247CTF

1.5K posts

247CTF banner
247CTF

247CTF

@247CTF

🏆 The 247CTF continuous security competition 📺 YouTube for CTF fundamentals https://t.co/0RP7w5pej2 🏁 https://t.co/FATXT1bqrW for CTF challenges

Australia Beigetreten Nisan 2019
88 Folgt5.4K Follower
Angehefteter Tweet
247CTF
247CTF@247CTF·
247CTF{f9591934c302bc8a29fad566fcf438cd}
English
8
4
87
0
247CTF retweetet
Synacktiv
Synacktiv@Synacktiv·
During a recent Active Directory intrusion test, @croco_byte was led to devise a new versatile attack vector targeting Group Policy Objects, allowing their exploitation through NTLM relaying. synacktiv.com/publications/g…
English
6
109
244
37.5K
247CTF retweetet
Charlie Bromberg « Shutdown »
Here is a first draft on an NTLM relay mindmap 🙂 from authentication coercion to post-relay exploitation. I'll gladly update/correct it if you think there are things wrong or missing. ➡️Featured on The Hacker Recipes thehacker.recipes/ad-ds/movement…
Charlie Bromberg « Shutdown » tweet media
English
16
312
835
0
247CTF retweetet
Rasta Mouse
Rasta Mouse@_RastaMouse·
[BLOG] Ok, I've written about my experience of battling with both managed and unmanaged memory allocations to try and improve @FuzzySec's Melkor POC. rastamouse.me/building-a-sli…
Rasta Mouse@_RastaMouse

@domchell 💯 I thought of doing a blog post showing ways to minimise or clear heap memory allocations in your C# tooling, kinda like programming OPSEC tips that don’t rely of the GC. Not sure how useful it would be though.

English
1
68
170
46.6K
247CTF retweetet
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
EDRSandblast-GodFault: a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections github.com/gabriellandau/…
English
2
56
151
12K
247CTF retweetet
assume_breach
assume_breach@assume_breach·
I just published Home Grown Red Team: SMB Pivots With Havoc C2 link.medium.com/Ap3Xk0HKjCb An updated article for lateral movement with Havoc.
English
5
123
388
28.1K
247CTF retweetet
Justin Gardner
Justin Gardner@Rhynorater·
SUCH a good read. I love the section where they explicitly explain the process used to write custom shellcode for OpenBSD. Even for a noob to Binary Exploitation that was so easy to follow and really emboldening to go after these sort of bugs. Bravo! blog.assetnote.io/2023/08/09/exp…
English
2
41
193
15.7K
247CTF retweetet
Mor Davidovich
Mor Davidovich@dec0ne·
Excited to share my new research: a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local/remote processes. github.com/ShorSec/DllNot… An accompanying blog post with more details: shorsec.io/blog/dll-notif…
ShorSec Cyber Security@ShorSecLtd

We are excited to share a new "threadless" process injection technique by @dec0ne. This new technique utilizes DLL Notification Callbacks in the remote process to trigger the shellcode github.com/ShorSec/DllNot… Detailed blog post: shorsec.io/blog/dll-notif… Demo video in next tweet

English
6
141
411
47.6K
247CTF retweetet
Justin Gardner
Justin Gardner@Rhynorater·
. @samwcyo's write ups not only contain a 👌 amount of technical details, but also tell a story and describe the mentality required to find these internet breaking bugs. Also, note the verbiage surrounding "interesting" or "curious". Essential. Must read: samcurry.net/points-com/
English
0
30
141
10.8K
247CTF retweetet
Riccardo
Riccardo@dottor_morte·
Me and @Her0_IT did a fair bit of research against one of the leading EDRs in the sector. This first post will hopefully be the start of a long saga, documenting all of our findings. This first part was dated back in 2020: riccardoancarani.github.io/2023-08-03-att…
English
3
69
183
16.8K
247CTF retweetet
phish 🐟
phish 🐟@dunderhay·
Published a write-up on successfully phishing a target using AD FS with MFA. Covers some of the challenges and how I finally got it working 🎣 research.aurainfosec.io/pentest/hook-l…
English
3
115
298
31.1K