
Bobby Cooke
@0xboku
Adversary Services @ IBM X-Force Red
ID: 1236693035632623617
https://0xBoku.com 08-03-2020 16:39:47
3,3K Tweet
10,10K Takipçi
1,1K Takip Edilen






I jumped heavily into learning about SCCM tradecraft and wrote a detailed write-up with custom examples, covering the most interesting vulnerabilities that combine commonality and impact from low-privilege contexts, and what you can do to prevent them :) logan-goins.com/2025-04-25-scc…


Dennis Kniep This is a very neat trick! In my opinion clearly a vulnerability though, it shouldn't be possible to skip the first step this way. I imagine Microsoft will want to fix this, or was this reported and deemed as not a vuln?





Bobby Cooke I can confirm, it is using REST API over HTTPS under the hood for Blob operations🧙♂️




BOF execution coming soon to Loki C2! Just got TrustedSec's COFFLoader working inside of a Node.js node module, callable from JavaScript! COFFLoader Project: github.com/trustedsec/COF… Loki C2 Project: github.com/boku7/Loki
