. It was very difficult, but such a great experience. There's Kerberoasting without auth, cross session with RemotePotato0, and abusing delegation, both constrained and RBCD!
🔗 https://0xdf.gitlab.io/2024/03/30/htb-rebound.html
🔗 https://youtu.be/oUIoH4yBT3k?si=EvookdfPJ6wMaCZK
🐥 [ tweet ]
I learned so much about Kerberos solving Rebound. It was very difficult, but such a great experience. There's Kerberoasting without auth, cross session with RemotePotato0, and abusing delegation, both constrained and RBCD!
🔗 https://0xdf.gitlab.io/2024/03/30/htb-rebound.html
🔗 https://youtu.be/oUIoH4yBT3k?si=EvookdfPJ6wMaCZK
🐥 [ tweet ]
миллион лет уже не был на хтб, но райтап прикольный, где-то выглядит даже жизненно для АДшечки🔥8👍1
😈 [ Lsec @lsecqt ]
My blogpost about bypassing AVs via SMB staging is now LIVE:
🔗 https://lsecqt.github.io/Red-Teaming-Army/malware-development/beyond-detection-smb-staging-for-antivirus-evasion/
Let me know if you enjoy such content and if you would want to see more of that in future.
🐥 [ tweet ]
#для_самых_маленьких
My blogpost about bypassing AVs via SMB staging is now LIVE:
🔗 https://lsecqt.github.io/Red-Teaming-Army/malware-development/beyond-detection-smb-staging-for-antivirus-evasion/
Let me know if you enjoy such content and if you would want to see more of that in future.
🐥 [ tweet ]
#для_самых_маленьких
🔥6👍5
Offensive Xwitter
😈 [ Kali Linux @kalilinux ] The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th…
Схема работы бэкдора, составленная специалистом Microsoft Томасом Рочча (Thomas Roccia)
🔥5🤯3👍1
😈 [ Octoberfest7 @Octoberfest73 ]
This April Fools Day, I'm excited to release my latest research and blog post from my time at @RedSiege: SSHishing. The name might be a joke, but the technique isn't!
Read the details here:
🔗 https://redsiege.com/sshishing
🐥 [ tweet ]
This April Fools Day, I'm excited to release my latest research and blog post from my time at @RedSiege: SSHishing. The name might be a joke, but the technique isn't!
Read the details here:
🔗 https://redsiege.com/sshishing
🐥 [ tweet ]
🤔2
😈 [ Cipher007 @xCipher007 ]
It's my first payload Loader with my learnings from @MalDevAcademy ! Check it out:
🔗 https://github.com/Cipher7/ChaiLdr
🐥 [ tweet ]
It's my first payload Loader with my learnings from @MalDevAcademy ! Check it out:
🔗 https://github.com/Cipher7/ChaiLdr
🐥 [ tweet ]
👍4
😈 [ Alex Plaskett @alexjplaskett ]
A blog on reversing Dark Souls 3 networking by Tim Leonard:
Connection:
🔗 https://timleonard.uk/2022/05/29/reverse-engineering-dark-souls-3-networking
Packets:
🔗 https://timleonard.uk/2022/06/02/reverse-engineering-dark-souls-3-networking-part-2
Key Exchange:
🔗 https://timleonard.uk/2022/06/03/reverse-engineering-dark-souls-3-networking-part-3
Reliable UDP:
🔗 https://timleonard.uk/2022/06/09/reverse-engineering-dark-souls-3-networking-part-4
More:
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-5
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-6
🔗 https://timleonard.uk/2022/06/20/reverse-engineering-dark-souls-3-networking-part-7
🐥 [ tweet ]
A blog on reversing Dark Souls 3 networking by Tim Leonard:
Connection:
🔗 https://timleonard.uk/2022/05/29/reverse-engineering-dark-souls-3-networking
Packets:
🔗 https://timleonard.uk/2022/06/02/reverse-engineering-dark-souls-3-networking-part-2
Key Exchange:
🔗 https://timleonard.uk/2022/06/03/reverse-engineering-dark-souls-3-networking-part-3
Reliable UDP:
🔗 https://timleonard.uk/2022/06/09/reverse-engineering-dark-souls-3-networking-part-4
More:
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-5
🔗 https://timleonard.uk/2022/06/18/reverse-engineering-dark-souls-3-networking-part-6
🔗 https://timleonard.uk/2022/06/20/reverse-engineering-dark-souls-3-networking-part-7
🐥 [ tweet ]
🔥5👍3