Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Name: Windows System Programming
Requirements: C, Windows (structure and etc)
Level: Intermediate to Advanced
Author: Johnson M. Hart

Table of Contents:
1- Getting Started with Windows
2- Using the Windows File System and Character I/O
3- Advanced File and Directory Processing, and the Registry
4- Exception Handling
5- Memory Management, Memory-Mapped Files, and DLLs
6- Process Management
7- Threads and Scheduling
8- Thread Synchronization
9- Locking, Performance, and NT6 Enhancements
10- Advanced Thread Synchronization
11- Interprocess Communication
12- Network Programming with Windows Sockets
13- Windows Services
14- Asynchronous Input/Output and Completion Ports
15- Securing Windows Objects
16- Using the Sample Programs
17- Source Code Portability: Windows, UNIX, and Linux
18- Performance Results



#book
3👍1🔥1
Code injection via undocumented NtAllocateVirtualMemory
Cocmelonc

#malware_dev
👍5😁1
Projects on undocumented windows APIs, a keylogger PoC, and dll injection PoC.
Based off of a Defcon workshop

GitHub
5
Windows_Exploitation_using_Windows_API’s.pdf
367.8 KB
Related paper to previous post
#defcon
53
D1T2_Windows_Syscalls_in_Shellcode_Advanced_Techniques_for_Malicious.pdf
16.9 MB
D1T2 - Windows Syscalls in Shellcode:
Advanced Techniques for Malicious
Functionality


#Conference
4
US-23-Palmiotti-Boonen-Close-Encounters.pdf
14.9 MB
Close Encounters of the Advanced Persistent Kind
Leveraging Rootkits for
Post-Exploitation


From chompie and fuzzysec


#Conference
5
Synapse Ransomware Technical Analysis
Link

rule Synapse_Ransomware_1_0_0
{
meta:
denoscription = "Synapse Ransomware 1.0.0 Stable Version Release - Detection Rule"
author = "CRT"
date = "2024-05-22"
version = "1.0"
malware_type = "ransomware"
strings:
$str1 = "Global\\FSWiper" ascii wide nocase
$str2 = "ZLWP.tmp" ascii wide nocase
$str3 = "Microsoft Primitive Provider" ascii wide nocase
$str4 = "RNG" ascii wide nocase
$str5 = "Synapse" ascii wide nocase
$clsid1 = {11 F8 90 45 3A 1D D0 11 89 1F 00 AA 00 4B 2E 24}
$clsid2 = {98 66 4B 67 92 EE D0 11 AD 71 00 C0 4F D8 FD FF}
$clsid3 = {87 A6 12 DC 7F 73 CF 11 88 4D 00 AA 00 4B 2E 24}
$clsid4 = {74 A6 AC 44 FC E8 D0 11 A0 7C 00 C0 4F B6 88 20}
condition:
all of them
}

#malware_analysis
8👍2
4🔥2
Getting RCE in Chrome with incorrect side effect in the JIT compiler
In this post, I'll exploit CVE-2023-3420, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.

https://github.blog/2023-09-26-getting-rce-in-chrome-with-incorrect-side-effect-in-the-jit-compiler/


#cve #Exp #browser
3👍2
Getting RCE in Chrome with incomplete object initialization in the Maglev compiler
In this post, I'll exploit CVE-2023-4069, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.

https://github.blog/2023-10-17-getting-rce-in-chrome-with-incomplete-object-initialization-in-the-maglev-compiler/


#cve #Exp #browser
👍33
Google Chrome Use After Free vulnerability reported by S4E Team
https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome

#cve #Exp #browser
5👍1
Abusing the SeRelabelPrivilege
that a specific Group Poilcy granted via “User Right Assignments” the SeRelabelPrivilege to the built-in Users group and was applied on several computer accounts.

https://decoder.cloud/2024/05/30/abusing-the-serelabelprivilege

#malware_dev
5
Forwarded from 1N73LL1G3NC3
CookieKatz

Dump cookies directly from Chrome, Edge, or Msedgewebview2 process memory. Chromium-based browsers load all their cookies from the on-disk cookie database on startup.

The benefits of this approach are:
  • Support dumping cookies from Chrome’s Incogntio and Edge’s In-Private processes
• Access cookies of other user’s browsers when running elevated
• Dump cookies from webview processes
• No need to touch on-disk database file
• DPAPI keys not needed to decrypt the cookies
• Parse cookies offline from a minidump file


This solution consists of three projects:
   • CookieKatz - PE executable
• CookieKatz-BOF - Beacon Object File version
• CookieKatzMinidump - minidump parser.
5👍1🔥1
Please open Telegram to view this post
VIEW IN TELEGRAM
8
😁122