Batch Binary Analysis with IDA Pro 7.4 Automation
https://irq5.io/2020/05/25/batch-binary-analysis-with-ida-pro-7-4-automation/amp/
https://irq5.io/2020/05/25/batch-binary-analysis-with-ida-pro-7-4-automation/amp/
irq5.io
Batch Binary Analysis with IDA Pro 7.4 Automation
It is easy to script analysis steps with IDAPython, but now we want to automate this analysis over, let’s say, 10,000 files. I did a quick Google and I couldn’t find a guide on how to p…
Empire, Kaspersky & Obfuscation oh my!
https://www.offensiveops.io/tools/empire-kaspersky-obfuscation-oh-my/
https://www.offensiveops.io/tools/empire-kaspersky-obfuscation-oh-my/
TrickBot BazarLoader In-Depth
https://cybersecurity.att.com/blogs/labs-research/trickbot-bazarloader-in-depth
https://cybersecurity.att.com/blogs/labs-research/trickbot-bazarloader-in-depth
LevelBlue
LevelBlue Labs Research Blog: Cutting-Edge Cybersecurity Analysis
Explore cutting-edge cybersecurity research and analysis from LevelBlue Labs. Gain deep insights into emerging threats and innovative defenses
When Anti-Virus Engines Look Like Kernel Rootkits
https://volatility-labs.blogspot.com/2020/05/when-anti-virus-engines-look-like.html
https://volatility-labs.blogspot.com/2020/05/when-anti-virus-engines-look-like.html
Blogspot
When Anti-Virus Engines Look Like Kernel Rootkits
While analyzing real-world systems, memory analysts will often encounter anti-virus (AV) engines, EDRs, and similar products that, at first ...
Automating a RedELK deployment using Ansible
https://www.trustedsec.com/blog/automating-a-redelk-deployment-using-ansible/
https://www.trustedsec.com/blog/automating-a-redelk-deployment-using-ansible/
TrustedSec
Automating a RedELK Deployment Using Ansible
Automate your RedELK infrastructure deployment with Ansible, streamlining your red team operations and enhancing visibility with a scalable ELK stack,…
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities
https://arxiv.org/pdf/2005.12433.pdf
https://arxiv.org/pdf/2005.12433.pdf
Data Mining with Big Data in Intrusion Detection Systems: A Systematic Literature Review
https://arxiv.org/pdf/2005.12267.pdf
https://arxiv.org/pdf/2005.12267.pdf
Automate OctopusC2 RedTeam infrastructure deployment
https://shells.systems/automate-octopus-c2-redteam-infrastructure-deployment/
https://shells.systems/automate-octopus-c2-redteam-infrastructure-deployment/
Shells.Systems
Automate Octopus C2 RedTeam Infrastructure Deployment - Shells.Systems
Estimated Reading Time: 15 minutes Establishing a red team infrastructure for your operation is something you need to take care of every time, and you need to make sure it’s working without any obstacles before you begin your operation. Every time I start…
Zero-day in ‘Sign In with Apple’
https://bhavukjain1.github.io/blog/2020/05/30/zeroday-signin-with-apple/
https://bhavukjain1.github.io/blog/2020/05/30/zeroday-signin-with-apple/
Detecting and Advancing In-Memory .NET Tradecraft
https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/
https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/
MDSec
Detecting and Advancing In-Memory .NET Tradecraft - MDSec
Introduction In-memory tradecraft is becoming more and more important for remaining undetected during a red team operation, with it becoming common practice for blue teams to peek in to running...
In-depth analysis of the new Team9 malware family
https://blog.fox-it.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/
https://blog.fox-it.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/
Fox-IT International blog
In-depth analysis of the new Team9 malware family
Author: Nikolaos Pantazopoulos Co-author: Stefano Antenucci (@Antelox) And in close collaboration with NCC’s RIFT. 1. Introduction Publicly discovered in late April 2020, the Team9 malware fa…
Attacking FreeIPA — Part III: Finding A Path
https://posts.specterops.io/attacking-freeipa-part-iii-finding-a-path-677405b5b95e
https://posts.specterops.io/attacking-freeipa-part-iii-finding-a-path-677405b5b95e
Medium
Attacking FreeIPA — Part III: Finding A Path
This post is Part III in a series about my experiences attacking FreeIPA. In Part I of this series, we reviewed some of the background and…
Active Directory security assessment checklist (-> English version)
https://www.cert.ssi.gouv.fr/uploads/guide-ad.html
https://www.cert.ssi.gouv.fr/uploads/guide-ad.html
Using Syscalls to Inject Shellcode on Windows
https://www.solomonsklash.io/syscalls-for-shellcode-injection.html
https://www.solomonsklash.io/syscalls-for-shellcode-injection.html
shad0w is a post exploitation framework designed to operate covertly on heavily monitored enviroments
https://github.com/bats3c/shad0w
https://github.com/bats3c/shad0w
GitHub
GitHub - bats3c/shad0w: A post exploitation framework designed to operate covertly on heavily monitored environments
A post exploitation framework designed to operate covertly on heavily monitored environments - bats3c/shad0w
Apache Tomcat RCE by deserialization (CVE-2020-9484) – write-up and exploit
https://www.redtimmy.com/java-hacking/apache-tomcat-rce-by-deserialization-cve-2020-9484-write-up-and-exploit/
https://www.redtimmy.com/java-hacking/apache-tomcat-rce-by-deserialization-cve-2020-9484-write-up-and-exploit/
PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap
https://github.com/synacktiv/Windows-kernel-SegmentHeap-Aligned-Chunk-Confusion
https://github.com/synacktiv/Windows-kernel-SegmentHeap-Aligned-Chunk-Confusion
GitHub
GitHub - synacktiv/Windows-kernel-SegmentHeap-Aligned-Chunk-Confusion: PoC exploiting Aligned Chunk Confusion on Windows kernel…
PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap - synacktiv/Windows-kernel-SegmentHeap-Aligned-Chunk-Confusion
Automating the provisioning of Active Directory labs in Azure
https://blog.christophetd.fr/automating-the-provisioning-of-active-directory-labs-in-azure/
https://blog.christophetd.fr/automating-the-provisioning-of-active-directory-labs-in-azure/
Christophe Tafani-Dereeper
Automating the provisioning of Active Directory labs in Azure
Leveraging Terraform and Ansible to automate the deployment of Active Directory labs in Azure.