โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayBad Sector Labs Blog

Last Week in Security (LWiS) - 2023-09-19

By: Erik
20 September 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-09-11 to 2023-09-19.

News

Techniques and Write-ups

Tools and Exploits

  • EchoDrv - Exploitation of echo_driver.sys.
  • Caro-Kann - Encrypted shellcode Injection to avoid Kernel triggered memory scans
  • malrdp-deploy - Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible
  • Periscope - Fully Integrated Adversarial Operations Toolkit (C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation). Note: purposely broken by the author.
  • NetExec - Crack Map Exec fork with different maintainers. Queue the drama.
  • POSTDump is the C# / .NET implementation of the ReactOS minidump function (like nanodump), thus avoiding call to the Windows API MiniDumpWriteDump function.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • donut-decryptor - Retrieve inner payloads from Donut samples
  • TierZeroTable - About Table of AD and Azure assets and whether they belong to Tier Zero
  • Evilginx3-Phishlets - This repository provides penetration testers and red teams with an extensive collection of dynamic phishing templates designed specifically for use with Evilginx3.
  • tracker-radar - Good for OSINT.
  • GPOZaurr - Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.
  • electroniz3r - Take over macOS Electron apps' TCC permissions.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-09-11

By: Erik
12 September 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-08-28 to 2023-09-11.

News

Techniques and Write-ups

Tools and Exploits

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • PurpleOps - An open-source self-hosted purple team management web application.
  • Sekiryu - Comprehensive toolkit for Ghidra headless.
  • Supernova - Real shellcode encryption tool.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-08-29

By: Erik
30 August 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-08-07 to 2023-08-29.

News

Techniques and Write-ups

Tools and Exploits

  • Ensemble - A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. Gives some botnet like feels ๐Ÿค”.
  • ContainYourself - DEF CON 31 Tool. Abuses the Windows containers framework to bypass EDRs.
  • NoFilter - DEF CON 31 Tool. Abuses the Windows Filtering Platform for privilege escalation.
  • DllNotificationInjection - DEF CON 31 Tool. POC of a new โ€œthreadlessโ€ process injection technique.
  • CloudRecon - DEF CON 31 Tool. Suite of tools for red teamers and bug hunters to find ephemeral and development assets in their campaigns and hunts.
  • EasyEASM DEF CON 31 Tool. Zero-dollar attack surface management tool. "The industry is dominated by $30k vendors selling "Attack Surface Management," but OG bug bounty hunters and red teamers know the truth" ๐Ÿ‘€
  • gssapi-abuse - DEF CON 31 Tool. Impersonating AD users on *nix based hosts? Noice. Looks like rubeus was updated as well.
  • DoubleDrive - BH23 Tool. A fully-undetectable ransomware that utilizes OneDrive to encrypt target files.
  • apppoolcreddecrypt - A POC to show how IIS App Pool credentials are decrypted without appcmd.exe.
  • NtRemoteLoad - Remote Shellcode injector using indirect native syscalls to inject shellcode into another process (based on HWSyscalls by ShorSec)
  • konstellation - Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j. Think Bloodhound for k8s.
  • mellon - Open Supervised Device Protocol attack tool (and the Elvish word for friend).
  • CVE-2023-36874_BOF - Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE.
  • SharpShellPipe - This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-08-07

By: Erik
8 August 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-07-31 to 2023-08-07.

News

Techniques and Write-ups

Tools and Exploits

  • daphne - Proof-of-Concept to evade auditd by tampering via ptrace.
  • apollon - Proof-of-Concept to evade auditd by writing /proc/PID/mem.
  • web-check - ๐ŸŒ All-in-one OSINT tool for analyzing any website.
  • grove - A Software as a Service (SaaS) log collection framework from Hashicorp.
  • EmailFlare - Send emails from your domain through Cloudflare for free. Self host on your account.
  • ACCD - Active C&C Detector. Includes a deck on how it works.
  • RogueSliver - A suite of tools to disrupt campaigns using the Sliver C2 framework.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-07-31

By: Erik
1 August 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-07-17 to 2023-07-31.

News

Techniques and Write-ups

Tools and Exploits

  • Introducing BucketLoot - An Automated Cloud Bucket Inspector.
  • KRBUACBypass - UAC Bypass By Abusing Kerberos Tickets.
  • CVE-2023-35078-Exploit-POC - Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. This vulnerability impacts all supported versions - Version 11.4 releases 11.10, 11.9 and 11.8.
  • dcomhijack - Lateral Movement Using DCOM and DLL Hijacking.
  • AADInternals OSINT. This web based tool will extract openly available information for the given tenant.
  • LdrFunctionEx - "should evade EAF and maybe (haven't tested it) EATGuard"
  • DarkWidow - Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing.
  • StackRot - CVE-2023-3269: Linux kernel privilege escalation vulnerability. [First published in 2023-07-10 LWiS - Now includes an exploit]
  • TGSThief - My implementation of the GIUDA project (Ask a TGS on behalf of another user without password) in C++.
  • msi-search - This tool simplifies the task for red team operators and security teams to identify which MSI files correspond to which software and enables them to download the relevant file to investigate local privilege escalation vulnerabilities through MSI repairs. Read more about MSI repair vulnerabilities at Escalating Privileges via Third-Party Windows Installers.
  • S4UTomato - Escalate Service Account To LocalSystem via Kerberos.
  • WSPCoerce - PoC to coerce authentication from Windows hosts using MS-WSP.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • canTot - quick and dirty canbus h4xing framework.
  • chrome-sbx-db - A Collection of Chrome Sandbox Escape POCs/Exploits for learning.
  • GIUDA - Ask a TGS on behalf of another user without password.
  • Frack - Keep and Maintain your breach data.
  • exe_to_dll - Converts a EXE into DLL.
  • dploot - DPAPI looting remotely in Python.
  • sysplant - Your syscall factory.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-07-17

By: Erik
18 July 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-07-10 to 2023-07-17.

News

Techniques and Write-ups

Tools and Exploits

  • BOF_Development_Docker - A VSCode devcontainer for development of COFF files with batteries included.
  • BlackLotus is an innovative UEFI Bootkit designed specifically for Windows. It incorporates a built-in Secure Boot bypass and Ring0/Kernel protection to safeguard against any attempts at removal.
  • WubbabooMark - Debugger Anti-Detection Benchmark.
  • HadesLdr - Shellcode Loader Implementing Indirect Dynamic Syscall, API Hashing, Fileless Shellcode retrieving using Winsock2.
  • curlshell - reverse shell using curl.
  • BadZure - BadZure orchestrates the setup of Azure Active Directory tenants, populating them with diverse entities while also introducing common security misconfigurations to create vulnerable tenants with multiple attack paths.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-07-10

By: Erik
11 July 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-06-26 to 2023-07-10.

News

Techniques and Write-ups

Tools and Exploits

  • ShellGhost - A memory-based evasion technique which makes shellcode invisible from process start to end.
  • StackRot - CVE-2023-3269: Linux kernel privilege escalation vulnerability.
  • CVE-2023-28252 - Common Log File System (CLFS) LPE for Windows patched in April 2023.
  • evilgophish - evilginx + gophish. Bow with evilginx3 support!
  • shortscan - An IIS short filename enumeration tool.
  • BOFMask is a proof-of-concept for masking Cobalt Strike's Beacon payload while executing a Beacon Object File (BOF).
  • BounceBack - โ†•๏ธ๐Ÿคซ Stealth redirector for your red team operation security.
  • TeamsPhisher - Send phishing messages and attachments to Microsoft Teams users.
  • clauneck - A tool for scraping emails, social media accounts, and much more information from websites using Google Search Results.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • Artemis - A modular web reconnaissance tool and vulnerability scanner.
  • golddigger is a simple tool used to help quickly discover sensitive information in files recursively. Originally written to assist in rapidly searching files obtained during a penetration test.
  • mailpit - An email and SMTP testing tool with API for developers.
  • multitail - Tail on steroids.
  • kbtls - Establishes mutually trusted TLS connections based on a pre-shared connection key.
  • skyhook - A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.
  • webhook is a lightweight incoming webhook server to run shell commands.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-06-26

By: Erik
27 June 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-06-12 to 2023-06-26.

News

Techniques and Write-ups

Tools and Exploits

  • SSH-Harvester - Harvest passwords automatically from OpenSSH server. More details here.
  • CVE-2023-29343 - LPE in Sysmon version 14.14.
  • CVE-2023-20178 - PoC for Arbitrary File Delete vulnerability in Cisco Secure Client (tested on 5.0.01242) and Cisco AnyConnect (tested on 4.10.06079).
  • Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.
  • NimExec - Fileless Command Execution for Lateral Movement in Nim.
  • CS_COFFLoader - a COFF loader written in C#.
  • Spartacus-v2.0.0. Not a new tool but a big release for the DLL/COM Hijacking Toolkit (2.0 added COM hijacking).
  • bof-launcher - Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications.
  • GhostFart - Unhook NTDLL without triggering "PspCreateProcessNotifyRoutine".

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • msLDAPDump - LDAP enumeration tool implemented in Python3.
  • SharpToken - Windows Token Stealing Expert.
  • docker-swarm-proxy - What if you wanted a docker exec, but for Docker swarm? - Control any node in the swarm from your CLI.
  • PageSplit - Splitting and executing shellcode across multiple pages.
  • ropci - So, you think you have MFA? AAD/ROPC/MFA bypass testing tool.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-06-15

By: Erik
16 June 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week(s). This post covers 2023-05-22 to 2023-06-15.

News

MOVEIt

Techniques and Write-ups

Tools and Exploits

  • CVExploits Search - Your comprehensive database for CVE exploits from across the internet.
  • cloudfoxable - Create your own vulnerable by design AWS penetration testing playground.
  • CVE-2023-2825 - GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab 16.0.0.
  • CVE-2023-20887 - VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887).
  • elevationstation - elevate to SYSTEM any way we can!
  • SharpFtpC2 - A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.
  • limba - compile-time control flow obfuscation using mba.
  • Banshee - Experimental Windows x64 Kernel Driver/Rootkit.
  • RDPCredentialStealer - steals credentials provided by users in RDP using API Hooking with Detours in C++.
  • HiddenDesktop - HVNC for Cobalt Strike.
  • DropSpawn_BOF - CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking.
  • Terminator - Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes.
  • superman - Kill processes protected by antivirus during offensive activities.
  • Blackout - kill anti-malware protected processes (BYOVD).
  • EPI - Process injection through entry points hijacking.
  • Ruy-Lopez This repository contains the Proof-of-Concept(PoC) for a new approach to completely prevent DLLs from being loaded into a newly spawned process.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • mcfridafee
  • plane - Open Source JIRA, Linear and Height Alternative. Plane helps you track your issues, epics, and product roadmaps in the simplest way possible.
  • PythonMemoryModule - pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory.
  • deepsecrets - Secrets scanner that understands code.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-05-22

By: Erik
23 May 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-05-09 to 2023-05-22.

News

Techniques and Write-ups

Tools and Exploits

  • CypherDog - PoSh BloodHound Dog Whisperer.
  • buzzer is a fuzzer toolchain that allows to write eBPF fuzzing strategies.
  • keepass-password-dumper - Original PoC for CVE-2023-32784 (keepass master password disclosure).
  • PPLFaultDumpBOF - Takes the original PPLFault and the original included DumpShellcode and combines it all into a BOF targeting cobalt strike.
  • PPEnum - Simple BOF to read the protection level of a process.
  • ADCSKiller - An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer.
  • Chimera - Automated DLL Sideloading Tool With EDR Evasion Capabilities.
  • chromecookiestealer - Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.
  • GoBelt - Golang programmatically invoking the SwiftBelt-JXA macOS system enumerator project (Golang running SwiftBelt-JXA via cgo).

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • avred - Analyse your malware to chirurgicaly obfuscate it.
  • smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares.
  • Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management functions and uses data flow analysis to abstract their behaviors and then adopts these summaries to enhance bug detection.
  • dumpulator - An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
  • EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances. It works by sending commands to EC2 instances using ssm:SendCommand and then retrieves the output using ssm:ListCommandInvocations or ssm:GetCommandInvocation.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-05-09

By: Erik
10 May 2023 at 00:00

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-05-01 to 2023-05-09.

News

Techniques and Write-ups

Tools and Exploits

  • sccmhunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. The basic function of the tool is to query LDAP with the find module for potential SCCM related assets.
  • exec2shell - Extracts TEXT section of a PE, ELF, or Mach-O executable to shellcode.
  • chophound - Some scripts to support with importing large datasets into BloodHound.
  • HASH - HASH (HTTP Agnostic Software Honeypot).
  • cloudtoolkit - Cloud Penetration Testing Toolkit.
  • CVE-2023-0386 - Privilege escalation exploit for Ubuntu 22.04.
  • PECheck - A tool to verify and create PE Checksums for Portable Executable (PE) files.
  • CustomEntryPoint - Select any exported function in a dll as the new dll's entry point.
  • resocks - mTLS-Encrypted Back-Connect SOCKS5 Proxy.
  • stealthscraper - A social media scraper that attempts to be stealthy by simulating a user using gui automation.
  • Freeze.rs - Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-05-01

By: Erik
2 May 2023 at 01:15

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-04-17 to 2023-05-01.

News

Techniques and Write-ups

Tools and Exploits

  • Introducing BloodHound 4.3 โ€” Get Global Admin More Often. More Azure and MS Graph features!
  • ScareCrow. Not a new tool but a big update to the payload creation framework for v5.0.
  • nanodump - Not new, but the recent updates allows for PPL dumping!
  • DCVC2 - A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in text chats.
  • maskcat - Utility tool for Hashcat Masks and Password Cracking.
  • mac-monitor - Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research. Beginning with Endpoint Security (ES), it collects and enriches system events, displaying them graphically, with an expansive feature set designed to reduce noise.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • highlight - highlight.io: The open source, full-stack monitoring platform. Error monitoring, session replay, logging and more. I haven't seen a self-hostable web session recording system before highlight.
  • KeePwn - A python tool to automate KeePass discovery and secret extraction.
  • Maintaining this site fucking sucks. This guy needs my blog CI/CD pipeline. When I finish a blog post it's one command to publish it and set up the env for next week. Maybe, just maybe, you don't need all that javascript (hint: there isn't a single line of functional javascript on this site).

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-04-17

By: Erik
18 April 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-04-10 to 2023-04-17.

News

Techniques and Write-ups

Tools and Exploits

  • PatchlessCLRLoader - .NET assembly loader with patchless AMSI and ETW bypass. Also comes in BOF form: PatchlessInlineExecute-Assembly.
  • KillerVuln2 - Files for PoC of vulnerability in Intel Killer Performance Suite
  • PowerShell-Obfuscation-Bible - A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.
  • 2D-Injector - Hiding unsigned DLL inside a signed DLL.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • scriptkiddi3 - Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using shell script and open source tools.
  • BackupOperatorToolkit - contains different techniques allowing you to escalate from Backup Operator to Domain Admin
  • homebox - Homebox is the inventory and organization system built for the Home User.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-04-10

By: Erik
11 April 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-03-20 to 2023-04-10.

News

Techniques and Write-ups

Tools and Exploits

  • Tool Release - shouganaiyo-loader: A Tool to Force JVM Attaches. Inject your own Java code into processes that have disabled the agent attach API.
  • PoC for CVE-2023-28206 - exploit for an out-of-bounds write in the IOSurfaceAccelerator, allowing a malicious actor to execute arbitrary code with kernel privileges on macOS/iOS by utilizing a specially crafted application. Note this is just a kernel panic PoC.
  • EPScalate - Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS.
  • OffensiveCpp - This repo contains C/C++ snippets that can be handy in specific offensive scenarios.
  • Implant execution via PrintBrm.exe - use PrintBrm to extract & execute an implant from an ISO.
  • EntropyReducer - Reduce Entropy And Obfuscate Your Payload With Serialized Linked Lists.
  • PhoenixC2 - Command & Control-Framework created for collaboration in python3. This looks very alpha.
  • HardHatC2 - A C# Command & Control framework. Another alpha C2, but this one has a lot of features in the agent already.
  • dir2json - Tool for efficient directory enumeration. Read the blog post.
  • DPAPISnoop - A C# tool to output crackable DPAPI hashes from user MasterKeys.
  • GodPotato - ImpersonatePrivilege == SYSTEM. At this point I think its just a feature of Windows.
  • Chaos-Rootkit - x64 ring0 Rootkit with Process Hiding and Privilege Escalation Capabilities.
  • rogue - A barebones template of 'rogue' aka a simple recon and agent deployment I built to communicate over ICMP. Well, without the ICMP code.
  • wmiexec-Pro - Lateral movement with WMI using only port 135.
  • inline-syscall - Inline syscalls made for MSVC supporting x64 and x86.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • serge - A web interface for chatting with Alpaca through llama.cpp. Fully dockerized, with an easy to use API.
  • Game Hacks: Among Us - IL2CPP Walkthrough. The same techniques can be used to locate sensitive data and craft exploits in more serious applications.
  • espanso - Cross-platform Text Expander written in Rust.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-03-20

By: Erik
21 March 2023 at 03:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-03-07 to 2023-03-20.

News

Techniques and Write-ups

Tools and Exploits

  • MacOSThreatTrack - Bash tool used for proactive detection of malicious activity on macOS systems.
  • Updates to C2-Tool-Collection - Psm: BOF to show detailed information on a specific process ID; ReconAD: BOF that uses ADSI to query Active Directory (AD and GC) objects and attributes.
  • Azure-App-Tools - Collection of tools to use with Azure Applications. Just updated with an IPFS dropper.
  • ekko-rs - Rusty Ekko - Sleep Obfuscation in Rust.
  • PSBits - Windows 10 offline admin creation? ๐Ÿ˜ˆ Why not?! Everything happens through built-in offlinelsa and offlinesam DLLs. Official, but not very documented.
  • Elevate-System-Trusted-BOF - This BOF can be used to elevate the current beacon to SYSTEM and obtain the TrustedInstaller group privilege. The impersonation is done through the SetThreadToken API.
  • Black-Angel-Rootkit - Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
  • bootdoor - An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets. The tool dives deep to discover keywords and phrases leading to potential passwords or hidden directories.
  • Demystifying Security Research - Part 1. This resonated with me, with a heavy emphasis on blog posts and tweets.
  • UPnProxyChain - A tool to create a SOCKS proxy server out of UPnProxy vulnerable device(s).

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-03-07

By: Erik
8 March 2023 at 02:40

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past 2 weeks. This post covers 2023-02-20 to 2023-03-07.

News

Techniques and Write-ups

Tools and Exploits

  • MemFiles - A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk.
  • Amsi-Killer - a "lifetime AMSI bypass."
  • Thunderstorm - Modular framework to exploit UPS devices. Only 2 exploits for now.
  • msidump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
  • lolbin-poc - Small PoC of using a Microsoft signed executable as a lolbin.
  • Kraken - a modular multi-language webshell coded by @secu_x11.
  • DroppedConnection - Emulates a Cisco ASA Anyconnect VPN service, accepting any credentials (and logging them) before serving VBS to the client that gets executed in the context of the user.
  • Timeroast - Scripts that execute timeroasting and trustroasting attack techniques by discovering weak computer or trust passwords within an Active Directory domain.
  • AtomLdr - A DLL loader with advanced evasive features.
  • bootlicker - A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • Locksmith. A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services. Quick wins for Sysadmins!
  • APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.
  • Coercer. A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods. #onetorullethemall
  • curl-impersonate - A special build of curl that can impersonate Chrome & Firefox.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-02-21

By: Erik
22 February 2023 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-02-13 to 2023-02-21.

News

  • New legal framework for reporting IT vulnerabilities. Belgium's CSIRT can give researchers legal protection granted they meet some conditions when reporting (ethics stuff like acting without intent to harm, no public disclosure without consent, etc). To see this codified in law is awesome. Hack the planet!
  • ClamAV 0.103.8, 0.105.2 and 1.0.1 patch versions published. HFS+ file parsing could lead to remote code execution. As ClamAV is used in many mail gateways, the potential to get code execution by emailing an HFS+ file is exiting/terrifying.
  • telnet-client. The Google Chrome team put a telnet client into Chrome. Your scientists were so preoccupied with whether or not they could, they didn't stop to think if they should.
  • [Twitter] Activision was breached December 4th, 2022.. How'd they do it? SMS phishing, and you can see the screenshots in the tweet. All it takes is one, however, the attackers appear to have their access from a different location (i.e. no code running on the user's system). Would your systems catch this (impossible travel, etc)?
  • GoDaddy says a multi-year breach hijacked customer websites and accounts. Ever since GoDaddy bought and then tried to resell me a domain I searched for on their site in 2012 I have sworn to never touch them. Intuition was right on.

Techniques and Write-ups

Tools and Exploits

  • CVE-2022-44666 - Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.
  • ntqueueapcthreadex-ntdll-gadget-injection - This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
  • Split - Apply a divide and conquer approach to bypass EDRs.
  • COFF_With_Exception_handler.c. Make your BOFs safer.
  • LsaParser - A shitty (and old) lsass parser. [authors original description]
  • NimPlant - A light-weight first-stage C2 implant written in Nim.
  • ThreadlessInject-BOF - BOF implementation of @_EthicalChaos_'s ThreadlessInject project. A novel process injection technique with no thread creation, released at BSides Cymru 2023.
  • graphcat - Generate graphs and charts based on password cracking result.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-02-13

By: Erik
14 February 2023 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-02-06 to 2023-02-13.

News

Techniques and Write-ups

Tools and Exploits

  • TeamFiltration V3.5.0 - Improve All the Things!. Lots of new features and improvements to this cross-platform framework for enumerating, spraying, exfiltrating, and backdooring Office 365 Azure AD accounts.
  • ThreadlessInject - Threadless Process Injection using remote function hooking.
  • LPE via StorSvc - Windows Local Privilege Escalation via StorSvc service (writable SYSTEM path DLL Hijacking).
  • FilelessPELoader - Loading Remote AES Encrypted PE in memory, decrypt and run it.
  • D1rkSleep - Improved version of EKKO by @5pider that Encrypts only Image Sections.
  • HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.
  • firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing a target with a large number of built-in checks to detect behaviors in the target.
  • UnhookingPatch - Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime.
  • OperatorsKit - Collection of Beacon Object Files (BOF) for Cobalt Strike.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • wildebeest is an ActivityPub and Mastodon-compatible server.
  • grepmarx - A source code static analysis platform for AppSec enthusiasts.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-02-06

By: Erik
7 February 2023 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-01-30 to 2023-02-06.

News

  • Taking the next step: OSS-Fuzz in 2023. Increased bounties for integrating projects into OSS-Fuzz. Nice!
  • Dutch Police Read Messages of Encrypted Messenger 'Exclu'. If you messenger is not open source and the server is not self-hosted, someone could be reading your messages. Yes, this includes Signal (what is actually running on the servers?).
  • CVE-2023-0045. Speculative execution bugs are going to be with us for a while. "The current implementation of the prctl syscall for speculative control fails to protect the user against attackers executing before the mitigation. The seccomp mitigation also fails in this scenario."
  • An important next step on our AI journey. Google's response to ChatGPT is... a blog post and no working product? Meanwhile, I'm out here having GPT-3 write my commit messages.
  • Checksum mismatches on .tar.gz files. GitHub temporarily broke a lot of deployments after changing the default compression algorithm for releases. The change has been reverted, but showed how fragile the some software release ecosystems are and how reliant they are on a single third party.

Techniques and Write-ups

Tools and Exploits

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • FirmAE - Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
  • wa-tunnel -Tunneling Internet traffic over Whatsapp.
  • RToolZ - A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-01-30

By: Erik
31 January 2023 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-01-23 to 2023-01-30.

News

Techniques and Write-ups

Tools and Exploits

  • gato GitHub Self-Hosted Runner Enumeration and Attack Tool. More information in this post.
  • starhound-importer - Import data from SharpHound and AzureHound using CLI instead of GUI BloodHound using "BloodHound's code". Detail here.
  • azbelt - AAD related enumeration in Nim.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-01-23

By: Erik
24 January 2023 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-01-16 to 2023-01-23.

News

  • how to completely own an airline in 3 easy steps. The US "No fly list" was found on an exposed jenkins server belonging to CommuteAir. 80MB of NOFLY.CSV. Classic.
  • Introducing LogSlash and The End of Traditional Logging. An interesting idea so save the "meaning" of a series of logs without all the raw data. I think large firms will still be saving all the raw data as all their detections are built on it, but I like the idea.
  • HC-tree. A very non-descriptive title for a really cool feature. HC-tree is a high performance backend for SQLite that enables concurrency, replication, and massive size SQLite DBs. There aren't many small applications that shouldn't be using SQLite today as their DB, but with HC-tree, there will be almost none that need anything but SQLite.
  • Visual Studio Spell Checker Preview Now Available. Misspellers of the world, untie! (it won't help in this case... oh well.)
  • Pirate Bay Proxy Portal Taken Down by Github. Opinions of The Pirate Bay aside, GitHub took down a page that was hosting links to proxies, not even The Pirate Bay itself. The Tor Project is still on GitHub. Strange to see where the line is drawn sometimes.

Techniques and Write-ups

Tools and Exploits

  • CVE-2022-42864 - Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition that was fixed in iOS 16.2 / macOS Ventura 13.1. Read more at Diabolical Cookies.
  • Credmaster2. Your favorite credential spraying tool is back with more plugins.
  • pdtm - ProjectDiscovery's Open Source Tool Manager.
  • Caido - A lightweight web security auditing toolkit. Built from the ground up in Rust, Caido aims to help security professionals and enthusiasts audit web applications with efficiency and ease.
  • Silhouette is a POC that mitigates the use of physical memory to dump credentials from LSASS.
  • git-sim: Visually simulate Git operations in your own repos. Complex git operations can be scary. They're less scary if you can see a pretty picture of what is happening.
  • a.socks.proxy.shellcode is SOCKS4 server in shellcode for armv5, armv7, mipseb, and x64.
  • SeeProxy - Golang reverse proxy with CobaltStrike malleable profile validation.
  • golddigger is a simple tool used to help quickly discover sensitive information in files recursively.
  • APCLdr - Payload Loader With Evasion Features.
  • CVE-2023-0179-PoC. This is the Linux CVE from last week where the PoC was pulled. It's out now!

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • git-cliff - A highly customizable Changelog Generator that follows Conventional Commit specifications โ›ฐ๏ธ
  • sh4d0wup - Signing-key abuse and update exploitation framework. This thing is fully featured and scary!
  • ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teaming and anti-forensics purposes.
  • SANS SEC760: Advanced Exploit Development for Penetration Testers - Review. The review isn't the interesting part here, its section 3: Recommendations that are gold.
  • infisical โ™พ Infisical is an open-source, end-to-end encrypted tool to sync secrets and configs across your team and infrastructure.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-01-16

By: Erik
16 January 2023 at 23:25

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-01-09 to 2023-01-16.

News

Techniques and Write-ups

Tools and Exploits

  • secret_handshake - A prototype malware C2 channel using x509 certificates over mTLS.
  • phishim is a phishing tool which reduces configuration time and bypasses most types of MFA by running a chrome tab on the server that the user unknowingly interacts with.
  • CoffLoader - an implementation of in-house CoffLoader supporting CobaltStrike standard BOF and BSS initialized variables.
  • latma - Lateral movement analyzer (LATMA) collects authentication logs from the domain and searches for potential lateral movement attacks and suspicious activity. The tool visualizes the findings with diagrams depicting the lateral movement patterns.
  • gophish - GoPhish automation.
  • CVE-2023-0179: Linux kernel stack buffer overflow in nftables: PoC and writeup. PoC has been pulled for the time being, but as this effects Linux from ~2019 and later, it could be a pretty widespread LPE and potentially some LAN crashes or RCE.
  • LocalPotato is coming soon! - Watch this space.
  • Issue 2361: XNU race condition in vm_map_copy_overwrite_unaligned allows writing to read-only mappings. Ian Beer drops his "MacDirtyCow" which is already being used in the jailbreaking scene to do non-persistent tweaks.
  • OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises. Version 2 just dropped.
  • Open Sourcing Incident Management system. The HARP incident management system, designed to help teams quickly and effectively respond to and resolve any incidents that may occur, specifically in the tech industry, is now open source!

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • Crassus - Windows privilege escalation discovery tool
  • ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Windows syscalls. ShellWasp is built for 32-bit, WoW64.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-01-09

By: Erik
10 January 2023 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2023-01-02 to 2023-01-09.

News

Techniques and Write-ups

Tools and Exploits

  • iCDump. A Modern Objective-C Class Dump. Blog here.
  • UnhookingPatch - Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime.
  • HellHall is a combination of HellsGate and indirect syscalls.
  • WalkerGate is a method to take syscall with memory parsing of ntdll.
  • zsyscall is an implementation of the Hell's Gate VX technique. The main difference with the original implementation is the use of the zsyscall procedure instead of HellsGate and HellDescent for using syscalls.
  • SOC-Multitool - A free and open source tool to aid in SOC investigations!
  • Alcatraz is a x64 binary obfuscator that is able to obfuscate various different pe formats.
  • sub-scout is a simple bash script to automate your inital recon and extend your attack surface using popular tools made by infosec community.
  • MITRE_ATTACK_CLI - CLI Search for Security Operators of MITRE ATT&CK URLs.
  • nuclearpond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • A New PyRDP Release: The Rudolph Desktop Protocol!. The gosecure RSS feed was slow on this one?
  • KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.
  • NTLMRecon - A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.
  • smudge - Passive OS detection based on SYN packets without Transmitting any Data

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2023-01-02

By: Erik
3 January 2023 at 03:35

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2022-12-12 to 2023-01-02.

News

Techniques and Write-ups

Tools and Exploits

  • Avoiding Detection with Shellcode Mutator. By randomly adding nops or nop equivalent instructions, ShellcodeMutator can break yara rules that look for specific assembly sequences in shellcode.
  • Dirty-Vanity - A POC for the new injection technique, abusing windows fork API to evade EDRs. See the slides from BlackHat EU here.
  • DirCreate2System - Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting.
  • CVE-2022-2602-Kernel-Exploit and CVE-2022-2602 are Linux LPEs for Linux kernel upstream stable 5.4.x, 5.15.x, and later versions. 5.10.x may be vulnerable as well.
  • Cohab_Processes - A small Aggressor script to help Red Teams identify foreign processes on a host machine.
  • CaFeBiBa - COFF parser - a COFF parser for binaries compiled with MSVC.
  • Offensive-Rust - Various offensive techniques in Rust.
  • ASRenum-BOF - Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations.
  • CVE-2022-42046 - CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM.
  • linux_injector - A simple ptrace-less shared library injector for x64 Linux.
  • Venom is a library that meant to perform evasive communication using stolen browser socket.
  • wanderer - An open-source process injection enumeration tool written in C#.
  • Invoke-Retractor - Build a Seatbelt executable containing only commands you specify.
  • WTSRM2 - Writing Tiny Small Reliable Malware 2. This has a ton of cool features, worth a look.
  • PassTheChallenge - Recovering NTLM hashes from Credential Guard. See the blog post for more details.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2022-12-12

By: Erik
13 December 2022 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2022-12-05 to 2022-12-12.

News

  • Apple advances user security with powerful new data protections. This is a great step forward for a company who has marketed "privacy" but technically had some work to do. While iMessage has always been end-to-end encrypted, iCloud backups, which contain all your iMessages conveniently have not been. Thus, with a simple court order, all your iPhone contents are available to any legally valid request. With this change, everything except Email, Contacts, and Calendar are encrypted on iCloud, rendering those data requests useless. iMessage Contact Key Verification feels a lot like Signal, and security key support for iCloud accounts is long overdue. While none of these steps are groundbreaking, Apple is pushing the boundaries for "mainstream" tech privacy.
  • ChatGPT bid for bogus bug bounty is thwarted. It was inevitable. Perhaps bugs will be triaged by AI soon, and the AIs can fight it out amongst themselves.
  • Anker's Eufy lied to us about the security of its security cameras. Last week's story was only about the notification image, but it appears that you could get an unencrypted stream URL from Eufy cameras that worked over the internet until recently. So much for local only. I repeat: Put your cameras on a VLAN without egress, and VPN in to view them - trust no one.
  • Releasing Semgrep 1.0. Now you have no excuse for not using it to find vulns.

Techniques and Write-ups

Tools and Exploits

  • RedditC2 - Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic look legit.
  • emailGPT - a quick and easy interface to generate emails with ChatGPT.
  • noseyparker is a command-line program that finds secrets and sensitive information in textual data and Git history.
  • CVE-2022-44721 Crowdstrike Falcon Uninstaller.
  • DCOMPotato - Exploit collection for some Service DCOM Object local privilege escalation vulnerabilities (SeImpersonatePrivilege abuse).
  • WindowSpy is a Cobalt Strike Beacon Object File meant for targetted user surveillance. The goal of this project was to trigger surveillance capabilities only on certain targets, e.g. browser login pages, confidential documents, vpn logins etc.
  • Wiretap is a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • BlueMap helps penetration testers and red teamers to perform Azure auditing, discovery & enumeration, and exploitation in interactive mode that saves complex opsec and overhead that usually exists in Azure penetration testing engagements.
  • TProxy is an interception proxy for TCP traffic. It can be used to monitor, drop, modify or inject packets in an existing TCP connection. For monitoring purposes, TProxy has the ability to decrypt incoming TLS traffic and re-encrypt outgoing packets. It also leverages Wireshark dissectors to build a dissection tree of each intercepted packet.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2022-12-05

By: Erik
6 December 2022 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2022-11-28 to 2022-12-05.

News

Techniques and Write-ups

Tools and Exploits

  • SysmonEoP - Proof of Concept for arbitrary file delete/write in Sysmon (CVE-2022-41120).
  • Visual Studio Code: Remote Code Execution. Jypiter notebook links could have led to RCE in vscode when clicked.
  • SilentMoonwalk is a PoC implementation of a true call stack spoofer, implementing a technique to remove the original caller from the call stack, using ROP to desynchronize unwinding from control flow. Want it in rust? Try Unwinder.
  • PrintNotifyPotato - Another potato, using PrintNotify COM service for lifting rights.
  • BumbleCrypt - A Bumblebee-inspired Crypter.
  • google_lure.py - Generate phishing lures that exploit open-redirects from www.google.com using Google Docs.
  • NimDllSideload allows you to easily generate Nim DLLs you can use sideloading/proxy loading. If you're unfamiliar with what DLL sideloading is, take a gander at this blog post.
  • Defender_Exclusions-BOF - A BOF to determine Windows Defender exclusions.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • Neton is a tool for getting information from Internet connected sandboxes.
  • kubeshark , the API Traffic Viewer for kubernetes, provides deep visibility and monitoring of all API traffic and payloads going in, out and across containers and pods inside a Kubernetes cluster. Think of a combination of Chrome Dev Tools, TCPDump and Wireshark, re-invented for Kubernetes.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2022-11-28

By: Erik
29 November 2022 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2022-11-14 to 2022-11-28.

News

Techniques and Write-ups

Tools and Exploits

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • nuvola is a tool to dump and perform automatic and manual security analysis on AWS environments configurations and services using predefined, extensible and custom rules created using a simple Yaml syntax.
  • ofrak is a binary analysis and modification platform that combines the ability to unpack, analyze, modify, and repack binaries.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2022-11-14

By: Erik
15 November 2022 at 04:59

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2022-11-07 to 2022-11-14.

News

Techniques and Write-ups

Tools and Exploits

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • squarephish is an advanced phishing tool that uses a technique combining the OAuth Device code authentication flow and QR codes.
  • Digital detritus. As a digital hoarder (look at me right now trying to collect and label all the relevant security stuff from last week) this post resinated with me.
  • GPT-4 Rumors From Silicon Valley. AI is getting scary.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

Last Week in Security (LWiS) - 2022-11-08

By: Erik
9 November 2022 at 04:58

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2022-10-31 to 2022-11-08.

News

Techniques and Write-ups

Tools and Exploits

  • Volumiser is a command line tool and interactive console GUI for listing, browsing and extracting files from common virtual machine hard disk image formats.
  • katana - A next-generation crawling and spidering framework from projectdiscovery.
  • KeeFarceReborn - A standalone DLL that exports databases in cleartext once injected in the KeePass process.
  • CVE-2022-33679 One day based on RC4 is still considered harmfrul.
  • stager_libpeconv A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading.
  • CVE-2022-40146_Exploit_Jar. Apache Batik SSRF to RCE Jar Exploit.
  • awsrecon - Tool for reconnaissance of AWS cloud environments.
  • exe_who - Executables on Disk? Bleh ๐Ÿคฎ.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • The Information Security Kardashev Scale. Interesting way to tier out cybersecurity.
  • PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.
  • Kernelhub ๐ŸŒดKernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (Windows only).
  • grace It's strace, with colors.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing. This post is cross-posted on SIXGEN's blog.

โŒ
โŒ