Source Byte
7.8K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👾7🔥41
Living Off The Land Drivers
Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks. The project helps security professionals stay informed and mitigate potential threats.

https://www.loldrivers.io

list of malicious Windows drivers
Search for them via PowerShell
CVE-2020-12138 -> atillk64.sys
vulnerable driver (zam64.sys) using DeviceIoControl, to get NTAUTHORITY\SYSTEM


#windows
#Drivers
4🤡1👾1
Understanding - or at least, trying to
Credit: ATTL4S
windows lateral movement, kerberos , payloads, active directory,etc

BloG

#windows #ad #active_directory
5👏2🤡2
Forwarded from APT
🖥 Introduction for to Windows kernel exploitation

Explore the Windows Kernel with HEVD, a vulnerable driver. Dive into stack overflow exploits and bypass SMEP/KPTI protections using the sysret approach.
A detailed guide for Windows kernel explotation:

Part 0: Where do I start?
Part 1: Will this driver ever crash?
Part 2: Is there a way to bypass kASLR, SMEP and KVA Shadow?
Part 3: Can we rop our way into triggering our shellcode?
Part 4: How do we write a shellcode to elevate privileges and gracefully return to userland?

#windows #kernel #driver #hevd #hacksys
Please open Telegram to view this post
VIEW IN TELEGRAM
👍11👾41
Forwarded from Stuff for Geeks (Qho Knowa)
Fascinating C code: TCP sockets & HTTP file downloads using only ntdll exports (NtCreateFile & NtDeviceIoControlFile syscalls). Bypasses Winsock for low-level Windows networking.


https://www.x86matthew.com/view_post?id=ntsockets

#Windows
#Programming
3👍2🔥2
Forwarded from Source Chat (Friend)
Please open Telegram to view this post
VIEW IN TELEGRAM
3👍1
👍3🔥3👾3👏1
Windows Process Access Token and user privilege
Privileges are listed and explained at: MSDN

use the Windows Privileges to elevate your rights within the OS.
Priv2Admin

Understanding and Abusing Process Tokens — Part I
Understanding and Abusing Process Tokens — Part II‌

Access Tokens‌

Abusing Tokens

Adjusting Process Token Privileges

Stealing Access Tokens From Office Desktop Applications

#windows #token #internals
👾112👍1🔥1
The swiss army knife of LSASS dumping
https://github.com/fortra/nanodump

#lsass #windows #maldev
🥱5👍3😴2👎1🗿1