Build your own Virtual machine
-just only 250 lines of C code
-really great guide
-great for understanding low level concepts
-it's kind of detailed guide
-with very lucid diagrams and code explanation
-github repo is also present
There is an arms race going on between loader developers and security vendors.
I came across a particularly egregious example of this recently. I wish to share with you. 🧵
I thought I knew ASREProasting. Then this article showed on my face
semperis.com/blog/new-attac….
Now I know I am two years behind (at minimum)
Many thanks to 0xdf and Charlie Clark.
Here is a little note.
atozcyber.com/attack-compute…
This module was particularly interesting as it starts with a leaked password. Once the credentials and subdomains were identified, we gained low-privilege system access via a web application debugging shell. From there, we pulled data from the database.
atozcyber.com/attack-cloud/a…
Completed Azure track -Loot Exchange, Teams and SharePoint with GraphRunner from #pwnedlabs.io
It was cool learning new tools and architecture!
atozcyber.com/attack-cloud/a…
My first thought was "Wow malware is scraping images". Then I opened iPhoto and typed a few words that appeared in photos. Like "Stream Deck" pulled up a picture of my desk.
My guess is malware is just reading from the OS's photo index database and not doing any scraping at all.…
My first thought was "Wow malware is scraping images". Then I opened iPhoto and typed a few words that appeared in photos. Like "Stream Deck" pulled up a picture of my desk.
My guess is malware is just reading from the OS's photo index database and not doing any scraping at all.…
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
25K Followers 26K FollowingA Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP
247K Followers 3K FollowingPentester, Forensic investigator, and former college professor. Trained hackers at every branch of US military and intelligence.
Visit me at https://t.co/G478wufszw
2K Followers 259 FollowingAdversary Simulation @xforce/ Frequent reader of the first page of Google results / Occasional reader of the second page of Google results
85K Followers 0 FollowingBuild better websites with Remix. Remix brings the state of the art in web development without leaving behind the fundamentals.
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
30K Followers 562 FollowingCyBeRsEcUrItY | Not afraid to put down with some THICC malware on disk | securing and breaking AI @PaloAltoNtwks | Ex @spacex
276K Followers 2K FollowingFounder/CEO, Martin Capital. "Philosopher Capitalist" - Guardian. Anti-Communist. Former SBC Executive Committee officer. Part of the team that started PayPal.
55K Followers 3K FollowingDirector of Intel at @redcanary. SANS Certified Instructor for FOR578: CTI. Senior Fellow at @CyberStatecraft. She/her. Mastodon: @[email protected]
21K Followers 237 Following21. Building real stuffs
I’m an Engineer
mainly Rust and C++
literal nerd in "Distributed Systems"
Currently building a Database in Go and Rust
342K Followers 48 FollowingOne of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.
36K Followers 7K FollowingWeird security voyeur. Vibe merchant. CISO of your 🩷 Official USPS fan account. 🎉 Host of THE Microsoft Threat Intelligence Podcast. I like crime actors.
672 Followers 105 FollowingA semi-regular US Capitol tour with irregulars from the security research community. Join us on Thursday January 11, 2024. Registration open until December 15th