12.5K subscribers
550 photos
27 videos
24 files
889 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
Bypass Defender AV static detection:

If you name a malicious file *.log Defender doesn't scan it.

UPD:
DumpStack (by any file number) can bypass MDE easily with no detection as mimikatz or eicar mode.
The malicious file can be shown in the console but not identified as malicious.

#defender #evasion #tricks
🔥5
Process Injection via KernelCallBackTable

Process injection via the KernelCallBackTable involves replacing original callback function by custom payload so that whenever the function is invoked, payload will be triggered. In this case the fnCOPYDATA callback function has been used.

C# Code Snippet:
https://gist.github.com/sbasu7241/5dd8c278762c6305b4b2009d44d60c13

#edr #evasion #dll #injection #kernelcallbacktable
👍2
RemoteNET

This library lets you examine, create and interact with remote objects in other .NET processes.
It's like System.Runtime.Remoting except the other app doesn't need to be compiled (or consent) to support it.

Basically this library lets you mess with objects of any other .NET app without asking for permissions

https://github.com/theXappy/RemoteNET

#csharp #injection #pentest
EDR Parallel-asis through Analysis

New method for enumerating Syscalls numbers using the Parallel loader

Research:
https://www.mdsec.co.uk/2022/01/edr-parallel-asis-through-analysis/

C++ Code Snipped:
https://github.com/mdsecactivebreach/ParallelSyscalls

C# Code Snipped:
https://github.com/cube0x0/ParallelSyscalls

#edr #evasion #parallel #csharp
Domain Domination With Windows Shortcuts

This article on malicious shortcut files and how they can be leveraged to capture NTLM hashes quietly and dominate a network or domain.

https://medium.com/cybersecpadawan/domain-domination-with-windows-shortcuts-6aab1d72b793

#shortcuts #lnk #abuse #windows
👍3
Log4jHorizon

A proof of concept for VMWare Horizon instances and allows attackers to execute code as an unauthenticated user using a single HTTP request.

Research:
https://www.sprocketsecurity.com/blog/crossing-the-log4j-horizon-a-vulnerability-with-no-return

Exploit:
https://github.com/puzzlepeaches/Log4jHorizon

#log4j #vmware #horizon #rce
👍3
Domain Escalation — ShadowCoerce (MS-FSRVP)

Coercing the domain controller machine account to authenticate to a host which is under the control of a threat actor could lead to domain compromise. The most notable technique which involves coerced authentication is the PetitPotam attack which uses the Encrypting File System Remote Protocol (MS-EFSR). However, this is not the only protocol which could be utilized for domain escalation.

Research:
https://pentestlaboratories.com/2022/01/11/shadowcoerce/

PoC:
https://github.com/ShutdownRepo/ShadowCoerce

#ad #escalation #relay #redteam
Bypass EDR with Microsoft Teams

Copy payload into:
%userprofile%\AppData\Local\Microsoft\Teams\current\

Then:
%userprofile%\AppData\Local\Microsoft\Teams\Update.exe --processStart payload.exe --process-start-args "args"

#edr #evasion #teams
Active Directory ACL Visualizer and Explorer

adalanche tool gives instant results, showing you what permissions users and groups have in an Active Directory. It is useful for visualizing and exploring who can take over accounts, machines or the entire domain, and can be used to find and show misconfigurations.

https://github.com/lkarlslund/adalanche

#ad #acl #visualizer #blueteam #redteam