thefLink (@theflinkk) 's Twitter Profile
thefLink

@theflinkk

ID: 1023431348877451266

calendar_today29-07-2018 04:53:42

57 Tweet

1,1K Followers

149 Following

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

.Citrix published a security bulletin regarding a pre-auth RCE in Progress ShareFile Storage Zones Controller (CVE-2021-22941) found by Markus Wulftange: support.citrix.com/article/CTX328… Details will follow on our blog at codewhitesec.blogspot.com

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Getting RCE with a Razor! Our walk-through of CVE-2021-22941 affecting Citrix ShareFile Storage Zones Controller by Markus Wulftange is now live codewhitesec.blogspot.com/2021/09/citrix…

niph (@niph_) 's Twitter Profile Photo

Interested in operational security? Join b00n and thefLink talk today to see how we are trying to stay under the radar of the blue team. brucon0x0d.sched.com/event/lMxx/pic…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

PIC your Katz! Say hello to HandleKatz, our position independent Lsass dumper abusing cloned handles, direct system calls and a modified version of minidumpwritedump() brought to you by thefLink #BruCON0x0D github.com/codewhitesec/H…

thefLink (@theflinkk) 's Twitter Profile Photo

Here is an idea to identify running beacons: 1. Beacons ThreadState often is: DelayExecution 2. Calltrace to NtDelayExecution includes unknown regions Works also fine against beacons sitting in file backed memory github.com/thefLink/Hunt-…

Mr.Un1k0d3r (@mrun1k0d3r) 's Twitter Profile Photo

We are going live tonight at 4 PM EST. Season 5 episode 1 Tonight we gave a special guest thefLink is going to present offensive PIC for red teamers. patreon.com/MrUn1k0d3r ❤ #redteam #Pentesting

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

.NET Remoting Revisited – playing around with .NET Remoting led Markus Wulftange to new insights, some enhancements for James Forshaw's #ExploitRemotingService, a new universal #YSoSerialNet ObjRef gadget and its counterpart #RogueRemotingServer (1/2) codewhitesec.blogspot.com/2022/01/dotnet…

thefLink (@theflinkk) 's Twitter Profile Photo

Here is another implementation of Hellsgate + Halosgate It makes sure, that all resolved syscalls go through ntdll.dll by reusing syscall;ret instructions from clean syscall stubs. github.com/thefLink/Recyc…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Our thefLink and Tjark Rasche will give a workshop tomorrow at BSidesBUD 🇭🇺 on creating complex offensive tools as PIC. Come and learn about offensive coding techniques, memory artifacts and benefits of coding tools as PIC.

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

As part of our #x33fcon talk, invist and thefLink release a socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level 😎 Check it out: github.com/codewhitesec/L…

thefLink (@theflinkk) 's Twitter Profile Photo

Just pushed a detection idea for Foliage/AceLdr to Hunt-Sleeping-Beacons. State Wait:UserRequest is triggered by KiUserApcDispatcher? Probably a Beacon :-) github.com/thefLink/Hunt-…

thefLink (@theflinkk) 's Twitter Profile Photo

Added an attempt to detect suspicious and blocking callbacks of timers to Hunt-Sleeping-Beacons. Probably detects some C2 using timer callbacks for sleep encryption github.com/thefLink/Hunt-…

thefLink (@theflinkk) 's Twitter Profile Photo

Today we published a new tool to tamper with Sysmon. Uses handle elevation and a SACL bypass to remain difficult to observe using Sysmon itself or Windows Event logs. github.com/codewhitesec/S…

thefLink (@theflinkk) 's Twitter Profile Photo

Here is a ETW based POC to monitor for (some) direct and indirect syscalls. Should find multiple open source implementations trying to avoid userlandhooks. github.com/thefLink/Hunt-…

thefLink (@theflinkk) 's Twitter Profile Photo

Here is a little ETW based tool to play with different IOCs by ImageLoad events. I feel like proxying Kernel32!LoadLibrary through Ntdll is a very strong IOC. :-) github.com/thefLink/Hunt-…

Fabian (@testert01) 's Twitter Profile Photo

[RELEASE] EvtPsst a small mute tool developed by me, that abuses exposed SYNCHRONIZE and Token handles in order to get a process handle to the EventLog Process with more access. Blogpost over the techniques will follow in the next days. github.com/nothingspecial… #redteam

thefLink (@theflinkk) 's Twitter Profile Photo

As presented /ˈziːf-kɒn/, this bigger update of Hunt-Sleeping-Beacons allows enumerating pending timers and their callbacks to identify timer-based sleepmasks. Additional detection ideas included :-) github.com/thefLink/Hunt-…

As presented <a href="/x33fcon/">/ˈziːf-kɒn/</a>, this bigger update of Hunt-Sleeping-Beacons allows enumerating pending timers and their callbacks to identify timer-based sleepmasks.

Additional detection ideas included :-)

github.com/thefLink/Hunt-…