Forwarded from Cyber Detective
Wayback Machine collection search
twitter.com/BanPangar shared a method for finding emails/nicknames mentions in the text of web pages/docs with archive.org collection search. Help find a lot of things that don't show up in Google results.
Don't forget the quotes.
#osint
twitter.com/BanPangar shared a method for finding emails/nicknames mentions in the text of web pages/docs with archive.org collection search. Help find a lot of things that don't show up in Google results.
Don't forget the quotes.
#osint
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures https://www.vergiliusproject.com/
Vergiliusproject
Vergilius Project
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.
❤9👍5❤🔥2
Cyber Threat Intelligence (CTI): A Clear Process for Data Ingestion and Distribution
https://medium.com/@philiphristoff/cyber-threat-intelligence-cti-a-clear-process-for-data-ingestion-and-distribution-1889f6a2c5a8
https://medium.com/@philiphristoff/cyber-threat-intelligence-cti-a-clear-process-for-data-ingestion-and-distribution-1889f6a2c5a8
❤6
COM Object - Part 1
Confirm the concept of COM objects through practice and Check how to find a vulnerable COM object.
https://hackyboiz.github.io/2024/11/24/ogu123/COM_Object/
Confirm the concept of COM objects through practice and Check how to find a vulnerable COM object.
https://hackyboiz.github.io/2024/11/24/ogu123/COM_Object/
👍2🖕1
How to Investigate Insider Threats (Forensic Methodology)
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html
Find their #ttp
👍3
Forwarded from OnHex
🔴 احتمالا شندید که میگن آنتی ویروسها از طریق یسری امضا (signatures) اقدام به شناسایی بدافزارها میکنن.
در این ویدیو از hoagie hacks دقیقا توضیح میده که منظور از امضاء چیه و آنتی ویروسهایی مانند Microsoft Defender چطوری از اونا برای شناسایی بدافزارها استفاده میکنن.
برای اینکه اینارو نشون بده، یدونه shellcode injection خیلی ساده در ++C پیاده سازی کرده و اومده امضاهایی که منجر به شناسایی بدافزار در Virus Total میشه رو شناسایی و حذف میکنه.
این ویدیوها قراره بصورت مجموعه ارائه بشه و در قسمتهای بعدی تکنیکهای string/API hashing و metamorphic/polymorphic code رو هم پیاده سازی میکنه.
هدف این ویدیوها، بهبود مهارتهای تیم قرمز و آشنایی و دفاع در تیم های آبی هستش.
#تیم_قرمز #تیم_آبی #آنتی_ویروس #توسعه_بدافزار
#redteam #Blueteam #MalwareDev #AV
🆔 @onhex_ir
➡️ ALL Link
در این ویدیو از hoagie hacks دقیقا توضیح میده که منظور از امضاء چیه و آنتی ویروسهایی مانند Microsoft Defender چطوری از اونا برای شناسایی بدافزارها استفاده میکنن.
برای اینکه اینارو نشون بده، یدونه shellcode injection خیلی ساده در ++C پیاده سازی کرده و اومده امضاهایی که منجر به شناسایی بدافزار در Virus Total میشه رو شناسایی و حذف میکنه.
این ویدیوها قراره بصورت مجموعه ارائه بشه و در قسمتهای بعدی تکنیکهای string/API hashing و metamorphic/polymorphic code رو هم پیاده سازی میکنه.
هدف این ویدیوها، بهبود مهارتهای تیم قرمز و آشنایی و دفاع در تیم های آبی هستش.
#تیم_قرمز #تیم_آبی #آنتی_ویروس #توسعه_بدافزار
#redteam #Blueteam #MalwareDev #AV
🆔 @onhex_ir
➡️ ALL Link
👍5👎4
Mimik@tz.pdf
394.6 KB
Mimikatz
https://github.com/gentilkiwi/mimikatz
Mimikatz is an overall software tool used for process manipulation, primarily written in the C programming
language by Mr. Benjamin Deply. This tool enables direct object manipulation and execution via various
techniques. Mimikatz is widely used for bypassing security mechanisms, including EDR (Endpoint Detection
and Response) software and antivirus tools. It has a number of features designed to assist with
penetration testing and exploitation.
https://github.com/gentilkiwi/mimikatz
👍8🔥3👾3
🖨 Living Off The Land
- https://lolapps-project.github.io
- LOLAD
- UNIX binaries
- Windows binaries
- A collection of resources to thrive off the land
#lolbins
- https://lolapps-project.github.io
- LOLAD
- UNIX binaries
- Windows binaries
- A collection of resources to thrive off the land
#lolbins
👍6🔥1
LOLOL
Living Off the Living Off the Land
https://br0k3nlab/lofp/
Living off the False Positive
https://loldrivers.io Living Off The
https://gtfobins.github.io
https://lolbas-project.github.io
https://lots-project.com
https://hijacklibs.net
https://wadcoms.github.io
https://www.loobins.io
https://lolapps-project.github.io
https://www.bootloaders.io
https://wtfbins.wtf/
https://lofl-project.github.io
https://persistence-info.github.io
https://github.com/WithSecureLabs/lolcerts
https://boostsecurityio.github.io/lotp/
https://lolbins-ctidriven.vercel.app/
https://lolesxi-project.github.io/LOLESXi/
https://lolrmm.io/
#lolbins
Living Off the Living Off the Land
https://br0k3nlab/lofp/
Living off the False Positive
an autogenerated collection of false positives sourced from some of the most popular rule sets. The information is categorized along with ATT&CK techniques, rule source, and data source.
https://loldrivers.io Living Off The
Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks
https://gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
https://lolbas-project.github.io
The goal of the LOLBAS project is to document every binary, noscript, and library that can be used for Living Off The Land techniques
https://lots-project.com
Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. The list of websites below allow attackers to use their domain or subdomainhttps://filesec.io
File extensions being used by attackers
https://hijacklibs.net
This project provides an curated list of DLL Hijacking candidates
https://wadcoms.github.io
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments
https://www.loobins.io
Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes
https://lolapps-project.github.io
This project was made because exploitation isn’t limited to binaries using command line techniques. Both built-in and third-party applications have been used & abused for adversarial gain since the dawn of time, and knowing these methods can help when all else fail.
https://www.bootloaders.io
Curated list of known malicious bootloaders for various operating systems. The project aims to assist security professionals in staying informed and mitigating potential threats associated with bootloadershttps://lothardware.com.tr
BYOL Bring Your Own Land (BYOL)
Living Off The Hardware is a resource collection that provides guidance on identifying and utilizing malicious hardware and malicious devices
https://wtfbins.wtf/
WTFBin is a binary that behaves exactly like malware, except, somehow, it’s not
https://lofl-project.github.io
Living Off the Foreign Land (LOFL) are LOFL Cmdlets and Binaries (LOFLCABs) that are capable of performing activities from the local (Offensive Windows) system to a REMOTE system.
https://persistence-info.github.io
This contains information about Windows persistence mechanisms to make the protection/detection more efficient.
https://github.com/WithSecureLabs/lolcerts
Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This project aims at collecting the details of the certificates that are known to be abused in the wild by malicious actors.
https://boostsecurityio.github.io/lotp/
Inventory how development tools (typically CLIs), commonly used in CI/CD pipelines, have lesser-known RCE-By-Design features (“foot guns”), or more generally, can be used to achieve arbitrary code execution by running on untrusted code changes or following a workflow injection.
https://lolbins-ctidriven.vercel.app/
This project that aims to help cyber defenders understand how LOLBin binaries are used by threat actors during an intrusion in a graphical and digestible format.
https://lolesxi-project.github.io/LOLESXi/
This project features a comprehensive list of binaries/noscripts natively available in VMware ESXi that adversaries have utilised in their operations.
https://lolrmm.io/
This project is a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.
#lolbins
👍6🔥3
Forwarded from Source Byte ( $ᴘ3ᴅʏʟ1)
LOLBin for Downloading Arbitrary Files
Find the downloaded file in
#windows
#redteam
#lolbin
———
@islemolecule_source
C:\Windows\System32\IME\SHARED\IMEWDBLD.exe <URL>Find the downloaded file in
%LocalAppData%\Microsoft\Windows\INetCache\<8_RANDOM_ALNUM_CHARS>/<FILENAME>[1].<EXTENSION>#windows
#redteam
#lolbin
———
@islemolecule_source
👍4🍓3
Forwarded from README.hta
Список рекомендаций к изучению, составленный исключительно из моего опыта, в том числе когда я сама с нуля погружалась в форензику. Приведу оригинал и перевод книги, если он есть, но имейте ввиду, что порой читать в оригинале лучше, как минимум чтобы не встречать диковинные переводы в стиле "атака типа водопой"
Базовый уровень для вхождения в специальность (= must read):
1. Applied Incident Response, Steve Anson / Реагирование на компьютерные инциденты. Прикладной курс, Cтив Энсон
2. Incident Response Techniques for Ransomware Attacks, Oleg Skulkin / Шифровальщики, Олег Скулкин
3. Cybersecurity Ops with bash, Paul Troncone, Carl Albing / Bash и кибербезопасность, Олбинг Карл, Тронкон Пол
Средний уровень:
4. Practical Memory Forensics, Svetlana Ostrovskaya / Криминалистика компьютерной памяти на практике, Светлана Островская
5. Intelligence-Driven Incident Response, Scott J. Roberts, Rebekah Brown
6. Active Directory глазами хакера, Ralf Hacker
Уровень максимум:
Вообще большинство книг уровнем повыше можно использовать больше как справочник или по случаю. Не стоит мучаться и читать от корки до корки просто потому что надо (но можете и почитать, если интересно)
7. File System Forensic Analysis, Brian Carrier
8. Practical Linux Forensics: A Guide for Digital Investigators, Bruce Nikkel
9. Восстановление данных. Практическое руководство, Крис Касперски, В.Е. Холмогоров
Extremely high level:
10. https://www.google.com/
Все указанные файлы приложены в комментариях
#books
Базовый уровень для вхождения в специальность (= must read):
1. Applied Incident Response, Steve Anson / Реагирование на компьютерные инциденты. Прикладной курс, Cтив Энсон
2. Incident Response Techniques for Ransomware Attacks, Oleg Skulkin / Шифровальщики, Олег Скулкин
3. Cybersecurity Ops with bash, Paul Troncone, Carl Albing / Bash и кибербезопасность, Олбинг Карл, Тронкон Пол
Средний уровень:
4. Practical Memory Forensics, Svetlana Ostrovskaya / Криминалистика компьютерной памяти на практике, Светлана Островская
5. Intelligence-Driven Incident Response, Scott J. Roberts, Rebekah Brown
6. Active Directory глазами хакера, Ralf Hacker
Уровень максимум:
Вообще большинство книг уровнем повыше можно использовать больше как справочник или по случаю. Не стоит мучаться и читать от корки до корки просто потому что надо (но можете и почитать, если интересно)
7. File System Forensic Analysis, Brian Carrier
8. Practical Linux Forensics: A Guide for Digital Investigators, Bruce Nikkel
9. Восстановление данных. Практическое руководство, Крис Касперски, В.Е. Холмогоров
Extremely high level:
10. https://www.google.com/
#books
👍4❤1
Pure Malware Development Resource Collections
https://github.com/malsearchs/Pure-Malware-Development.git
https://github.com/malsearchs/Pure-Malware-Development.git
👍5
Today I made public NativeBypassCredGuard, a tool to bypass Credential Guard by patching WDigest.dll using only NTAPI functions:
https://github.com/ricardojoserf/NativeBypassCredGuard.git
X: https://x.com/RicardoJoseRF
https://github.com/ricardojoserf/NativeBypassCredGuard.git
X: https://x.com/RicardoJoseRF
👍7
Hiding In PlainSight - Proxying DLL Loads To Hide From ETWTI Stack Tracing
https://0xdarkvortex.dev/proxying-dll-loads-for-hiding-etwti-stack-tracing/
https://0xdarkvortex.dev/proxying-dll-loads-for-hiding-etwti-stack-tracing/
🔥8👍3