π [ nas_bench, Nasreddine Bencherchali ]
In addition to the documented "-e/--exec" flag in #lolbas about the "wsl.exe" binary (https://t.co/OrgJ7c7o9N). We can also use the "--system" flag to run Linux (as root) /Windows commands.
wsl --system [Command]
π https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wsl/
π₯ [ tweet ]
In addition to the documented "-e/--exec" flag in #lolbas about the "wsl.exe" binary (https://t.co/OrgJ7c7o9N). We can also use the "--system" flag to run Linux (as root) /Windows commands.
wsl --system [Command]
π https://lolbas-project.github.io/lolbas/OtherMSBinaries/Wsl/
π₯ [ tweet ]
π [ Flangvik, Melvin langvik ]
ππ @_RastaMouse https://t.co/QIeLHNngVz
π https://training.zeropointsecurity.co.uk/courses/red-team-ops-II
π₯ [ tweet ]
ππ @_RastaMouse https://t.co/QIeLHNngVz
π https://training.zeropointsecurity.co.uk/courses/red-team-ops-II
π₯ [ tweet ]
π1
π [ reverseame, reverseame ]
The curious case of mavinject.exe https://t.co/UcUjZ2wsFR
π https://fourcore.io/blogs/mavinject-curious-process-injection
π₯ [ tweet ]
The curious case of mavinject.exe https://t.co/UcUjZ2wsFR
π https://fourcore.io/blogs/mavinject-curious-process-injection
π₯ [ tweet ]
π1
π [ elkement, elkement ]
One more post about Microsoft's recent security updates - re changes to Kerberos and the new certificate extension containing the requester's SID: https://t.co/TbACZaFARl
π https://elkement.blog/2022/06/13/defused-that-san-flag/
π₯ [ tweet ]
One more post about Microsoft's recent security updates - re changes to Kerberos and the new certificate extension containing the requester's SID: https://t.co/TbACZaFARl
π https://elkement.blog/2022/06/13/defused-that-san-flag/
π₯ [ tweet ]
π1
π [ ORCA10K, ORCA ]
just published "RelocAlloc", a poc to allocate memory for your shellcode, using .reloc section(s), avoiding VirtualAlloc and others
https://t.co/9UNT0aDnJJ
π https://gitlab.com/ORCA666/relocalloc
π₯ [ tweet ]
just published "RelocAlloc", a poc to allocate memory for your shellcode, using .reloc section(s), avoiding VirtualAlloc and others
https://t.co/9UNT0aDnJJ
π https://gitlab.com/ORCA666/relocalloc
π₯ [ tweet ]
π1
This media is not supported in your browser
VIEW IN TELEGRAM
π [ x86matthew, x86matthew ]
ProcEnvInjection - Remote code injection by abusing process environment strings in CreateProcess.
Another method of injecting code into a remote process without using WriteProcessMemory. π
https://t.co/PxaiiFVjV8
π https://www.x86matthew.com/view_post?id=proc_env_injection
π₯ [ tweet ]
ProcEnvInjection - Remote code injection by abusing process environment strings in CreateProcess.
Another method of injecting code into a remote process without using WriteProcessMemory. π
https://t.co/PxaiiFVjV8
π https://www.x86matthew.com/view_post?id=proc_env_injection
π₯ [ tweet ]
π2
π [ DebugPrivilege, β’ ]
The right answer:
I've seen lots of incomplete answers, but only a few people got it right. Also, no. We technically don't even need SeDebugPrivilege :)
π₯ [ tweet ][ quote ]
The right answer:
I've seen lots of incomplete answers, but only a few people got it right. Also, no. We technically don't even need SeDebugPrivilege :)
π₯ [ tweet ][ quote ]
π [ PortSwiggerRes, PortSwigger Research ]
Bypassing CSP with dangling iframes by @garethheyes
https://t.co/G3yPQQfYR2
π https://portswigger.net/research/bypassing-csp-with-dangling-iframes
π₯ [ tweet ]
Bypassing CSP with dangling iframes by @garethheyes
https://t.co/G3yPQQfYR2
π https://portswigger.net/research/bypassing-csp-with-dangling-iframes
π₯ [ tweet ]
π1
π [ hasherezade, hasherezade ]
Updated #mal_unpack (v0.9.5) is ready! check it out: https://t.co/OCcdgd5AiO // (#PEsieve-based)
π https://github.com/hasherezade/mal_unpack/releases
π₯ [ tweet ]
Updated #mal_unpack (v0.9.5) is ready! check it out: https://t.co/OCcdgd5AiO // (#PEsieve-based)
π https://github.com/hasherezade/mal_unpack/releases
π₯ [ tweet ]
π1
π [ Tyl0us, Matt Eidelberg ]
Small update to ScareCrow. Shoutout to @mariuszbit for the feature request. Check it out: https://t.co/VIQVnKd2tJ
#netsec #redteam #EDR #evasion
π https://github.com/optiv/ScareCrow
π₯ [ tweet ]
Small update to ScareCrow. Shoutout to @mariuszbit for the feature request. Check it out: https://t.co/VIQVnKd2tJ
#netsec #redteam #EDR #evasion
π https://github.com/optiv/ScareCrow
π₯ [ tweet ]
π1
π [ tiraniddo, James Forshaw ]
The reason I didn't open my RCG bug last month was because MS didn't fix it correctly. As I found out before the 30 day patch soak time was up they got the remainder of the 90 days to really fix it. I guess we'll find out if they did or not soon enoughπhttps://t.co/YxbpQTR7La
π https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150
π₯ [ tweet ]
The reason I didn't open my RCG bug last month was because MS didn't fix it correctly. As I found out before the 30 day patch soak time was up they got the remainder of the 90 days to really fix it. I guess we'll find out if they did or not soon enoughπhttps://t.co/YxbpQTR7La
π https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30150
π₯ [ tweet ]
π1
π [ mariuszbit, Mariusz Banach ]
π₯Working hard on a public release of my Malware Dev CI/CD toolkit
β’οΈProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
β’οΈRedBackdoorer - PE shellcode injection via 6 techniques
β’οΈRedWatermarker - IOC injector for implants tracking
Already available to my sponsors πβ¨
π₯ [ tweet ]
π₯Working hard on a public release of my Malware Dev CI/CD toolkit
β’οΈProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
β’οΈRedBackdoorer - PE shellcode injection via 6 techniques
β’οΈRedWatermarker - IOC injector for implants tracking
Already available to my sponsors πβ¨
π₯ [ tweet ]
π1
π [ 0gtweet, Grzegorz Tworek ]
A new tool has arrived! π
Somewhat like netstat, but with timestamps for connections!β±
The C source code, and the compiled exe, as usual - https://t.co/dz7BOPzOpW
π https://github.com/gtworek/PSBits/tree/master/NetstatWithTimestamps
π₯ [ tweet ]
A new tool has arrived! π
Somewhat like netstat, but with timestamps for connections!β±
The C source code, and the compiled exe, as usual - https://t.co/dz7BOPzOpW
π https://github.com/gtworek/PSBits/tree/master/NetstatWithTimestamps
π₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
π [ DirectoryRanger, DirectoryRanger ]
Post Compromise Active Directory Checklist
https://t.co/e85wblANnW
π https://www.pwndefend.com/2021/09/15/post-compromise-active-directory-checklist/
π₯ [ tweet ]
Post Compromise Active Directory Checklist
https://t.co/e85wblANnW
π https://www.pwndefend.com/2021/09/15/post-compromise-active-directory-checklist/
π₯ [ tweet ]
π1
π [ SEKTOR7net, SEKTOR7 Institute ]
Hollowing a shell process to run a shellcode, all with just a 'dd'. Introducing DDExec by arget13
https://t.co/njGfKGSUmx
π https://github.com/arget13/DDexec
π₯ [ tweet ]
Hollowing a shell process to run a shellcode, all with just a 'dd'. Introducing DDExec by arget13
https://t.co/njGfKGSUmx
π https://github.com/arget13/DDexec
π₯ [ tweet ]
π1
π [ FuzzySec, b33f | πΊπ¦β ]
This is great stuff! https://t.co/9hWHgRDu65
π https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
π₯ [ tweet ][ quote ]
This is great stuff! https://t.co/9hWHgRDu65
π https://zeronetworks.com/blog/stopping_lateral_movement_via_the_rpc_firewall/
π₯ [ tweet ][ quote ]