Forwarded from Threat Hunting Father 🦔
ADCS ESC9_15 Offzone2025.pdf
2 MB
На Offzone 2025 показали, как цепочки ESC9–ESC15 позволяют эскалировать права через AD Certificate Services: обход StrongCertificateBindingEnforcement, подмена
altSecurityIdentities, злоупотребление IssuancePolicy, и новый баг — CVE-2024-49019 (arbitrary Application Policy).🦔 THF
Please open Telegram to view this post
VIEW IN TELEGRAM
👾3
call stack signatures with call gadgets
Published on Thu 06 November 2025 by SAERXCIT (@SAERXCIT)
TL;DR: Using call gadgets to insert arbitrary modules in the call stack during module load, breaking signatures used in detection rules. The code is available here: https://github.com/AlmondOffSec/LibTPLoadLib
👾4
Forwarded from Proxy Bar
Visual Studio 2026 is here
Keys:
Keys:
Professional: NVTDK-QB8J9-M28GR-92BPC-BTHXK
Enterprise: VYGRN-WPR22-HG4X3-692BF-QGT2V
👾3
sideloading PoC using onedrive.exe & version.dll
This document provides a detailed technical analysis of a proof-of-concept that demonstrates DLL sideloading by targeting OneDrive.exe with a malicious version.dll. This technique is leveraged for achieving persistence, evading defenses, and executing arbitrary code within the context of a trusted process. The proof-of-concept further employs DLL proxying to maintain the normal operation of the host application and utilizes a sophisticated hooking mechanism based on Vectored Exception Handling (VEH) and hardware-like breakpoints to intercept and modify application behavior.
👾5
Ebyte-Syscalls
https://github.com/EvilBytecode/Ebyte-Syscalls
#obf #CF
https://github.com/EvilBytecode/Ebyte-Syscalls
Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte switching without memory or assembly allocation.
#obf #CF
👾6
NTLM Password Changer
A PowerShell utility that changes Windows account passwords through the native Samlib.dll API, the same low-level library used by Windows itself for SAM and NTLM account management.
This project demonstrates how local or domain password changes can occur at the NTLM level using SamiChangePasswordUser without triggering all of the typical password-change events.
👾3🔥2
Exploiting Ghost SPNs and Kerberos Reflection for SMB Server Privilege Elevation
#ad
Kerberos authentication reflection can be abused for remote privilege escalation, even after applying the fix for CVE-2025-33073.
Ghost SPNs (Service Principal Names mapped to hostnames that fail to resolve) introduce an exploitable attack surface that adversaries can leverage.
Default Active Directory (AD) settings allow standard users to register DNS records, enabling this attack, which Microsoft has cataloged as CVE‑2025‑58726 (SMB Server Elevation of Privilege).
Failure to enforce SMB signing is a critical enabler.
The attack works on all Windows versions unless SMB signing is required.
Microsoft addressed this issue in the October 2025 Patch Tuesday.
#ad
🔥3👾2
Media is too big
VIEW IN TELEGRAM
Tired of obfuscating strings and recompiling to break signatures? Wish you could keep PE-sieve from ripping your malware out of memory? Interested in learning how to do all of this with your existing COTS or private toolsets?
#evasion #memoryscanners
For years, reverse engineers and endpoint security software have used memory scanning to locate shellcode and malware implants in Windows memory. These tools rely on IOCs such as signatures and unbacked executable memory. This talk will dive into the various methods in which memory scanners search for these indicators and demonstrate a stable evasion technique for each method. A new position-independent reflective DLL loader, AceLdr, will be released alongside the presentation and features the demonstrated techniques to evade all of the previously described memory scanners. The presenter and their colleagues have used AceLdr on red team operations against mature security programs to avoid detection successfully.
#evasion #memoryscanners
🔥3👍1👾1
Sec Note
Let's-Create-Some-Polymorphic-PIC-Shellcode!
G3tSyst3m's Infosec Blog
PIC Shellcode from the Ground up - Part 2
Let’s PIC back up where we left off shall we? 😸 I gave you the framework for developing PIC friendly shellcode back in Part 1. We went from the original code written in a high level language (C++), down to a pseudo low level representation of that C++ code.…
👾5🔥3
Forwarded from ByTe [ ]f Digital Life
Удаляем драйвер через smss.exe
Кто-то меня спрашивал как удалить драйвер AV/EDR, потому что службу мы уже смогли и перезаписать и удалить, а с драйвером так сделать было невозможно.
В общем я что то потыкал и удалил драйвер с перезагрузкой хоста.
Открываем:
И в параметр
Работает и на 10 и на 11 Windows
Кто-то меня спрашивал как удалить драйвер AV/EDR, потому что службу мы уже смогли и перезаписать и удалить, а с драйвером так сделать было невозможно.
В общем я что то потыкал и удалил драйвер с перезагрузкой хоста.
Открываем:
HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management
И в параметр
ExistingPageFiles записываем путь к драйверу AV/EDR (начало пути \??\C:\ ну или иная метка диска), после ребутаем тачку и получаем профит в случае, если smss.exe сможет получить права на удаление. По этой причине работа данной техники сильно зависит от архитектуры решения которое мы пытаемся удалить.Работает и на 10 и на 11 Windows
👾3👍1