Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
🛡️الدرع الأخضر | GREEN ARMOR🛡️
Message
This media is not supported in your browser
VIEW IN TELEGRAM
🍾8👍1
黑客组织 Twelve 针对俄罗斯实体发动破坏性网络攻击(作者:maojila)

黑客组织 Twelve 针对俄罗斯实体发动破坏性网络攻击
👍51
Lateral Movement using the MMC20.Application COM Object
First part

https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/
👍4
Process Injection via Component Object Model (COM) IRundown::DoCallback()
From MDSec

https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/

#malware_dev
3👍3
Forwarded from 1N73LL1G3NC3
🥤 Pivoting using ZeroTier

🥤 Pivoting using Nebula

Demonstration of pivoting with ZeroTier and Nebula during the post-exploitation process. These tools showcase impressive capabilities such as flexible routing, NAT traversal, and the ability to build tunnels between isolated network segments, granting full access to internal infrastructure.

Thx to my bro @casterbyte
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7👍5👎1
COM from scratch
PART ONE

[ Code project ]

#com #windows
👍7
Forwarded from CyberSecurityTechnologies (-CST-)
HookChain_new_perspective.pdf
14.4 MB
#Red_Team_Tactics
"HookChain: A new perspective for Bypassing EDR Solutions", 2024.
]-> https://github.com/helviojunior/hookchain
👍42🔥1👏1
🔥3👍2
Forwarded from Offensive Xwitter
😈 [ Check Point Research @_CPResearch_ ]

10 years of DLL hijacking - featuring abused executables that shouldn't have existed, exported and malicious DLLs with discount bin "packing." Includes a PoC for app developers to pre-emptively stop hijacking without dealing with a certificate authority.

🔗 https://research.checkpoint.com/2024/10-years-of-dll-hijacking-and-what-we-can-do-to-prevent-10-more/

🐥 [ tweet ]
👍5
Source Byte
Process Injection via Component Object Model (COM) IRundown::DoCallback() From MDSec https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/ #malware_dev
Injecting Code into Windows Protected Processes using COM, Part 1 and Part 2 by James Forshaw of the Project Zero team prompted an interest in COM internals and, more specifically, the undocumented DoCallback method part of the IRundown interface.
- POC

#COM
👍7
The Anti-EDR Compendium
EDR functionality and bypasses in 2024, with focus on undetected shellcode loader.

https://blog.deeb.ch/posts/how-edr-works/

credit : Dobin Rutishauser
1👍4
👍3
Interview_with_smelly_vx,_founder_of_vxunderground_specially_for.pdf
710.5 KB
Interview with smelly-vx

#interview #vx
👍4
Forwarded from Proxy Bar
👍6👎2
RedTeam Workshop - Part 4
* How do North Korean hackers bypass security mechanisms? *
APT38 attacks simulation , in this section, "defense evasion" was discussed.
Defense Evasion
+ T1562.003 | Impair Command History Logging
+ T1562.004 | Disable or Modify System Firewall
+ T1070.001 | Clear Windows Event Logs
+ T1070.006 | Timestomp
+ T1112 | Modify Registry
+ T1218.001 | Compiled HTML File
+ T1218.011 | Rundll32

https://youtu.be/zDyPRrtXjus?si=265TY6KyElHGr-eR
slides / notes :
https://github.com/soheilsec/RT-workshop-2024

credit : @soheilsec
language : persian
👍4
Source Byte pinned «Process Injection via Component Object Model (COM) IRundown::DoCallback() From MDSec https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/ #malware_dev»