I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
Contrary to inaccurate reporting, CISA’s Red Teams are defending our critical infrastructure without interruption. Our Red Team is among the best in the world & remain laser focused helping identify & mitigate significant vulnerabilities & weaknesses. go.dhs.gov/wcB
A few weeks ago I gave a talk at @a41con on how to phish for PRTs and phishing resistant authentication methods 👀. The slides, plus a demo video on how to do this with credential phishing are now on my blog: dirkjanm.io/talks
Just because you get access denied accessing a folder, it doesn't mean you can't get access. A quick look at bypassing the security on the WindowsApps folder. tiraniddo.dev/2024/06/workin…
Quick preview of my ETW write-up that I did on the 'Microsoft-Windows-DotNETRuntime' Provider. Here I'm showing how certain EDR vendors are using this telemetry to build detections when .NET assemblies are reflective loaded from byte arrays.
Modern implant design: position independent malware development.
A small blog post on how to design "modern" malware with features like global variables, raw strings, and compile-time hashing.
5pider.net/blog/2024/01/2…
Repo: github.com/Cracked5pider/…
CIA Vault7 describes Stinger as a "UAC bypass that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as administrator". Here is my implementation that runs a command with SYSTEM privileges from a UAC restricted process github.com/hackerhouse-op…
Did you know that when you disable "Real-time protection" on defender, its true that you won't receive events on the Defender Event log anymore (related to that feature).
But if you actually subscribe to the AMSI ETW {2A576B87-09A7-520E-C21A-4942F0271D67} provider you'd still…
Have you ever wanted to write a better reflective loader? What about a perfect one? Learn how to do exactly that in our latest blog post from @mcbroom_evan: ghst.ly/3Q6HMgu
How to disable some parts of EDR’s telemetry on Windows 10? Just ask nicely!
See riskinsight-wavestone.com/en/2023/10/a-u… for more info about an interesting logic bug we found on Win10 that affects all EDRs 😉
detecting EDR services remotely without admin privs.
indicators:
- installed services: [MS-LSAT] LsarLookupNames()
- running processes: named pipes (there are some characteristic to EDRs)
needs some more testing and cleanup before release, but looks like promising.
Found this pretty useful cheatsheet/deep-dive that explains firewalls by referencing the ufw wrapper for iptables. Figured I'd share since it brought me some value. blog.kanbach.org/post/firewalls…
On an AWS pentest, I found cleartext passwords in CloudFormation Stack Outputs. Here's an easy way to check:
for region in {"us-east-1","us-east-2"}; do aws --region $region cloudformation describe-stacks --query 'Stacks[*].[StackName, Description, Parameters, Outputs]'; done
For those hyped at some of the AI chat stuff and want to pull this into tooling, might be worth looking again at Github Copilot.. it already offers some neat stuff and AFAIK is built on OpenAI tech. Below is a simple C shellcode stub translated into C# and explained pretty well.
Want to create great phishing links using an open-redirect on google.com? While they don't last forever, they are a great way to trick unsuspecting victims into clicking a legit looking URL before expiring! gist.github.com/ustayready/3ba… Follow the 🧵for how it works..
7K Followers 2K FollowingGlobal leader in hands-on learning for enterprise and cloud security education. Join 40000+ infosec professionals from 130+ countries
5 Followers 173 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/e4AxEQv1vH
7K Followers 2K FollowingGlobal leader in hands-on learning for enterprise and cloud security education. Join 40000+ infosec professionals from 130+ countries
12K Followers 490 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
1K Followers 580 FollowingRed teamer, my tools for red teaming: https://t.co/j6Z018m09L, my blog to share offensive security stuff: https://t.co/MKvSTjpWoi
4K Followers 4K FollowingIT Cybersecurity. Cybersecurity for Industrial Control Systems (ICS). Securing critical infrastructure is my passion! I always follow back!
63K Followers 336 FollowingMake a dent in the universe. Find something that needs improvement: go there and fix things. If not you, then who? {he/they}
609K Followers 1K FollowingWe make very small computers which you can buy from just $4. We are also the literal coolest. Be excellent to each other. Tech support: https://t.co/ZEBSfmuErK
284 Followers 268 FollowingWe offer full-spectrum cybersecurity services to Government and Industry. CYBER OPERATIONS | TOOL DEVELOPMENT | SOFTWARE DEVELOPMENT | SPACE MISSIONS | TRAINING
6K Followers 274 FollowingSenior Security Consultant @ Mandiant (part of Google Cloud). Tweets attributable to me — not current or former employers. Honneur de vous rendre compte.