Diego Capriotti (@naksyn) 's Twitter Profile
Diego Capriotti

@naksyn

Network Boogeyman

ID: 2588728271

linkhttp://www.naksyn.com calendar_today07-06-2014 07:32:58

518 Tweet

1,1K Followers

262 Following

Daniel (@virtualallocex) 's Twitter Profile Photo

If you missed or were unable to attend the DEF CON workshop in RedTeamVillage? You can access all the material here. github.com/VirtualAlllocE… Yesterday's workshop was a cool experience and the feedback from the participants about the material, the presentation style and the

icyguider (@icyguider) 's Twitter Profile Photo

I just got fired from my job today without warning. 😬 Really crazy. Anyway... If anyone is looking for a pentester, red teamer, or likes my public work, please don't hesitate to reach out. Thanks in advance everyone. 😔

icyguider (@icyguider) 's Twitter Profile Photo

LatLoader is a PoC Havoc module that performs lateral movement via DLL sideloading while evading default Elastic EDR rules. Making it was a great learning exercise, and I'm hoping others can learn from it too. Enjoy! ✌️ github.com/icyguider/LatL…

Her0 (@her0_it) 's Twitter Profile Photo

It's a bittersweet moment, but our series of "Attacking an EDR" has come to an end! Me and Riccardo hope that you had as much fun reading it as we had writing it. her0ness.github.io/2023-11-07-Att…

Diego Capriotti (@naksyn) 's Twitter Profile Photo

Here's Process Stomping injection and how you can use it in a Mockingjay-ish way to load a Beacon on a exe's RWX section using sRDI. Check it out! Blog: naksyn.com/edr%20evasion/… Tool: github.com/naksyn/Process… Thanks to hasherezade and monoxgas for their awesome work

Diego Capriotti (@naksyn) 's Twitter Profile Photo

Here's a new project and some Pyramid features: Embedder lets you create small (go | nim | C# | C++) executables that load Python interpreter to execute Python code using the embedding functionality. github.com/naksyn/Embedder Embedder can be easily paired with Pyramid that now has

Diego Capriotti (@naksyn) 's Twitter Profile Photo

One thing I always look for when starting in a network without AD creds is user enumeration with RPC null sessions. impacket SAMR (samrdump) and LSARPC (lookupsid) tools will give you only a small part of the story. Here's my minimal RID cycling script gist.github.com/naksyn/8204c76…

One thing I always look for when starting in a network without AD creds is user enumeration with RPC null sessions. 
impacket SAMR (samrdump) and LSARPC (lookupsid) tools will give you only a small part of the story. 
Here's my minimal RID cycling script gist.github.com/naksyn/8204c76…
Diego Capriotti (@naksyn) 's Twitter Profile Photo

the grind is real...took me more than 7 months to climb from 1200 to 1300 in blitz chess. Let's knock on the 1400 ELO monsters door now ♟️

Diego Capriotti (@naksyn) 's Twitter Profile Photo

Recently, I wanted to quickly test some sleep obfuscation ideas against John U's EtwTi-FluctuationMonitor using Beacon, without dealing with UDRL debugging. At the end of the journey, I ended up with: - A way to generate and load, via a PE loader, a UDRL-less Beacon payload.

Diego Capriotti (@naksyn) 's Twitter Profile Photo

This has been one of my favorites for a while, but now it's time to let it go. Here's my preferred way of getting the KeePass db that we often hunt for: downgrade the executable to version 2.53, use CVE-2023-24055 and wait for the busy admin to trigger the dump of the database.