Did i have plenty of time allocated to reporting this week? - Yes
Did i spend that time reporting? - No..
is procrastinating a bitch? Yes....
Now blog post + tool inbound tho! 😅🍻
☢️ClickOnce + AppDomain Manager Injection (aka signed EXE + DLL sideloading) is the new Initial Access Hotness❤️
Check out @zyn3rgy and @0xthirteen insights on weaponising them:
posts.specterops.io/less-smartscre…
Pssst. there's a training & framework already scratching that surface too🥳
Hathor from @hackthebox_eu , an insane windows machine, involved logging into mojoportal with defautlt creds, uploading aspx web shell, IIS Impersonation, Bypassing Applocker, DLL Hijacking, signing powershell script and DCsync.
arz101.medium.com/hackthebox-hat…
Shared from @hackthebox_eu involved exploiting sqli in json, ipython for code execution, finding credentials to redis from a golang binary, and abusing CVE-2022–0543 for privilege escalation
arz101.medium.com/hackthebox-sha…
Opensource from @hackthebox_eu involved a flask application running in debug mode, vulnerable to directory traversal had two routes, uploading your own route or generating the console pin, accessing gitea, and escalating privileges through git hooks.
arz101.medium.com/hackthebox-ope…
Searching for DLL Sideloading binaries? A short Powershell Script in combination with Siofra will give you thousands of possible combinations.
github.com/Cybereason/sio…
Either try to replace any Windows DLL Import with your payload DLL or search for Phantom DLLs.
90% of my Twitter DMs are asking me about how to start getting into Malware development. Well, I love answering them but it's easier to write a small thread about it so here we go.
1/12
Just added the two new AMSI bypass PoC's via Provider Patching into my Amsi-Bypass-Powershell repo. Plus one PoC in Nim as pull request for OffensiveNim:
github.com/S3cur3Th1sSh1t…github.com/byt3bl33d3r/Of…
Tested both, works perfectly fine. 👌
(1/2)
Since Microsoft plans to disable macros by default, I have decided to release a proof of concept that I use on my engagements by leveraging the document properties built in Microsoft Office.
Here is the link to the article: offensive-security.com/offsec/macro-w…
32 Followers 1K FollowingFound different beauties from all US states 😉
Ready for private meetings
See nude photos before a date! Watching this https://t.co/kxCHBTXY6h
2K Followers 2K FollowingOur industry-leading platform is the most effective solution for learning modern binary exploitation through a world-class curriculum developed by @RET2Systems
4K Followers 949 FollowingSecurity Engineer @Meta, Ex @Lacework, @Deloitte, @SecForce_LTD. CTFer with LCBC, vulnerability researcher and exploit dev. Opinions are my own
2K Followers 422 FollowingRaw insight into Cyber Security Experts and their Adversarial Mindset. https://t.co/05PIG9o2oc Hosted by https://t.co/FyGtNOwspf
13K Followers 508 FollowingI don't know how to search on Google so I do research on my own and tweet about it. Hacking as a life style
https://t.co/a05mevChzu
6K Followers 3K FollowingHunt & Response Senior Manager @HuntressLabs || "Competition is the law of the jungle, but cooperation is the law of civilisation” - Kropotkin
26K Followers 1K FollowingI play with vulnerabilities and exploits. I used to be here on Twitter but now I'm here:
@[email protected]
https://t.co/hXggdAVkSQ
5K Followers 85 FollowingSpecialized in Penetration Testing, Hacking, InfoSec Training & Evil Bee Hunting | Founder of #bWAPP, a buggy web app | I still believe in heroes!
10K Followers 1K FollowingPenetration Testing, Purple Team, Red Team & Adversary Emulation, Security Posture Review and Training
Let our Offense, Prepare your Defense.
#weareoffensive