@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
HACKING INETNO DG201A

I have ran my VDSL2 box happily in bridge mode and thinking that there is not that much of risk because the box should be just forwarding the packets to my firewall. After doing some changes to my VDSL -box I realized that for some strange reason it will take IP from the Internet even when it should be in bridged mode.

http://www.happyhacking.org/HappyHacking/hacking/2013/11/07/Hacking-Inetno-DG201A.html
WeMo Hacking

I've spent some time reverse engineering my WeMo switch. It's pretty cool and I figured out how to get it to do what I wanted. It's based on UPnP, which I found the miranda tool to be the best (closest to working with WeMo, and easiest to read)

I had to make some modifications to the miranda package to get it working, and to get it properly reporting the details of the device.

https://github.com/issackelly/wemo
Android reversing #1: APK, Smali and ADB

Android reverse-engineering part 1: The APK format, an introduction to Smali and using ADB

https://youtu.be/uc7eZGE07ps
Mobile Security Reverse Engineer Android Apps From Scratch

https://youtu.be/BNoB4ZKqwhs
Demystifying Modern Windows Rootkits

This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that come with malware in kernel-mode rather than user-mode.

https://youtu.be/ZASsIpdumcY
ATT&CK® Deep Dive: How to Detect Rootkits

Immerse yourself in the world of rootkits—a potent and obscure variety of malware that’s as attractive to adversaries as it is elusive to defenders.
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows, and macOS
Learn how to detect rootkits and identify activities for threat hunts and alert investigations
Get insights into how you can use the ATT&CK framework to shore up your vulnerabilities
Address your visibility requirements so you can configure preventative and detection controls
Rootkits exist at the lowest levels of an operating system, offering adversaries stealthy, persistent, and comprehensive control over an infected machine. Since this kind of malicious software often resides beneath the application layer of the operating system in a highly privileged piece of software called the kernel, it can be difficult to observe, let alone detect.

https://youtu.be/Kmq9TFXdkg4