Nick Chalard (@autow00t) 's Twitter Profile
Nick Chalard

@autow00t

Infosec journeyman, Progressive Trance/House fanatic, always looking for the devil in the details.

ID: 796908637

calendar_today01-09-2012 21:25:40

24 Tweet

71 Takipçi

544 Takip Edilen

InQuest (@inquest) 's Twitter Profile Photo

InQuest Insider - April The InQuest Threat Exchange is an integration where anonymous hashes and vectors are pushed to the InQuest cloud. In turn, all newly seen hashes are queried prior to analysis. Subscribe to the newest issue of the InQuest Insider. inquest.net/newsletter

InQuest Insider - April

The InQuest Threat Exchange is an integration where anonymous hashes and vectors are pushed to the InQuest cloud. In turn, all newly seen hashes are queried prior to analysis.

Subscribe to the newest issue of the InQuest Insider. inquest.net/newsletter
InQuest (@inquest) 's Twitter Profile Photo

Wonder how registration-free #COM interop works and how #redteamer|s can use it to load #NET assemblies (using #ActCtx COM server in #PowerShell and #Jscript)? Read our new short blog post by Malwrologist inquest.net/blog/2019/5/30…

InQuest (@inquest) 's Twitter Profile Photo

InQuest Insider - May InQuest constantly monitors command and control (C2) communications for signs of anomalous activity. Keeping abreast of the latest C2 nodes through threat intelligence is key for detecting this activity. Subscribe Here: inquest.net/newsletter

InQuest Insider - May

InQuest constantly monitors command and control (C2) communications for signs of anomalous activity. Keeping abreast of the latest C2 nodes through threat intelligence is key for detecting this activity. 

Subscribe Here: inquest.net/newsletter
InQuest (@inquest) 's Twitter Profile Photo

Check out Didier Stevens new tool amsiscan.py. amsiscan.py is a Python script that uses Windows 10’s AmsiScanBuffer function to scan input for malware. It reads one or more files or stdin. blog.didierstevens.com/2019/06/13/new…

Check out <a href="/DidierStevens/">Didier Stevens</a> new tool amsiscan.py.  amsiscan.py is a Python script that uses Windows 10’s AmsiScanBuffer function to scan input for malware. It reads one or more files or stdin.

blog.didierstevens.com/2019/06/13/new…
InQuest (@inquest) 's Twitter Profile Photo

Interesting #malicious #PowerShell uses #InstallUtil (.NET framework utility). InstallUtil loads a .NET bin that contains a class inherited from System.Configuration.Install.Installer. It overrides uninstall method. The method injects a shellcode into mem virustotal.com/gui/file/df9ab…

Interesting #malicious #PowerShell uses #InstallUtil (.NET framework utility).
InstallUtil loads a .NET bin that contains a class inherited from System.Configuration.Install.Installer. It overrides uninstall method. The method injects a shellcode into mem

virustotal.com/gui/file/df9ab…
InQuest (@inquest) 's Twitter Profile Photo

An awesome write-up from ohjeongwook of DarunGrim on leveraging Time Travel Debugging towards root cause analysis of a fuzzer triggered crash in Adobe Acrobat: darungrim.com/research/2019-…

An awesome write-up from <a href="/ohjeongwook/">ohjeongwook</a> of <a href="/darungrim/">DarunGrim</a>
on leveraging Time Travel Debugging towards root cause analysis of a fuzzer triggered crash in Adobe Acrobat: darungrim.com/research/2019-…
InQuest (@inquest) 's Twitter Profile Photo

Our new blog is out! Ransomware in Your Stocking, William MacArthur describes the increasing danger of ransomware going into the future. There are sample hashes and a map that shows the nationally widespread hits on state and federal utilities. inquest.net/blog/2019/12/2… #cybersecurity

InQuest (@inquest) 's Twitter Profile Photo

PowerShell Without PowerShell! Read our newest blog from guest contributor @Valcan_K . He describes how to utilize LOLBins to bypass detection and execute arbitrary scripts on a target machine. inquest.net/blog/2020/02/2… #redteam #pentest #cyber

InQuest (@inquest) 's Twitter Profile Photo

A sample from yesterday that not only uses COVID-19 context within the maldoc, but is targeting distance-learning students in Peru. #malware #coronavirus #COVID19 #COVID labs.inquest.net/dfi/sha256/a9c…

A sample from yesterday that not only uses COVID-19 context within the maldoc, but is targeting distance-learning students in Peru.

#malware #coronavirus #COVID19 #COVID

labs.inquest.net/dfi/sha256/a9c…
InQuest (@inquest) 's Twitter Profile Photo

Once again, Microsoft will be keeping the Defenders busy. Now to watch the wave of iterations, collect samples, and improve detection.... DDE --> Equation Editor --> CVE-2021-40444 Find useful info here: inquest.net/blog/2021/09/1… #CVE202140444 #0day Nick Chalard Dmitry Melikov

Once again, Microsoft will be keeping the Defenders busy.

Now to watch the wave of iterations, collect samples, and improve detection....

DDE --&gt; Equation Editor --&gt; CVE-2021-40444

Find useful info here: inquest.net/blog/2021/09/1…

#CVE202140444 #0day

<a href="/Autow00t/">Nick Chalard</a> <a href="/DmitriyMelikov/">Dmitry Melikov</a>
Nick Chalard (@autow00t) 's Twitter Profile Photo

Probably the easiest CVE number to memorize, also scary enough to be hard to forget. Disable that ActiveX in Internet Explorer, also stop using Internet Explorer. 😆 Thanks for the support on this one William MacArthur Pedram Amini Josiah Smith Dmitry Melikov

InQuest (@inquest) 's Twitter Profile Photo

We are sharing this visual for tracking threat actors/groups related to the current #ukraine conflict. The content was collected from various sources within the #infosec community. Special thanks to all involved. William MacArthur Nick Chalard J. A. Guerrero-Saade

We are sharing this visual for tracking threat actors/groups related to the current #ukraine conflict. The content was collected from various sources within the #infosec community. Special thanks to all involved.

<a href="/Anti_Expl0it/">William MacArthur</a> <a href="/Autow00t/">Nick Chalard</a> <a href="/juanandres_gs/">J. A. Guerrero-Saade</a>
InQuest (@inquest) 's Twitter Profile Photo

An update our previous graphic we shared on the cyber-front of the #ukraine conflict. This content was collected from various sources and collaborations within the #infosec community. Special thanks to all involved. William MacArthur Nick Chalard J. A. Guerrero-Saade Jon Gorenflo 🇺🇦🌻

An update our previous graphic we shared on the cyber-front of the #ukraine conflict. This content was collected from various sources and collaborations within the #infosec community. Special thanks to all involved.

<a href="/Anti_Expl0it/">William MacArthur</a>
<a href="/Autow00t/">Nick Chalard</a>
<a href="/juanandres_gs/">J. A. Guerrero-Saade</a>
<a href="/flakpaket/">Jon Gorenflo 🇺🇦🌻</a>
InQuest (@inquest) 's Twitter Profile Photo

As a follow up to the previous graphic outlining threats affecting #Ukraine, here is a high level blog on observed threats. Big thanks to the #infosec community for making this possible, #SlavaUkraini William MacArthur Nick Chalard J. A. Guerrero-Saade Jon Gorenflo 🇺🇦🌻 inquest.net/blog/2022/04/0…

As a follow up to the previous graphic outlining threats affecting #Ukraine, here is a high level blog on observed threats. Big thanks to the #infosec community for making this possible, #SlavaUkraini

<a href="/Anti_Expl0it/">William MacArthur</a>
<a href="/Autow00t/">Nick Chalard</a>
<a href="/juanandres_gs/">J. A. Guerrero-Saade</a>
<a href="/flakpaket/">Jon Gorenflo 🇺🇦🌻</a>

inquest.net/blog/2022/04/0…