Fabian (@testert01) 's Twitter Profile
Fabian

@testert01

ID: 702860066051989504

calendar_today25-02-2016 14:17:53

16 Tweet

94 Followers

111 Following

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Snyk Tnx for your excellent analysis at snyk.io/blog/npm-depen… and don't worry, the "malicious actor" is one of our interns 😎 who was tasked to research dependency confusion as part of our continuous attack simulations for clients. (1/2)

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

In this talk, thefLink will outline the state of the art of implementing and hiding #offensive #tools as position independent code and how to apply key-less #polymorphism to evade #signatures. You simply can't miss it! More: x33fcon.com/#!/s/sebastian… See you in #Gdynia 🏖️😎🍹

In this talk, <a href="/thefLinkk/">thefLink</a> will outline the state of the art of implementing and hiding #offensive #tools as position independent code and how to apply key-less #polymorphism to evade #signatures. You simply can't miss it!

More: x33fcon.com/#!/s/sebastian…
See you in #Gdynia 🏖️😎🍹
S4ntiagoP (@s4ntiago_p) 's Twitter Profile Photo

Added a new technique to nanodump: --duplicate-local It allows you to open a handle to LSASS with nothing but PROCESS_QUERY_LIMITED_INFORMATION Later, you can elevate the handle by duplicating it. github.com/helpsystems/na…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Our powerintern Fabian strikes again, teamed up with thefLink and developed SysmonEnte: a hard to detect attack on Sysmon. Check out our new blogpost: codewhitesec.blogspot.com/2022/09/attack…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

If you're into client virtualization with #QubesOS, use #KeePassXC and #rofi, our very own Tobias Neitzel has you covered with a nice frontend which makes your credential usage a little bit easier 😎 github.com/codewhitesec/q…

thefLink (@theflinkk) 's Twitter Profile Photo

Here is a ETW based POC to monitor for (some) direct and indirect syscalls. Should find multiple open source implementations trying to avoid userlandhooks. github.com/thefLink/Hunt-…

thefLink (@theflinkk) 's Twitter Profile Photo

Here is a little ETW based tool to play with different IOCs by ImageLoad events. I feel like proxying Kernel32!LoadLibrary through Ntdll is a very strong IOC. :-) github.com/thefLink/Hunt-…

Fabian (@testert01) 's Twitter Profile Photo

[RELEASE] EvtPsst a small mute tool developed by me, that abuses exposed SYNCHRONIZE and Token handles in order to get a process handle to the EventLog Process with more access. Blogpost over the techniques will follow in the next days. github.com/nothingspecial… #redteam

Fabian (@testert01) 's Twitter Profile Photo

[Blogpost] EvtPsst a small EventLog Process Mute tool without OpenProcess call to the EventLog process. This blog shows how to elevate a SYNCHRONIZE handle to a full process handle with a process token of EventLog. nothingspecialforu.github.io/EvtPsstBlog/ #redteam

Olaf Hartong (@olafhartong) 's Twitter Profile Photo

SOAPHound is out for walkies! SOAPHound is a #BloodHound collector to enumerate AD over SOAP instead of LDAP directly. Proud of Nikos for all his hard work! Blog: medium.com/falconforce/so… Tool repo: github.com/FalconForceTea… Detections: github.com/FalconForceTea…

SOAPHound is out for walkies! 

SOAPHound is a #BloodHound collector to enumerate AD over SOAP instead of LDAP directly. 

Proud of Nikos for all his hard work! 

Blog: medium.com/falconforce/so…

Tool repo: github.com/FalconForceTea…

Detections:
github.com/FalconForceTea…
5pider (@c5pider) 's Twitter Profile Photo

Modern implant design: position independent malware development. A small blog post on how to design "modern" malware with features like global variables, raw strings, and compile-time hashing. 5pider.net/blog/2024/01/2… Repo: github.com/Cracked5pider/…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

The specter of .NET Remoting haunts unsuspecting ASP. NET applications even today, whispering valid ObjRefs to those who dare listen. Dive into our latest post to see how these apparitions can lead to remote code execution: code-white.com/blog/leaking-o…

Gabriel Landau (@gabriellandau) 's Twitter Profile Photo

Introducing a new Windows vulnerability class: False File Immutability. 👉 Bonus: a kernel exploit to load unsigned drivers. elastic.co/security-labs/…

T3nb3w (@t3nb3w) 's Twitter Profile Photo

🚀 New Blog & PoC: Abusing IDispatch for COM Object Access & PPL Injection Leveraging STDFONT via IDispatch to inject into PPL processes & access LSASS. Inspired by James Forshaw's research! 🔍 Blog: mohamed-fakroud.gitbook.io/red-teamings-d… 💻 Code: github.com/T3nb3w/ComDotN…

Fabian (@testert01) 's Twitter Profile Photo

Unconstrained Delegation on a gMSA and Webclient / NTLMv1 active on servers that can retrieve the credentials of a gMSA with unconstrained delegation can lead to a complete domain compromise from domain users. nothingspecialforu.github.io/UCgMSAExploita… Micah Van Deusen, Dirk-jan, nice tools :)