reverseshell

204 posts

reverseshell

reverseshell

@0xlsd

Malware Analysis | RE

Beigetreten Ocak 2017
1.2K Folgt221 Follower
reverseshell
reverseshell@0xlsd·
@hamidonsolo Hi @hamidonsolo its inspiring. Can you please share some pointers as a guidence so that i can improve my bug bounty journey
English
1
0
0
1.2K
Patrickbatman
Patrickbatman@hamidonsolo·
I'm 19, still in engineering school, and I just made $5,879 in February from bug bounties. I used AI to speed up my recon and workflow. No certs. No bootcamp. No CS degree. Here's the breakdown 🧵👇
Patrickbatman tweet media
English
18
17
432
37K
Shivam Kumar Singh
Shivam Kumar Singh@MrRajputHacker·
Hey 👋, Bug Bounty Hunters (Cyber Security Researchers), I am planning to create a Pvt Group where we monitor the data breaches of log files, company leaked source codes (for example, Uber, TikTok, etc.), and also share my findings, research, etc., for learning purposes.
English
44
8
142
14.6K
reverseshell retweetet
Michael Koczwara
Michael Koczwara@MichalKoczwara·
Last night APT10, APT28, APT29, APT41, and FIN7 DM me here on Twitter and said that my tweets revealed their poor opsec practices so now they will make a few changes: Changes: APT28 is not going to use Cobalt Strike anymore and they will use Koadic C3 from today. APT29 Cobalt Strike watermark is going to be changed from 1359593325 to 1337. APT10 infra is going to be hosted on Digital Ocean only. APT41 is changing all default C2 certifications from Major Cobalt Strike to Minor Cobalt Strike. FIN7 will not use RDP for lateral movements anymore and will use only SSH. So you have to track them now all from the beginning! Sorry about that 🤷‍♂️
English
11
75
391
86.1K
reverseshell retweetet
Michael Koczwara
Michael Koczwara@MichalKoczwara·
Pivoting from VirusTotal to Shodan and uncovering all threat actor infra (BRc4) 🎯 Let's grab this hash/badger implant (BRc4) 086d6f54b51a368d0a836ad8e24df659 Looks like the badger implant is connecting to this IP address -> 51.77.112.254 Now let's check IP with Shodan and let's create a hunting rule to find other Brute Ratel C4 👀 We need to grab HTTP Response/Hash (from HTTP Response) and JARM from this C2 and combine them all together🤘 Our combined Shodan BRC4 Hunting rule 🎯 http.html_hash:182674321 ssl.jarm:3fd21b20d00000021c43d21b21b43de0a012c76cf078b8d06f4620c2286f5e Our hunting rule uncovered 31 Brute Ratel C4 🔥 shodan.io/search?query=h… This is an example of how to pivot from one C2 and find the rest Happy Hunting! 🎯
Michael Koczwara tweet mediaMichael Koczwara tweet mediaMichael Koczwara tweet mediaMichael Koczwara tweet media
English
19
237
907
157.5K
reverseshell retweetet
Michael Koczwara
Michael Koczwara@MichalKoczwara·
Cobalt Strike redirector technique used recently by Russian APT29/Nobellium ⚡️ This is a Red Team technique (T1090.002 External Proxy) attack.mitre.org/techniques/T10… to hide C2 behind a legit website. This could be very useful for Threat Hunters/Intel to set up a hypothesis/monitor network traffic for malicious activity.
Michael Koczwara tweet mediaMichael Koczwara tweet media
English
13
162
495
106.7K
reverseshell retweetet
Joshua Penny
Joshua Penny@josh_penny·
Tweet 1. Just a bit more… From 🤖 #Truebot to #CL0P via #GoAnywhere: In my last thread, I went on a journey and found 14 #Cobalt Strike/#Meterpreter #C2s based off a HTTP header for an IP that shared an SSH fingerprint with a Truebot C2. Let's look at these a bit further…🧐
English
3
14
37
10.3K
reverseshell retweetet
Zscaler ThreatLabz
Zscaler ThreatLabz@Threatlabz·
🔒ThreatLabz has identified the U-Bomb #ransomware group operating a victim portal that strongly resembles the former #Hive group. Screenshots for comparison are shown below:
Zscaler ThreatLabz tweet mediaZscaler ThreatLabz tweet mediaZscaler ThreatLabz tweet mediaZscaler ThreatLabz tweet media
English
0
31
56
15.8K
reverseshell retweetet
Gi7w0rm
Gi7w0rm@Gi7w0rm·
Critical #0day in #Outlook fixed. CVE-2023-23397 exploited by #FancyBear to breach government, military, energy, and transportation orgs. Reported by CERT-UA so probably used in Russia's war against Ukraine. The flaw can be used to steal NTLM Hashes of victims. To cite: Threat actors can exploit it by sending messages with extended MAPI properties containing UNC paths to an SMB share (TCP 445) under their control. "The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane," Microsoft says in a security advisory published today. "The connection to the remote SMB server sends the user's NTLM negotiation message, which the attacker can then relay for authentication against other systems that support NTLM authentication," Redmond explains added in a separate blog post. CVE-2023-23397 impacts all supported versions of Microsoft Outlook for Windows but doesn't affect Outlook for Android, iOS, or macOS versions. Additionally, since online services like Outlook on the web and Microsoft 365 do not support NTLM authentication, they are not vulnerable to attacks exploiting this NTLM relay vulnerability. Patches are out so #Patch now! #infosec #vulnerabilty #news
English
1
76
149
71.3K
reverseshell retweetet
vx-underground
vx-underground@vxunderground·
Sebastien Raoult, an alleged member of ShinyHunters group, has been extradited from Morocco following a request from the United States government. He is currently in Seattle, Washington. He is facing 116 years in prison. He has plead not guilty. justice.gov/usao-wdwa/pr/a…
English
9
27
107
41.2K
reverseshell retweetet
Jose Enrique Hernandez
Jose Enrique Hernandez@_josehelps·
Thread alert! The Splunk Threat Research team (#STRT) has been busy in the past 60 days. Here's a quick rundown of some of our most recent projects:
English
1
45
190
37.5K
reverseshell retweetet
Threat Hunting
Threat Hunting@Mahdi_htm·
interesting APT28 malloc which uses no macro, the document is a PowerPoint file that exploits a code execution technique in a ahyperlink. which is designed to be triggered when the user starts the presentation mode and moves the mouse.
Threat Hunting tweet mediaThreat Hunting tweet mediaThreat Hunting tweet mediaThreat Hunting tweet media
English
6
88
313
48.5K
reverseshell retweetet
rivitna
rivitna@rivitna2·
Recently, a new version of #Hive #Ransomware v6 has been released. ty @happyhubbybear Hive's developer abandoned the keystream and XOR encryption. This version has a new crazy crypto scheme... ChaCha20 (some keys per a file) and RSA-5120 (2 public keys)
rivitna tweet mediarivitna tweet media
English
1
28
76
13.7K