SharedMemUtils - A simple tool to automatically find vulnerabilities in shared memory objects (commonly used for IPC in Windows services)
This tool immediately uncovered potential exploitation routes in both Nvidia and Dell Audio services on my system.
x86matthew.com/view_post?id=s…
It was great to be back at EY Tower for the first time since 2020 for another DC416 event last night! Thank you to the entire @EYCanada CTM team for hosting and sponsoring us!
It was a night filled with networking and learnings from Jake Adelson & Samy Ghannad!
1/3
[HackTip ⚒] When hunting for access to 3rd-party apps during the post-compromise phase, it might be useful to launch the Task Manager with PsExec as LocalSystem – after that dropping into someone’s logon session is as simple as right-clicking and ‘Connect’ into it 👹
@424f424f and I dropped some new initial access TTP's for your red team engagement at @WWHackinFest. You can leverage RDP files to bypass email attachment blocklists to plant C2 binaries, exfil data & steal clipboards.. or just phish Azure tokens! #wwhfslideshare.net/MichaelFelch/s…
Threat Hunting/Red Team #ProTip: I see a lot of people using single appdomains for executing C# directly in the main beacon/badger process in order to avoid loading CLRs over and over again. But what most people don't know about this is that Clr.dll, (1/3)
Windows privileges determine the type of operation a user account can perform on the OS and are sometimes abused by attackers. If you've ever wanted to know what a privilege is for, I've created the ultimate cheat sheet that shows all Windows privileges on one page!🤓 #infosec
Neat command from Ippsec :D
find / -newermt "2021-02-12" -newermt "2021-02-19" -ls| grep -v ' /etc\| /var/lib\| /sys\| /proc\| /boot'
It finds files from when a box was created then finds stuff the author of a box planted for the CTF :D
did you know? the syscall for WinAPI function GetAsyncKeyState queries the global keymap gafAsyncKeyState (exported) in the kernel. you can poll for keystrokes w/o registering a hook, installing a filter driver, or calling the WinAPI func- bypassing like 100% of A/Vs and ACs lol
Hi all,
MS-RPRN to coerce machine authentication is great but the service is often disabled nowadays by admins on most orgz.
Here is one another way we use to elicit machine account auth via MS-EFSRPC. Enjoy!! :)
github.com/topotam/PetitP…
#Protip: A lot of people don't understand that no matter how you encrypt/encode your shellcode in a C-stub, any good EDR which hooks WriteProcessMemory and analyses the RDX register can view the cleartext shellcode.. Unless your shellcode decodes/decrypts during execution itself.
#Protip: You can query a remote system's IPC share for it's full system path (NetShareEnum) to identify whether you have admin privs on that host; to maintain stealth instead of checking the admin share (C$) since IPCs do generate a lot of noise by default.
New blog: Payload generation with mingw. Walks through writing a PIC stager to load a mock implant, then a small server to patch the host/port/etc., compile both w/ mingw, and extract stager shellcode + convert implant w/ sRDI.
passthehashbrowns.github.io/dynamic-payloa…
928 Followers 2K Following☁️🛡️ opinions are mine. food, music and astrophotography when afk.
@TheDFIRReport @CuratedIntel
#ThreatHunting #DetectionEngineering #DFIR #CloudSecurity
828 Followers 1K Followingsummoner of demons | reinventor of wheels | shifter of bits | king of cups | plague doctor | visionary of tunnels | 1/4 of @HackForSatan
48K Followers 2K FollowingSpecializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.
123K Followers 1 FollowingTrue stories from the dark side of the Internet. Host @jackrhysider.
New episodes released on the first Tuesday of each month.
Discord: https://t.co/bZZRR8C59R
18K Followers 659 FollowingHacker, trainer, and guitarist | Black Hills InfoSec #RedTeam | @BreakForge Training | Produces music to hack to at @N0BANDW1DTH
25K Followers 2K FollowingNFP with the mission of #crowdsourcing OSINT to help find #missingpersons while training members in the tradecraft of #OSINT | Contact us at [email protected]
26K Followers 1K FollowingSenior Security Consultant @TrustedSec | Military grade meme poster, researcher, cloud penetration tester, voider of warranties. My thoughts are my own.
9K Followers 916 FollowingWe make stuff. We drink beer. In no particular order. @zappbrandnxor @Hyr0n1 @lacosteaef @F4NCI3 @cr4bf04m @5n4ck3y #mattdamon
5K Followers 1K FollowingCars, Bikes, Coffee and Embedded Systems Security | Founder @voidstarsec Training and Consulting
https://t.co/0ib8fK31Ib
https://t.co/YzN9K2LaST
73K Followers 323 FollowingA task force composed of our SophosLabs, SecOps, and SophosAI teams working together towards one goal: protecting our customers.
4K Followers 689 FollowingAll I know is that I know nothing. I like Windows, Active Directory and IoT/Hardware hacking.
"Responsable mais pas coupable" de PetitPotam
48K Followers 451 FollowingSecurity researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of @hextreeio. Contact: [email protected]