Hacking Brasil
240 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
Fascinating C code: TCP sockets & HTTP file downloads using only ntdll exports (NtCreateFile & NtDeviceIoControlFile syscalls). Bypasses Winsock for low-level Windows networking.


https://www.x86matthew.com/view_post?id=ntsockets
๐Ÿ‘1
A Universal Windows Bootkit
An analysis of the MBR bootkit referred to as โ€œHDRootโ€



https://williamshowalter.com/a-universal-windows-bootkit/
๐—ข๐—ช๐—”๐—ฆ๐—ฃ ๐—ง๐—ข๐—ฃ ๐Ÿญ๐Ÿฌ - ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ ๐—Ÿ๐—Ÿ๐—  ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€

The OWASP Top 10 for LLMs is a list of the most critical vulnerabilities found in applications utilizing LLMs. It was created to provide developers, data scientists, and security experts with practical, actionable, and concise security guidance to navigate the complex and evolving terrain of LLM security.

Link ๐Ÿ”—:-
https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki/Vulnerable-LLM-Applications
This media is not supported in your browser
VIEW IN TELEGRAM
Bluetooth-DOS-Attack

Tool idea:
Make it mandatory for nearby Bluetooth-enabled devices to connect to nearby Bluetooth-enabled devices such as speakers and other things.

https://github.com/Yasher201/Bluetooth-DOS-Attack
๐—ง๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ป ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€

Breaking Barriers and Assumptions

๐Ÿ”— Part 1 :-
https://www.zerodayinitiative.com/blog/2024/7/29/breaking-barriers-and-assumptions-techniques-for-privilege-escalation-on-windows-part-1

๐Ÿ”— Part 2 :-
https://www.zerodayinitiative.com/blog/2024/7/30/breaking-barriers-and-assumptions-techniques-for-privilege-escalation-on-windows-part-2

๐Ÿ”— Part 3 :-
https://www.zerodayinitiative.com/blog/2024/7/31/breaking-barriers-and-assumptions-techniques-for-privilege-escalation-on-windows-part-3
C2 Cloud - The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.

https://github.com/govindasamyarun/c2-cloud?tab=readme-ov-file#application-setup
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting [2024]
๐Ÿ”ฅ1
Black Hat Bash.pdf
8.5 MB
Black Hat Bash - Creative Scripting for Hackers and Pentesters by Dolev Farhi, Nick Aleks
๐Ÿ”ฅ1
Tools and Techniques for Red Team / Penetration Testing

https://github.com/A-poc/RedTeam-Tools
CVE-2024-5932
*
WordPress GiveWP POP to RCE
*
POC exploit
Kaspersky TDSSKiller abuse to disable EDR software

You can abuse TDSSKiller to interact with kernel-level services to disable EDR software running on the machine.
 
Removal of Malwarebytes Anti-Malware Service:
tdsskiller.exe -dcsvc MBAMService 

Removal of Microsoft Defender:
tdsskiller.exe -dcsvc windefend 

The "-dcsvc <service_name>" command deletes the specified service, removing the registry keys and executables associated with the service and software.

https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/lockbit-ransomware-silently-disables-edr-using-tdsskiller

https://www.threatdown.com/blog/new-ransomhub-attack-uses-tdskiller-and-lazagne-disables-edr/
Leaked Wallpaper

This is a privilege escalation tool (fixed with CVE-2024-38100 in KB5040434) that allows us to leak a user's NetNTLM hash from any session on the computer, even if we are working from a low-privileged user.
https://github.com/MzHmO/LeakedWallpaper
PoC Exploit for Windows 0-Day Flaws CVE-2024-38202 and CVE-2024-21302 Released:
https://securityonline.info/poc-exploit-for-windows-0-day-flaws-cve-2024-38202-and-cve-2024-21302-released/