zhixiang hao (@haozhixiang) 's Twitter Profile
zhixiang hao

@haozhixiang

APT threat,Web security,Osint
Shandong Lanxiang School China。My sample analysis is just for learning research

ID: 1463316372541169671

calendar_today24-11-2021 01:20:08

505 Tweet

1,1K Followers

343 Following

zhixiang hao (@haozhixiang) 's Twitter Profile Photo

Web vulnerability mining SSTI vulnerability sudo waybackurls target.com|grep -Ev "\.(jpeg|jpg|png|ico|js|css|svg|ttf|eot|woff|webp)$" | qsreplace "ssti{{9*9}}" > fuzz.txt for url in $(cat fuzz.txt); do python3 sstimap.py -u $url; print $url; done

Web vulnerability mining SSTI vulnerability
sudo waybackurls target.com|grep -Ev "\.(jpeg|jpg|png|ico|js|css|svg|ttf|eot|woff|webp)$"  | qsreplace "ssti{{9*9}}" > fuzz.txt
for url in $(cat fuzz.txt); do python3 sstimap.py -u $url; print $url; done
zhixiang hao (@haozhixiang) 's Twitter Profile Photo

One command to get ssrf mining gau --subs xxx.com | gf ssrf | sort -u | httpx -mc 200 | qsreplace "burpcollaborator" >> ssrfuzzxxx.txt; ffuf -c -w ssrfuzzxxx.txt -u FUZZ happy hunting everyone😄 🇸🇦 Murtada Bin Abdullah (Rood) Justin Gardner zseano H1 Disclosed - Public Disclosures H4x0r.DZ N$

One command to get ssrf mining
gau --subs xxx.com | gf ssrf | sort -u | httpx -mc 200 | qsreplace "burpcollaborator" >> ssrfuzzxxx.txt; ffuf -c -w ssrfuzzxxx.txt -u FUZZ 
happy hunting everyone😄
<a href="/0x_rood/">🇸🇦 Murtada Bin Abdullah (Rood)</a> <a href="/Rhynorater/">Justin Gardner</a> <a href="/zseano/">zseano</a> <a href="/h1Disclosed/">H1 Disclosed - Public Disclosures</a> <a href="/h4x0r_dz/">H4x0r.DZ</a>  <a href="/nav1n0x/">N$</a>
zhixiang hao (@haozhixiang) 's Twitter Profile Photo

The two commands help you complete sensitive information mining, which is suitable for large-scale batch methods. gau x.com --subs | cut -d"?" -f1 | grep -E "\.js+(?:on|)$" | tee urls.txt ffuf -w urls.txt:HFUZZ -u HFUZZ -replay-proxy http://burpip:port

The two commands help you complete sensitive information mining, which is suitable for large-scale batch methods.
gau x.com --subs | cut -d"?" -f1 | grep -E "\.js+(?:on|)$" | tee urls.txt
ffuf -w urls.txt:HFUZZ -u HFUZZ -replay-proxy http://burpip:port
zhixiang hao (@haozhixiang) 's Twitter Profile Photo

Bitter APT Attack sample,The bait is a chm file, the content is to let everyone report crimes using the Internet chm->cmd->powershell->schtasks->dowwnload jpg->exec command Guess the collection target in the early stage, and then accurately change the pic.jpg command control

Bitter APT Attack  sample,The bait is a chm file, the content is to let everyone report crimes using the Internet
chm-&gt;cmd-&gt;powershell-&gt;schtasks-&gt;dowwnload jpg-&gt;exec command
Guess the collection target in the early stage, and then accurately change the pic.jpg command control
zhixiang hao (@haozhixiang) 's Twitter Profile Photo

APT Gamaredon The content of the document is a forged document of "Electronic Trust Service of the Shastinska Regional Electricity Administration of Ukraine" наказ_в_дпов_дальної особи.doc http]://principles67.vilitord.ru/BUDGET/stoppage56/rejoice/already[.]mkv can't access

APT Gamaredon  
The content of the document is a forged document of "Electronic Trust Service of the Shastinska Regional Electricity Administration of Ukraine"
наказ_в_дпов_дальної особи.doc
http]://principles67.vilitord.ru/BUDGET/stoppage56/rejoice/already[.]mkv   
can't access
zhixiang hao (@haozhixiang) 's Twitter Profile Photo

Web security, bug hunting and sharing of online monitoring methods for subdomain takeover. Can also detect malicious IOC indicators takeover.cyberint.com

Web security, bug hunting and sharing of online monitoring methods for subdomain takeover. Can also detect malicious IOC indicators
takeover.cyberint.com
Threat Intelligence (@threatintel) 's Twitter Profile Photo

Our Threat Hunter Team has discovered a few more IOCs relating to publicly reported attacks against airport and security targets in Armenia. (Documented here: x.com/HaoZhixiang/st… and here cyberhub.am/en/blog/2023/0…) (1 of 5)

zhixiang hao (@haozhixiang) 's Twitter Profile Photo

It is estimated to be an attack targeting India. The content of the malicious DOCM document is the mathematics, science and technology content of the University of Madrid in India.The VBA code will be executed when opened, and the bin file is embedded in the document. CrimsonRAT

It is estimated to be an attack targeting India. The content of the malicious DOCM document is the mathematics, science and technology content of the University of Madrid in India.The VBA code will be executed when opened, and the bin file is embedded in the document.
CrimsonRAT