This media is not supported in your browser
VIEW IN TELEGRAM
Silently install Chrome extensions by modifying the configuration file
https://syntax-err0r.github.io/Silently_Install_Chrome_Extension.html
#chrome #extension
In practice, Chrome usually turns on remote debugging, which is a very risky approach.
https://syntax-err0r.github.io/Silently_Install_Chrome_Extension.html
#chrome #extension
🔥7👍2
IAT-Tracer V2
IAT-Tracer V2 is a plugin for Tiny-Tracer framework
credit : Yoav Levi
https://github.com/YoavLevi/IAT-Tracer
IAT-Tracer V2 is a plugin for Tiny-Tracer framework
Now, you can automatically trace and watch any Windows API function a binary uses, whether imported or *dynamically resolved*.
credit : Yoav Levi
https://github.com/YoavLevi/IAT-Tracer
❤4👍3
Windows Internals Learning Resources
credit : Patrick Matula
A summary of learning resources in the categories:
https://github.com/pmatula/Windows-Internals-Learning-Resources
credit : Patrick Matula
A summary of learning resources in the categories:
+ Windows Internals
+ Windows Debugging and Troubleshooting
+ Windows Performance
+ Windows Programming
https://github.com/pmatula/Windows-Internals-Learning-Resources
🔥6👍1
https://github.com/mgeeky/ProtectMyTooling
Holy tool for red teamers
Holy tool for red teamers
GitHub
GitHub - mgeeky/ProtectMyTooling: Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented…
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You fe...
🔥9👍2❤1
Emulating inline decryption for triaging C++ malware
[ Blog ]
#malware_analysis
[ Blog ]
References
Glory Sprout string decryptor:
gsprout_string_decryption.py
Glory Sprout Hash resolver:
gsprout_api_resolver.py
GlorySprout sample:
Malwarebazaar
Insight from GlorySprout and Taurus Stelaer:
RussianPanda Research Blog
Let’s play (again) with Predator the thief
An In-Depth analysis of the new Taurus Stealer
#malware_analysis
👍4❤2🤷♂1
Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent
Credit : Evan Ikeda
https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
Credit : Evan Ikeda
https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
👾6👍1
Forwarded from Iman
درود. من یک مطلب کوتاهی نوشتم برای درک پروسهای که توی کرنل رخ میده موقع Null-dereference (معماری x86) و مقداری در مورد Virtual Memory Management کرنل صحبت کردم. شاید برای بچههایی که روی آسیبپذیریهای سمت کرنل کار میکنن هم جالب باشه:
https://imanseyed.github.io/posts/the-flow-of-the-kernel-upon-receiving-a-sigsegv-for-null-dereferene/
https://imanseyed.github.io/posts/the-flow-of-the-kernel-upon-receiving-a-sigsegv-for-null-dereferene/
Code Sorcery
The Flow of the Kernel Upon Receiving a SIGSEGV for Null-Dereference
You might have seen “*(char*)0 = 0; - What Does the C++ Programmer Intend With This Code?” where JF Bastien discusses this line of code:
🔥8👍3👏1
11 Strategies of a World-Class Cybersecurity Operations Center
by mitre
by mitre
Strategy 1: Know What You Are Protecting and Why
Strategy 2: Give the SOC the Authority to Do Its Job
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Strategy 4: Hire AND Grow Quality Staff
Strategy 5: Prioritize Incident Response
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Strategy 7: Select and Collect the Right Data
Strategy 8: Leverage Tools to Support Analyst Workflow
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Strategy 10: Measure Performance to Improve Performance
Strategy 11: Turn up the Volume by Expanding SOC Functionality
👍3👎3🔥1
Forwarded from Stuff for Geeks (rВНm)
https://engineers.inpyjama.com/learn/ldd-101
Linux device driver development free course
#Linux
#Course
#English
Linux device driver development free course
#Linux
#Course
#English
👍3❤2
Forwarded from APT
Explore the Windows Kernel with HEVD, a vulnerable driver. Dive into stack overflow exploits and bypass SMEP/KPTI protections using the sysret approach.
A detailed guide for Windows kernel explotation:
— Part 0: Where do I start?
— Part 1: Will this driver ever crash?
— Part 2: Is there a way to bypass kASLR, SMEP and KVA Shadow?
— Part 3: Can we rop our way into triggering our shellcode?
— Part 4: How do we write a shellcode to elevate privileges and gracefully return to userland?
#windows #kernel #driver #hevd #hacksys
Please open Telegram to view this post
VIEW IN TELEGRAM
👍11👾4❤1
Global Windows outage hits computers around the world. This is linked to Crowdstrike update that cripples boot process.
Credit: Lukasz Olejnik
#CrowdStrike
Supposedly deleting “C-00000291*.sys” file in C:\Windows\System32\drivers\CrowdStrike directory fixes the issue. But editing system files you always do on your own risk :)
Credit: Lukasz Olejnik
#CrowdStrike
❤2👍1👾1
I created a simple Group Policy (GPO) to automatically fix CrowdStrike BSOD (Blue screen of death) issue.
Credit : Arda Büyükkaya
https://gist.github.com/whichbuffer/7830c73711589dcf9e7a5217797ca617
Credit : Arda Büyükkaya
https://gist.github.com/whichbuffer/7830c73711589dcf9e7a5217797ca617
How are you deploying this to BSOD'd boxes?
You can remotely apply the GPOs using tools like Group Policy Management Console (GPMC) from a server or another computer with administrative privileges. If remote access is not possible due to the BSOD, you may need to boot the affected systems using a Windows recovery environment or a bootable media, manually apply the noscripts to force Safe Mode, and then restart the systems to allow the GPOs to execute the fix. I haven't tested it across multiple affected devices yet, but theoretically, booting into Safe Mode by GPO and then deleting the problematic driver should work. The idea is based on standard troubleshooting steps that target specific faulty drivers causing the BSOD.
🔥3👍2
Forwarded from Source Chat (main one)
Please open Telegram to view this post
VIEW IN TELEGRAM