Игровые античит движки начали внедрять техники определения работы под гипервизором на основе временных лагов
https://vmcall.blog/battleye-hypervisor-detection/
https://vmcall.blog/battleye-hypervisor-detection/
Reviving MuddyC3 Used by MuddyWater (IRAN) APT
https://shells.systems/reviving-leaked-muddyc3-used-by-muddywater-apt/
https://shells.systems/reviving-leaked-muddyc3-used-by-muddywater-apt/
Shells.Systems
Reviving MuddyC3 Used by MuddyWater (IRAN) APT - Shells.Systems
Estimated Reading Time: 10 minutes Note : This article contain two parts one for Blue Teams and the other for red teams. go to the part you interested in or read both if you are purple team guy 😀 . MuddyWater is a well-known threat actor group founded by…
Forwarded from Noise Security Bit (Alex)
Интересная статья "R.I.P ROP: CET Internals in Windows 20H1" о внутреннем устройстве Control-flow Enforcement Technology.
https://windows-internals.com/cet-on-windows/
https://windows-internals.com/cet-on-windows/
RDP to RCE: When Fragmentation Goes Wrong
https://www.kryptoslogic.com/blog/2020/01/rdp-to-rce-when-fragmentation-goes-wrong/
https://www.kryptoslogic.com/blog/2020/01/rdp-to-rce-when-fragmentation-goes-wrong/
Kryptoslogic
RDP to RCE: When Fragmentation Goes Wrong
Remote Desktop Gateway (RDG), previously known as Terminal Services Gateway, is a Windows Server component that provides routing for Remote Desktop (RDP). Rather then users connecting directly to an RDP Server, users instead connect and authenticate to the…
Утилита для автоматической генерации ROP-цепочек https://github.com/d4em0n/exrop
GitHub
GitHub - d4em0n/exrop: Automatic ROPChain Generation
Automatic ROPChain Generation. Contribute to d4em0n/exrop development by creating an account on GitHub.
Using RDP without GUI for lateral movement
https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3
https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3
Medium
Revisiting Remote Desktop Lateral Movement
It’s no secret that attackers are looking for new techniques to execute lateral movement. However, there are only a handful of publicly…
Forwarded from r0 Crew (Channel)
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor https://github.com/changeofpace/VivienneVMM #exploitation #dukeBarman
GitHub
GitHub - changeofpace/VivienneVMM: VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor. - changeofpace/VivienneVMM
Using .NET with Aggressor scripting for automating of lateral movement & persistence
https://posts.specterops.io/move-faster-stay-longer-6b4efab9c644
https://posts.specterops.io/move-faster-stay-longer-6b4efab9c644
Medium
Move faster, Stay longer
Offensive operators typically have their set of “go to” post-exploitation tools and methodologies. Among these, is Cobalt Strike — a very…
.NET Scripting languages (Boolang) in Red Teaming
https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/
https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/
Black Hills Information Security, Inc.
Red Teamer's Cookbook: BYOI (Bring Your Own Interpreter) - Black Hills Information Security, Inc.
Marcello Salvati // This fairly lengthy blog post aims at providing Red Team Operators ideas on how to incorporate BYOI tradecraft into their own custom tooling and get those creative […]
Forwarded from r0 Crew (Channel)
Skeleton project for your own GRUB-based bootkit https://github.com/mgrube/GRUBKit #exploitation
GitHub
GitHub - mgrube/GRUBKit: Skeleton project for your own GRUB-based bootkit
Skeleton project for your own GRUB-based bootkit. Contribute to mgrube/GRUBKit development by creating an account on GitHub.
Critical Bluetooth Vulnerability in Android (CVE-2020-0022)
https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/
https://insinuator.net/2020/02/critical-bluetooth-vulnerability-in-android-cve-2020-0022/
Insinuator.net
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
On November 3rd, 2019, we have reported a critical vulnerability affecting the Android Bluetooth subsystem. This vulnerability has been assigned CVE-2020-0022 and was now patched in the latest security patch from February 2020. The security impact is as follows:…
Forging SWIFT MT Payment Messages for fun and pr... research!
https://labs.f-secure.com/blog/forging-swift-mt-payment-messages
https://labs.f-secure.com/blog/forging-swift-mt-payment-messages
Network data manipulation on the fly
https://blog.redteam.pl/2020/02/network-data-manipulation-on-fly.html
https://blog.redteam.pl/2020/02/network-data-manipulation-on-fly.html
Official VirusTotal Plugin for IDA Pro 7
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html
https://blog.virustotal.com/2020/02/official-virustotal-plugin-for-ida-pro-7.html
Virustotal
Official VirusTotal Plugin for IDA Pro 7
ATTENTION : In order to use the content search functionality you will need to have access to VT Intelligence . If you want to jump str...