Soumyani1 (@reveng007) 's Twitter Profile
Soumyani1

@reveng007

Content absorber | CRTP | @BlackHatEvents Asia, USA, SecTor, Europe 2024 Arsenal and @WWHackinFest 2024 Presenter

ID: 1288758525896740864

linkhttps://reveng007.github.io calendar_today30-07-2020 08:49:31

2,2K Tweet

1,1K Takipçi

1,1K Takip Edilen

Wietze (@wietze) 's Twitter Profile Photo

#HuntingTipOfTheDay: there are numerous open-source projects listing cyber threats. Some of these have easily ingestible indicators... how about: 🔵 lots-project.com + LOLBINs 🟠 hijacklibs.net + DLL write events 🟢 lolrmm.io + DNS requests

#HuntingTipOfTheDay: there are numerous open-source projects listing cyber threats. Some of these have easily ingestible indicators... how about:
🔵 lots-project.com + LOLBINs
🟠 hijacklibs.net + DLL write events
🟢 lolrmm.io + DNS requests
SpecterOps (@specterops) 's Twitter Profile Photo

AdminSDHolder prevents Account Operators from directly controlling Tier Zero. But most orgs grant Tier Zero privileges to unprotected principals. Jonas Bülow Knudsen explores an attack technique & path from Account Operators → Domain Admin in stock AD forests. ghst.ly/4niCixR

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Credentials access via Shadow Snapshots, WMI and SMB, all done remotely. Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer. A technique developed by Peter

Credentials access via Shadow Snapshots, WMI and SMB, all done remotely.

Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer.

A technique developed by Peter
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Modern lateral movement techniques detection (mainly DCOM/DCE/RPC/RDP) with examples. Some assumptions worth mentioning: visibility into source IP/port/hostname, logon activity, remote process metadata. A blog post by Huntress team. Awesome read, guys!

Modern lateral movement techniques detection (mainly DCOM/DCE/RPC/RDP) with examples.

Some assumptions worth mentioning: visibility into source IP/port/hostname, logon activity, remote process metadata.

A blog post by <a href="/HuntressLabs/">Huntress</a> team. Awesome read, guys!
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

An increased visibility into threads' call stacks helps with more reliable malware detection. The approach is based on ETW telemetry and module's Export Directory data for information enrichment. A post by John Uhlmann of Elastic Security Labs. Great read! #redteam #blueteam #maldev

An increased visibility into threads' call stacks helps with more reliable malware detection.

The approach is based on ETW telemetry and module's Export Directory data for information enrichment.

A post by John Uhlmann of <a href="/elasticseclabs/">Elastic Security Labs</a>. Great read!

#redteam #blueteam #maldev
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

VEH² technique to bypass ETW-based detection. Hardware breakpoints abuse can be detected with Microsoft-Windows-Kernel-Audit-API-Calls provider by looking into NtSetContextThread() calls. VEH² uses two vector exception handlers to change the thread's context without calling

VEH² technique to bypass ETW-based detection.

Hardware breakpoints abuse can be detected with Microsoft-Windows-Kernel-Audit-API-Calls provider by looking into NtSetContextThread() calls.

VEH² uses two vector exception handlers to change the thread's context without calling
Dor (@dor00tkit) 's Twitter Profile Photo

Most EDR and AV products rely on nt!PsSetCreateProcessNotifyRoutineEx2 to monitor process creation and termination. But what happens if an attacker clears the nt!PspCreateProcessNotifyRoutine array? [1/3]

ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…

Daniel (@0x64616e) 's Twitter Profile Photo

Onboard yourself - PaloAlto Global Protect edition: 1. Become local admin 2. Export device cert from original workstation 3. Import cert in your VM 4. Login with user creds 5. Enjoy EDR-free testing :)

Onboard yourself - PaloAlto Global Protect edition:
1. Become local admin
2. Export device cert from original workstation
3. Import cert in your VM
4. Login with user creds
5. Enjoy EDR-free testing :)
0SKR (@saab_sec) 's Twitter Profile Photo

❗️Blog post❗️ Love for Microsoft Component Object Model, RPC and AMSI attack surface [+] Discussion on overlooked aspects of AMSI - COM and RPC . [+] Attack opportunities .. sabotagesec.com/love-for-micro…

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when attackers disable standard process notify callbacks github.com/Dor00tkit/BamE…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

The Blog post about "Revisiting Cross Session Activation attacks" is now also public. Lateral Movement with code execution in the context of an active session? 😎 Here you go: r-tec.net/r-tec-blog-rev…