LDAPFragger: Command and Control over LDAP attributes
https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
Fox-IT International blog
LDAPFragger: Command and Control over LDAP attributes
Written by Rindert Kramer Introduction A while back during a penetration test of an internal network, we encountered physically segmented networks. These networks contained workstations joined to t…
C2concealer: a C2 Malleable Profile Generator for Cobalt Strike
https://fortynorthsecurity.com/blog/introducing-c2concealer/
https://fortynorthsecurity.com/blog/introducing-c2concealer/
FortyNorth Security Blog
Introducing C2concealer: a C2 Malleable Profile Generator for Cobalt Strike
C2concealer is a python3 command-line tool that generates c2 malleable profiles for use with Cobalt Strike. Looking to get up and running quick? Code is available here. C2concealer: what's the story?Red team assessments and penetration tests involve a ton…
Remote Image Upload Leads to RCE (Inject Malicious Code to PHP-GD Image)
https://medium.com/@asdqwedev/remote-image-upload-leads-to-rce-inject-malicious-code-to-php-gd-image-90e1e8b2aada
https://medium.com/@asdqwedev/remote-image-upload-leads-to-rce-inject-malicious-code-to-php-gd-image-90e1e8b2aada
Medium
Remote Image Upload Leads to RCE (Inject Malicious Code to PHP-GD Image)
بسم الله الرحمن الرحيم
Microsoft Administrative Tier Model
https://windowssecurity.ca/2020/03/23/mitigate-credential-theft-with-administrative-tier-model/
https://windowssecurity.ca/2020/03/23/mitigate-credential-theft-with-administrative-tier-model/
Hypervisor From Scratch – Part 8: How To Do Magic With Hypervisor!
https://rayanfam.com/topics/hypervisor-from-scratch-part-8/
https://rayanfam.com/topics/hypervisor-from-scratch-part-8/
Rayanfam Blog
Hypervisor From Scratch – Part 8: How To Do Magic With Hypervisor!
We write about Windows Internals, Hypervisors, Linux, and Networks.
Win32k Smash the Ref
New Bug Class and Exploitation Techniques
https://www.ragestorm.net/Win32k%20Smash%20the%20Ref.pdf
https://github.com/gdabah/win32k-bugs/tree/master/SmashTheRef
New Bug Class and Exploitation Techniques
https://www.ragestorm.net/Win32k%20Smash%20the%20Ref.pdf
https://github.com/gdabah/win32k-bugs/tree/master/SmashTheRef
Universally Evading Sysmon and ETW
https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
Sandboxie Open Source Code is available for download
https://community.sophos.com/products/sandboxie/f/forum/119641/important-sandboxie-open-source-code-is-available-for-download
https://community.sophos.com/products/sandboxie/f/forum/119641/important-sandboxie-open-source-code-is-available-for-download
Windows Server 2008R2-2019 NetMan DLL Hijacking
https://itm4n.github.io/windows-server-netman-dll-hijacking/
https://itm4n.github.io/windows-server-netman-dll-hijacking/
itm4n’s blog
Windows Server 2008R2-2019 NetMan DLL Hijacking
What if I told you that all editions of Windows Server, from 2008R2 to 2019, are prone to a DLL Hijacking in the %PATH% directories? What if I also told you that the impacted service runs as NT AUTHORITY\SYSTEM and that the DLL loading can be triggered by…
Red Team Tactics: Utilizing Syscalls in C# - Prerequisite Knowledge
https://jhalon.github.io/utilizing-syscalls-in-csharp-1/
https://jhalon.github.io/utilizing-syscalls-in-csharp-1/
Jack Hacks
Red Team Tactics: Utilizing Syscalls in C# - Prerequisite Knowledge
Over the past year, the security community - specifically Red Team Operators and Blue Team Defenders - have seen a massive rise in both public and private utilization of System Calls in windows malware for post-exploitation activities, as well as for the…
Ordinal Numbers and VBA can be fun – who knew!
quick and easy AMSI bypass evades Defender
https://secureyourit.co.uk/wp/2020/04/15/ordinal-numbers-and-vba-can-be-fun-who-knew/
PoC: https://t.co/qerER0TSJ8?amp=1
quick and easy AMSI bypass evades Defender
https://secureyourit.co.uk/wp/2020/04/15/ordinal-numbers-and-vba-can-be-fun-who-knew/
PoC: https://t.co/qerER0TSJ8?amp=1
GitHub
rmdavy/AMSI_Ordinal_Bypass
Bypass AMSI and Defender using Ordinal Values. Contribute to rmdavy/AMSI_Ordinal_Bypass development by creating an account on GitHub.