My friend @dfirence created an awesome app called Mitre Assistant where you can visualize all the techniques used by a threat actor and more! Check this out! π#infosec
https://ma-insights.vercel.app/
π£fr0gger_
π@malwr
https://ma-insights.vercel.app/
π£fr0gger_
π@malwr
The slides of our talk at Recon 2023 "Dissecting the Modern Android Data Encryption Scheme" are now available online.
Thanks @reconmtl for organizing this great event.
https://github.com/quarkslab/conf-presentations/blob/master/Recon23/Recon23-Android-FBE-mrossibellom-dmelotti.pdf
π£max_r_b
π@malwr
Thanks @reconmtl for organizing this great event.
https://github.com/quarkslab/conf-presentations/blob/master/Recon23/Recon23-Android-FBE-mrossibellom-dmelotti.pdf
π£max_r_b
π@malwr
"windows-api-function-cheatsheets: A reference of Windows API function calls, including functions for file operations, process..."
#infosec #pentest #redteam
https://github.com/snowcra5h/windows-api-function-cheatsheets
π£CyberWarship
π@malwr
#infosec #pentest #redteam
https://github.com/snowcra5h/windows-api-function-cheatsheets
π£CyberWarship
π@malwr
"BLACKHAT_Asia2023: Black Hat Asia 2023 PDF Public"
#infosec #pentest #redteam
https://github.com/Mr-xn/BLACKHAT_Asia2023
π£CyberWarship
π@malwr
#infosec #pentest #redteam
https://github.com/Mr-xn/BLACKHAT_Asia2023
π£CyberWarship
π@malwr
Manually 'reconstruct' a packed PE file from a crash dump in IDA. https://youtu.be/A0qC2Um6gsA
π£allthingsida
π@malwr
π£allthingsida
π@malwr
YouTube
Manually reconstructing a PE file from a crash dump in IDA
In this episode, we start with a Windows user mode crash dump file. Our goal is to grab the main executable's segments, clean the segments, find/create the imports table, find the entry point and the original entry point, apply signatures, and other discussions.β¦
Escaping Parallels Desktop with Plist Injection https://pwn.win/2023/05/08/parallels-escape.html
π£reverseame
π@malwr
π£reverseame
π@malwr
pwn.win
Escaping Parallels Desktop with Plist Injection
This post details two bugs I found, a plist injection (CVE-2023-27328) and a race condition (CVE-2023-27327), which could be used to escape from a guest Parallels Desktop virtual machine. In this post Iβll break down the findings.
π₯1
Bypass-Sandbox-Evasion - Bypass Malware Sandbox Evasion Ram Check https://www.kitploit.com/2023/06/bypass-sandbox-evasion-bypass-malware.html #Pentesting #Bypass #Malware #Sandbox #CyberSecurity #Infosec
π£ptracesecurity
π@malwr
π£ptracesecurity
π@malwr
π₯1
Mandiant's Alexander Marvi, Brad Slaybaugh, Ron Craft & Rufus Brown have discovered additional techniques utilized by UNC3886 across multiple organizations to keep out of the sights of EDR solutions. https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass
π£virusbtn
π@malwr
π£virusbtn
π@malwr
π1π₯1
First Look: Ghidra 10.3 Emulator https://medium.com/@cy1337/first-look-ghidras-10-3-emulator-7f74dd55e12d
π£reverseame
π@malwr
π£reverseame
π@malwr
Medium
First Look: Ghidra 10.3 Emulator
Ghidra 10.3 dropped this week with a dedicated Emulator tool! Iβve been eagerly anticipating such a feature and so I am very excited thatβ¦
KasperskyLab/TinyCheckPublic
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them.
https://github.com/KasperskyLab/TinyCheck
π£Tinolle
π@malwr
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them.
https://github.com/KasperskyLab/TinyCheck
π£Tinolle
π@malwr
Nuclei + Paramspider = NucleiFuzzer (Automation)
NucleiFuzzer is a powerful automation tool for detecting xss,sqli,ssrf,open-redirect..etc vulnerabilities in web applications.
You can find the tool below
πππ
https://github.com/0xKayala/NucleiFuzzer
#BugBountyTips #BugBounty #HackerOne
π£ibrahimatix0x01
π@malwr
NucleiFuzzer is a powerful automation tool for detecting xss,sqli,ssrf,open-redirect..etc vulnerabilities in web applications.
You can find the tool below
πππ
https://github.com/0xKayala/NucleiFuzzer
#BugBountyTips #BugBounty #HackerOne
π£ibrahimatix0x01
π@malwr
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass #VMware #Pentesting #CyberSecurity #Infosec
π£ptracesecurity
π@malwr
π£ptracesecurity
π@malwr
Try these to check bugs in PDF uploads:-
https://github.com/luigigubello/PayloadsAllThePDFs
π£ManasH4rsh
π@malwr
https://github.com/luigigubello/PayloadsAllThePDFs
π£ManasH4rsh
π@malwr
GitHub
GitHub - luigigubello/PayloadsAllThePDFs: PDF Files for Pentesting
PDF Files for Pentesting. Contribute to luigigubello/PayloadsAllThePDFs development by creating an account on GitHub.
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
π£nangaparbat
This is why I come to the sub. Thanks for posting!
π€One-Fan7214
> Due to the way cellular networks are designed, it is difficult to prevent Delivery Reports from being returned to the originator making it challenging to thwart this covert attack without making fundamental changes to the network architecture.
Bollocks. Our network blocks them by default. Source: guy that built it.
EDIT: And furthermore, enabling SMS Home Routing in non-Transparent mode will protect against timing attacks since the target's home SMS-R will respond to the incoming SRI-SM and FSM messages immediately no matter where the subscriber is located. It will also foil the delivery receipt by lying and reporting successful delivery regardless.
π€ExParrot1337
before you all freak out, the accuracy is pretty good but at the granularity of countries. Still a problem in many circumstances.
π€vjeuss
π@malwr
π£nangaparbat
This is why I come to the sub. Thanks for posting!
π€One-Fan7214
> Due to the way cellular networks are designed, it is difficult to prevent Delivery Reports from being returned to the originator making it challenging to thwart this covert attack without making fundamental changes to the network architecture.
Bollocks. Our network blocks them by default. Source: guy that built it.
EDIT: And furthermore, enabling SMS Home Routing in non-Transparent mode will protect against timing attacks since the target's home SMS-R will respond to the incoming SRI-SM and FSM messages immediately no matter where the subscriber is located. It will also foil the delivery receipt by lying and reporting successful delivery regardless.
π€ExParrot1337
before you all freak out, the accuracy is pretty good but at the granularity of countries. Still a problem in many circumstances.
π€vjeuss
π@malwr
Driver-Based Privilege Escalation and How to Catch This Threat
In this video, I show a driver-based privilege escalation. This can be used to stop protected processes or do other actions requiring kernel access. I will also show you how to detect this using the loldrivers.io feed MISP and Elastic SIEM.
Driver Installation Privilege Escalation and Detection
π£Infosecsamurai
π@malwr
In this video, I show a driver-based privilege escalation. This can be used to stop protected processes or do other actions requiring kernel access. I will also show you how to detect this using the loldrivers.io feed MISP and Elastic SIEM.
Driver Installation Privilege Escalation and Detection
π£Infosecsamurai
π@malwr
YouTube
Stolen Signed Drivers: The Privilege Escalation Threat You Need To Know About.
In this enlightening video, we dive deep into the realm of privilege escalation, uncovering the hidden dangers associated with stolen signed drivers. Join us as we explore the powerful toolsβMISP, Elastic SIEM, and loldrivers.ioβthat can help you detect andβ¦
Analysis of CVE-2023-29336 Win32k Privilege Escalation
π£wolfcod
Great thanks! Needs to be more of this stuff, would love to learn more about taking a CVE/Patch Tuesday vulnerability to a PoC. Not much around about it, obviously because it's fairly difficult.
π€jahwni
π@malwr
π£wolfcod
Great thanks! Needs to be more of this stuff, would love to learn more about taking a CVE/Patch Tuesday vulnerability to a PoC. Not much around about it, obviously because it's fairly difficult.
π€jahwni
π@malwr
Numen
Analysis of CVE-2023-29336 Win32k Privilege Escalation
Analyzing CVE-2023-29336 Win32k vulnerability, its exploitation, and mitigation measures in the context of evolving security practices.