Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Microsoft Shift F10 bypass + Autopilot privilege escalation
๐Ÿ—ฃk4m1ll0

Am i missing something, or could you just as easily pop out the harddisk and put it in another machine to remove the DisableCMDRequest.TAG file/do whatever you want?
๐Ÿ‘คBl00dsoul

There are ways to disable it: https://call4cloud.nl/2022/01/the-oobe-massacre-the-beginning-of-shift-f10/

Another attack vector would be audit mode at beginning of setup. After creating admin accounts or whatever sysprep back to OOBE to continue with autopilot
๐Ÿ‘คHankMardukasNY

This vuln is fairly well-known in the Intune community, but mostly theoretical - great to see a writeup and full attack chain. Do you have any recommendations for mitigating it? I've focused on using preprovisioning to lock down the system and defaultuser0, but being able to alt-tab and modify system state at all seems like a huge attack surface
๐Ÿ‘คPl4nty


๐ŸŽ–@malwr
๐Ÿ‘1
Hardware encrypted usb suggestions??
What products are we using for hardware encrypted drives to move data around and store forensic data securely?
๐Ÿ—ฃdfzachary

Iโ€™ve used Aegis and SiForce. I much prefer the latter as they are more reliable and less prone to disconnection due to power consumption issues.
๐Ÿ‘คucfmsdf

Apricorn Aegis Padlock drives are the best!
๐Ÿ‘คno_sushi_4_u


๐ŸŽ–@malwr
monomorph: MD5-Monomorphic Shellcode Packer - Pack arbitrary shellcode into an executable that always has the same MD5 hash
๐Ÿ—ฃsanitybit

Itโ€™s interesting though, next step is to cause collisions with system files hashes and see what happens with AVs ๐Ÿ˜
๐Ÿ‘คmrdantesque

Lmao
๐Ÿ‘คEvenIfIWantedTo

The output file will always have the same MD5 hash: 3cebbe60d91ce760409bbe513593e401


Well there we go AV vendorsโ€ฆ
๐Ÿ‘คlittlejob


๐ŸŽ–@malwr
๐Ÿ”ฅ2๐Ÿ‘1