12.6K subscribers
550 photos
27 videos
24 files
889 links
This channel discusses:

— Offensive Security
— RedTeam
— Malware Research
— OSINT
— etc

Disclaimer:
t.iss.one/APT_Notes/6

Chat Link:
t.iss.one/APT_Notes_PublicChat
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥9👍4
🕷 ADSpider

Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update Sequence Number (USN) to filter current properties of objects.

🔗 Research:
https://habr.com/ru/companies/angarasecurity/articles/697938/

🔗 Source:
https://github.com/DrunkF0x/ADSpider

———
Наконец-то появилась на свет, а точнее в паблике, утилита ADSpider от моего горячо любимого @DrunkF0x. Ура-ура! 💃

#ad #windows #monitoring #tools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥104👍4👎1
🖥 Windows KASLR bypass using prefetch side-channel

A proof-of-concept tool for bypassing KASLR (kernel ASLR) on Windows 11. Inspired by EntryBleed for Linux. This tool was developed as part of an exploit targetting Windows 11 24H2.

CPU Support:
— Intel: Reliable
— AMD: Flaky ⚠️

🔗 Research:
https://exploits.forsale/24h2-nt-exploit/

🔗 Source:
https://github.com/exploits-forsale/prefetch-tool

#windows11 #aslr #kaslr #research
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6🔥2
😈 dirDevil: Hiding Code and Content Within Folder Structures

This article describes a method for hiding data within directory structures by using GUIDs in folder names to encode information. This approach bypasses AV and DLP systems since the data is stored in folder names rather than files, making it difficult to detect and analyze.

🔗 Research:
https://trustedsec.com/blog/dirdevil-hiding-code-and-content-within-folder-structures

🔗 Source:
https://github.com/nyxgeek/dirdevil

#hide #code #folder #evasion
🔥8❤‍🔥7👍41
⚙️ Remote Session Enumeration

The blog post explores how to enumerate remote user sessions on Windows using undocumented Windows APIs, specifically focusing on the implementation and usage of the WinStation API.

🔗 Research:
https://0xv1n.github.io/posts/sessionenumeration/

🔗 Source:
https://github.com/0xv1n/RemoteSessionEnum/blob/main/main.cpp

#windows #qwinsta #session #winapi #cpp
👍8
Forwarded from RedTeam brazzers (Миша)
Кросс-сессионная активация или захватываем сессию пользователя без RemotePotato0, TGSThief, mimikatz и Process Injection!

Давным-давно я писал о способе злоупотребления интерфейсом IHxHelpPaneServer. Однако вы когда в последний раз использовали моникеры? И я давным-давно... Поэтому нужно было найти альтернативный способ исполнения кода в сессии другого пользователя, забыв про все техники внедрения.

Если посмотреть на код RemotePotato0 или RemoteKrbRelay , то можно заметить использование недокументированных интерфейсов ISpecialSystemProperties и IStandartActivator. Причем не сказать, что их использование довольно редкое. Их можно встретить в любой программе, которая позволяет стащить учётные данные (имеет переключатель -session). Сами по себе, они позволяют контролировать сессию, в которой создавать COM-объект. Ранее мы ловили от них только аутентификацию, но что мешает соединить использование этих интерфейсов с описанным в SeMishaPrivilege COM-классом IHxHelpPaneServer? Конечно же ничего!

И я написал небольшой POC, который выложил на GitHub . Если вам интересно подробно окунуться в принцип работы инструмента, то советую обратить внимание на нашу статью на medium :)
6👍4
💻 BIOS bootloader from scratch in ASM

Dive into building a BIOS bootloader from scratch to boot an x86 CPU into 64-bit mode. From ASM basics to integrating with C, unravel the complexities step-by-step.

🔗 Research:
https://thasso.xyz/2024/07/13/setting-up-an-x86-cpu.html

🔗 Code:
https://github.com/thass0/blog-code/tree/main/2024-07-13-setting-up-an-x86-cpu

#bios #loader #asm #clang
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥11👍1
😎 Gigaproxy — One Proxy to Rule Them All

If you’re looking for a powerful tool to help you bypass Web Application Firewalls (WAFs) during external penetration tests and bug bounty programs, you’re in the right place. Gigaproxy tool is designed to rotate IPs using mitmproxy, AWS API Gateway, and Lambda. Fireprox is great but has one major downside. You can only target a single host at a time. Gigaproxy solves this.

🔗 Research:
https://www.sprocketsecurity.com/resources/gigaproxy

🔗 Source:
https://github.com/Sprocket-Security/gigaproxy

#ip #rotate #aws #api #gateway #proxy
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10👍51
🖥 Introduction for to Windows kernel exploitation

Explore the Windows Kernel with HEVD, a vulnerable driver. Dive into stack overflow exploits and bypass SMEP/KPTI protections using the sysret approach.
A detailed guide for Windows kernel explotation:

Part 0: Where do I start?
Part 1: Will this driver ever crash?
Part 2: Is there a way to bypass kASLR, SMEP and KVA Shadow?
Part 3: Can we rop our way into triggering our shellcode?
Part 4: How do we write a shellcode to elevate privileges and gracefully return to userland?

#windows #kernel #driver #hevd #hacksys
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7🔥7
💻 Chrome Extension For Persistence

How to silently install any Chrome extension and avoid common indicators of compromise (IOCs). The method avoids using CLI parameters or registry edits, and persists via the Secure Preferences file

🔗 Source:
https://syntax-err0r.github.io/Silently_Install_Chrome_Extension.html

#chrome #persistence #maldev #c2
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥161👍1
Forwarded from vx-underground
How to fix the Crowdstrike thing:

1. Boot Windows into safe mode
2. Go to C:\Windows\System32\drivers\CrowdStrike
3. Delete C-00000291*.sys
4. Repeat for every host in your enterprise network including remote workers
5. If you're using BitLocker jump off a bridge
😁41👍65
🛠 Adventures in Shellcode Obfuscation

This series of articles explores various methods for hiding shellcode, emphasizing techniques to avoid detection. The focus is on demonstrating diverse approaches to conceal shellcode.

🔗 Part 1: Overview
🔗 Part 2: Hail Caesar
🔗 Part 3: Encryption
🔗 Part 4: RC4 with a Twist
🔗 Part 5: Base64
🔗 Part 6: Two Array Method
🔗 Part 7: Flipping the Script
🔗 Part 8: Shellcode as IP Addresses
🔗 Part 9: Shellcode as UUIDs
🔗 Part 10: Shellcode as MAC Addresses
🔗 Part 11: Jargon
🔗 Part 12: Jigsaw
🔗 Part 13: Calculating Offsets
🔗 Part 14: Further Research

#shellcode #obfuscation #clang #maldev
🔥195😱1
Forwarded from Offensive Xwitter
😈 [ Print3M @Print3M_ ]

I wrote my first calc.exe "shellcode" in NASM. I find it a little strange that a lot of people write about malware development but almost no one talks about writing your own shellcode. I decided to write something on my own. (good comments, easy readable)

🔗 https://github.com/Print3M/shellcodes/blob/main/calc-exe.asm

🐥 [ tweet ]

#для_самых_маленьких
8👍4
👩‍💻 Anyone can Access Deleted and Private Repository Data on GitHub

You can access data from deleted forks, deleted repositories and even private repositories on GitHub. And it is available forever. This is known by GitHub, and intentionally designed that way. Cross Fork Object Reference (CFOR) vulnerability occurs when one repository fork can access sensitive data from another fork (including data from private and deleted forks).

— Deleted Fork Data: Still accessible.
— Deleted Repo Data: Commits remain.
— Private Repo Data: Can become public.

🔗 Research:
https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github

#github #private #repo #cfor
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥156👍4👏1
🖥 Find and execute WinAPI functions with Assembly

If you want to take a happy little journey through PEB structs, PE headers and kernel32.dll Export Table to spawn some "calc.exe" on x64 using Assembly, here it is.

📚 What you will learn:

— WinAPI function manual location with Assembly;
— PEB Structure and PEB_LDR_DATA;
— PE File Structure;
— Relative Virtual Address calculation;
— Export Address Table (EAT);
— Windows x64 calling-convention in practice;
— Writing in Assembly like a real Giga-Chad...

🔗 Source:
https://print3m.github.io/blog/x64-winapi-shellcoding

#maldev #winapi #x64 #shellcode #assembly
Please open Telegram to view this post
VIEW IN TELEGRAM
👍10🔥3
This media is not supported in your browser
VIEW IN TELEGRAM
🥔 DeadPotato

This is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. This script has been customized from the original GodPotato source code by BeichenDream.

🔗 Source:
https://github.com/lypd0/DeadPotato

#windows #lpe #potato #seimpersonate
🔥251👍1🤔1
Forwarded from Offensive Xwitter
😈 [ Cube0x0 @cube0x0 ]

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time.

Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and MacOS environments:

🔗 https://0xc2.io

The first release was back in late 2023, initially only offered to a small circle of red teamers and soon, the registration will be open for new clients who provide threat simulation services.

All agents are written as PIC in C to provide better opsec and to allow operators to be more flexible when designing payloads. To make the agents modular and fully customizable, operators can create a user-defined virtual table that can be hooked by the agent. This can be used to change the default behavior of an agent or extend capabilities, from adding internal commands to implementing P2P protocols.

More details will be available soon.

🐥 [ tweet ]
🔥12👏43👍1
👻 Ghost in the PPL: BYOVDLL

This blog post explores bypassing LSA Protection in Userland through the "Bring Your Own Vulnerable DLL" (BYOVDLL) technique. It also delves into the successful exploitation of vulnerabilities in the CNG Key Isolation service and the methods employed to load vulnerable DLLs within protected processes.

🔗 Source:
https://itm4n.github.io/ghost-in-the-ppl-part-1/

#lsa #lsass #ppl #dll #maldev
🔥12😱31
Forwarded from 1N73LL1G3NC3
Whitepaper_DriverJack_Abusing_Emulated_Read_Only_Filesystems_and.pdf
3.8 MB
DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector

By: Alessandro Magnosi (@klezVirus)

DriverJack

Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths

Key Attack Phases:
   1) ISO Mounting and Driver Selection
1.1) The attack begins with mounting the ISO as a filesystem.
1.2) The attacker selects a service driver that can be manipulated, focusing on those that can be started or restarted without immediate detection.
2) Hijacking the Driver Path
2.1) The core of the attack involves hijacking the driver path. The methods used include:
2.2) Direct Reparse Point Abuse
2.3) DosDevice Global Symlink Abuse
2.4) Drive Mountpoint Swap
🔥11👍42