π [ NinjaParanoid, Paranoid Ninja (Brute Ratel C4) ]
Recorded a video demonstration explaining full thread stack spoofing. Video includes Process Hacker for POC. Should be useful for both analysts on hunting suspicious threads and mapped regions in memory, unless of course someone is using Brute Ratel C4 π
https://t.co/qB6hzJESR9
π https://youtu.be/7EheXiC3MJE
π₯ [ tweet ]
Recorded a video demonstration explaining full thread stack spoofing. Video includes Process Hacker for POC. Should be useful for both analysts on hunting suspicious threads and mapped regions in memory, unless of course someone is using Brute Ratel C4 π
https://t.co/qB6hzJESR9
π https://youtu.be/7EheXiC3MJE
π₯ [ tweet ]
π [ joehowwolf, William Burgess ]
Ever wanted to make your sketchy sys calls look squeaky clean? I wrote a blog demonstrating a PoC which calls NtOpenProcess to grab a handle to lsass with an arbitrary/spoofed call stack: https://t.co/SWLenJazWW
PoC: https://t.co/jChX0KJrL8
π https://labs.withsecure.com/blog/spoofing-call-stacks-to-confuse-edrs/
π https://github.com/countercept/CallStackSpoofer
π₯ [ tweet ]
Ever wanted to make your sketchy sys calls look squeaky clean? I wrote a blog demonstrating a PoC which calls NtOpenProcess to grab a handle to lsass with an arbitrary/spoofed call stack: https://t.co/SWLenJazWW
PoC: https://t.co/jChX0KJrL8
π https://labs.withsecure.com/blog/spoofing-call-stacks-to-confuse-edrs/
π https://github.com/countercept/CallStackSpoofer
π₯ [ tweet ]
π [ TJ_Null, Tony ]
Since Microsoft plans to disable macros by default, I have decided to release a proof of concept that I use on my engagements by leveraging the document properties built in Microsoft Office.
Here is the link to the article: https://t.co/ZvgDxeuIJG
π https://www.offensive-security.com/offsec/macro-weaponization/
π₯ [ tweet ]
Since Microsoft plans to disable macros by default, I have decided to release a proof of concept that I use on my engagements by leveraging the document properties built in Microsoft Office.
Here is the link to the article: https://t.co/ZvgDxeuIJG
π https://www.offensive-security.com/offsec/macro-weaponization/
π₯ [ tweet ]
π [ HackAndDo, Pixis ]
Check out new lsassy release!
πΈNew dump modules
πΈUsable TGT are displayed alongside credentials
πΈDPAPI Masterkeys are retrieved
For more details you can check release 3.1.2 description
https://t.co/SgnyAW6sWN
π https://github.com/Hackndo/lsassy/releases/tag/v3.1.2
π₯ [ tweet ]
Check out new lsassy release!
πΈNew dump modules
πΈUsable TGT are displayed alongside credentials
πΈDPAPI Masterkeys are retrieved
For more details you can check release 3.1.2 description
https://t.co/SgnyAW6sWN
π https://github.com/Hackndo/lsassy/releases/tag/v3.1.2
π₯ [ tweet ]
π [ ShitSecure, S3cur3Th1sSh1t ]
An relatively easy way to use stack encryption for your implant?
@SolomonSklashβs SleepyCrypt can easily be used from any language:
https://t.co/IiMHZSLXY5
This for example is how to do it with Nim:
https://t.co/Pjr6MJT8hC
Can also be used for Nim C2 implants as Sleep π₯π
π https://github.com/SolomonSklash/SleepyCrypt
π https://gist.github.com/S3cur3Th1sSh1t/6022dc2050bb1b21be2105b8b0dc077d
π₯ [ tweet ]
An relatively easy way to use stack encryption for your implant?
@SolomonSklashβs SleepyCrypt can easily be used from any language:
https://t.co/IiMHZSLXY5
This for example is how to do it with Nim:
https://t.co/Pjr6MJT8hC
Can also be used for Nim C2 implants as Sleep π₯π
π https://github.com/SolomonSklash/SleepyCrypt
π https://gist.github.com/S3cur3Th1sSh1t/6022dc2050bb1b21be2105b8b0dc077d
π₯ [ tweet ]
π [ theluemmel, S4U2LuemmelSec ]
Wrote a small tool to check if RBCD can be abused by checking both ms-ds-machineaccountquota & SeMachineAccountPrivilege
https://t.co/1iYoI8bTCr
Happy pentesting / defending
π https://github.com/LuemmelSec/Pentest-Tools-Collection/blob/main/tools/RBCD_Abuse_Checker.ps1
π₯ [ tweet ]
Wrote a small tool to check if RBCD can be abused by checking both ms-ds-machineaccountquota & SeMachineAccountPrivilege
https://t.co/1iYoI8bTCr
Happy pentesting / defending
π https://github.com/LuemmelSec/Pentest-Tools-Collection/blob/main/tools/RBCD_Abuse_Checker.ps1
π₯ [ tweet ]
π [ chvancooten, Cas van Cooten ]
Kicked off my "MalDev for Dummies" workshop successfully yesterday, which means the repo is now public! Slides, exercises, example code and resources to get you started on your malware development journey. C# and Nim supported for now. Enjoy!!
https://t.co/Z8aQ41QvHQ
π https://github.com/chvancooten/maldev-for-dummies
π₯ [ tweet ]
Kicked off my "MalDev for Dummies" workshop successfully yesterday, which means the repo is now public! Slides, exercises, example code and resources to get you started on your malware development journey. C# and Nim supported for now. Enjoy!!
https://t.co/Z8aQ41QvHQ
π https://github.com/chvancooten/maldev-for-dummies
π₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
π [ _wald0, Andy Robbins ]
Today is Friday, which means it's #BloodHoundBasics day.
Too many nodes on the screen? Press space bar to bring up the spotlight, which lists all drawn nodes. Click a node to highlight and zoom into it. You can also search for drawn nodes in the spotlight:
π₯ [ tweet ]
Today is Friday, which means it's #BloodHoundBasics day.
Too many nodes on the screen? Press space bar to bring up the spotlight, which lists all drawn nodes. Click a node to highlight and zoom into it. You can also search for drawn nodes in the spotlight:
π₯ [ tweet ]
π [ podalirius_, Podalirius ]
I published a tool to #bruteforce the key of @CodeIgniter's session #cookies, in order to sign arbitrary attacker-controlled cookiesπͺ
I wrote this tool for a use case encountered in #bugbounty recently, but we can find this in #pentest too.
https://t.co/7JIiYQskoG
π https://github.com/p0dalirius/CodeIgniter-session-unsign
π₯ [ tweet ]
I published a tool to #bruteforce the key of @CodeIgniter's session #cookies, in order to sign arbitrary attacker-controlled cookiesπͺ
I wrote this tool for a use case encountered in #bugbounty recently, but we can find this in #pentest too.
https://t.co/7JIiYQskoG
π https://github.com/p0dalirius/CodeIgniter-session-unsign
π₯ [ tweet ]
π [ 0gtweet, Grzegorz Tworek ]
Is #SysInternals Sysmon good for discovering the full historical process tree? Of course! Bored with manual process, I have create simple (but fully working) PowerShell script, displaying the tree in a nicely walkable form. Enjoy: https://t.co/eZFIDBT2lN
π https://github.com/gtworek/PSBits/blob/master/DFIR/GetSysmonTree.ps1
π₯ [ tweet ]
Is #SysInternals Sysmon good for discovering the full historical process tree? Of course! Bored with manual process, I have create simple (but fully working) PowerShell script, displaying the tree in a nicely walkable form. Enjoy: https://t.co/eZFIDBT2lN
π https://github.com/gtworek/PSBits/blob/master/DFIR/GetSysmonTree.ps1
π₯ [ tweet ]
π€2
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
[#HackStory π§΅] (1/4) Hereβs a generic case of reaching a locked-down PC from a firewalled segment in AD. The background is: 172.16.66.6 (the target) can talk to 192.168.1.11 (a PWNed server) but not vice versa and to no one else in the foreseeable network π
#ad #pentest
π₯ [ tweet ]
[#HackStory π§΅] (1/4) Hereβs a generic case of reaching a locked-down PC from a firewalled segment in AD. The background is: 172.16.66.6 (the target) can talk to 192.168.1.11 (a PWNed server) but not vice versa and to no one else in the foreseeable network π
#ad #pentest
π₯ [ tweet ]
π₯1
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
(2/4) Being a DA an adversary can create an evil GPO that will coerce Immediate Scheduled Task execution on the target. The task downloads and executes a PS cradle pointing to the PWNed server. Sure, thereβre fancy (py|Sharp)GPOAbuse, etcβ¦ But when itβs a pentest, who cares π
π₯ [ tweet ]
(2/4) Being a DA an adversary can create an evil GPO that will coerce Immediate Scheduled Task execution on the target. The task downloads and executes a PS cradle pointing to the PWNed server. Sure, thereβre fancy (py|Sharp)GPOAbuse, etcβ¦ But when itβs a pentest, who cares π
π₯ [ tweet ]
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
(3/4) Meanwhile, some v4tov4 port proxies are configured on the pivot point by the adversary via netsh π
π₯ [ tweet ]
(3/4) Meanwhile, some v4tov4 port proxies are configured on the pivot point by the adversary via netsh π
π₯ [ tweet ]
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
(4/4) After 90 to 120 minutes the GPO gets applied and the adversary receives a reverse shell / C2 agent on his box with a further ability to spawn a reverse SOCKS proxy π
π₯ [ tweet ]
(4/4) After 90 to 120 minutes the GPO gets applied and the adversary receives a reverse shell / C2 agent on his box with a further ability to spawn a reverse SOCKS proxy π
π₯ [ tweet ]
π₯2
πΉ [ snovvcrash, snπ₯Άvvcrπ₯sh ]
(5/4) Not the last to be mentioned that GPOs are not the only way to coerce job execution on a group of targets. Thereβre also some lovely control centers that some commercial AV/EDR developers gently provide pentesters with π€«
π₯ [ tweet ]
(5/4) Not the last to be mentioned that GPOs are not the only way to coerce job execution on a group of targets. Thereβre also some lovely control centers that some commercial AV/EDR developers gently provide pentesters with π€«
π₯ [ tweet ]
π [ mariuszbit, Mariusz Banach ]
π Can't count in how many Active Directory audits this monstrous Cypher query helped me swiftly collect stats of a #BloodHound collection!β‘
Simply Find & Replace "contoso.com" w/ your target domain aaaand you have it
https://t.co/2ChJ1n7Qzo
Helpful? Lemme know!π
π https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md
π₯ [ tweet ]
π Can't count in how many Active Directory audits this monstrous Cypher query helped me swiftly collect stats of a #BloodHound collection!β‘
Simply Find & Replace "contoso.com" w/ your target domain aaaand you have it
https://t.co/2ChJ1n7Qzo
Helpful? Lemme know!π
π https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md
π₯ [ tweet ]
π [ 0xdf_, 0xdf ]
Undetected from @hackthebox_eu has me following in the steps of a previous attacker. There's an insecure PHP module, reversing a malicious kernel exploit and a backdoored sshd. Lots of Ghidra and understanding the attackers steps and reusing them.
https://t.co/ItYsl66OVM
π https://0xdf.gitlab.io/2022/07/02/htb-undetected.html
π₯ [ tweet ]
Undetected from @hackthebox_eu has me following in the steps of a previous attacker. There's an insecure PHP module, reversing a malicious kernel exploit and a backdoored sshd. Lots of Ghidra and understanding the attackers steps and reusing them.
https://t.co/ItYsl66OVM
π https://0xdf.gitlab.io/2022/07/02/htb-undetected.html
π₯ [ tweet ]