Information Security
414 subscribers
157 photos
5 videos
9 files
2.28K links
Information Security News

we are @sec_nerd twin brother
Download Telegram
Information Security
Photo
SwampThing

SwampThing lets you to spoof process command line args (x32/64). Essentially you create a process in a suspended state, rewrite the PEB, resume and finally revert the PEB. The end result is that logging infrastructure will record the fake command line args instead of the real ones. Think for example about launching a wmic xsl stylesheet for code execution but faking an innocuous wmic command.


https://github.com/FuzzySecurity/Sharp-Suite
flare-emu

flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use and flexible interface for scripting emulation tasks.

https://github.com/fireeye/flare-emu
Hardening Microsoft Windows 10 version 1709 Workstations

https://acsc.gov.au/publications/protect/Hardening_Win10.pdf
A 9-step recipe to crack a NTLMv2 Hash from a freshly acquired .pcap


https://research.801labs.org/cracking-an-ntlmv2-hash/
Want to bypass Powershell/.Net AMSI, but don't want your bypass code to be inspected? .Net Profilers to the rescue! This nifty little feature allows you to inject a (native) dll into new .Net processes using an env variable.


https://github.com/djhohnstein/.NET-Profiler-DLL-Hijack
0day in forticlient 6.0.3.0155

https://blog.secu.dk/blog/Forticlient/