Zeroed

54 posts

Zeroed banner
Zeroed

Zeroed

@Zeroedtech

Just a guy that talks at conferences sometimes

Bergabung Temmuz 2019
84 Mengikuti318 Pengikut
Zeroed
Zeroed@Zeroedtech·
I’ve recently done a deep dive into how IIS view state machine keys are generated and how they are used to decrypt view state messages. I’ve written up my findings in a new blog post and developed an application to assist with the decryption of view states zeroed.tech/blog/decryptin…
English
0
7
14
1.1K
Zeroed
Zeroed@Zeroedtech·
...so yes
Zeroed tweet media
English
0
0
0
83
Zeroed
Zeroed@Zeroedtech·
Not the response I want when I resort to AI to debug some mutual TLS issues
Zeroed tweet media
English
0
0
0
90
Zeroed
Zeroed@Zeroedtech·
@irsdl @BSidesLondon I'd be very keen, viewstate exploration is a massive issue these days but getting people to under the issue is a nightmare
English
0
0
1
251
Soroush Dalili
Soroush Dalili@irsdl·
Unfortunately my workshop for exploiting asp .net viewstate in most scenarios didn't make it to @BSidesLondon due to other better workshops perhaps! Damn it AI categories 🤭 Please comment if you would like to read a blog post in a lab like style about it. You will need to have your own IIS server to follow it. Given it is asp net and IIS I thought people might not be too interested. I had presented a version of this in a Synack (SRT) meeting a few months ago.
English
53
10
200
18.5K
Zeroed
Zeroed@Zeroedtech·
@BertJanCyber I suspect this will follow the same route as the recent SharePoint vulns, adversaries will start simple with basic subprocesses execution but within a few days we'll have malicious .NET assemblies being reflectively loaded
English
0
0
1
242
Bert-Jan 🛡️
Bert-Jan 🛡️@BertJanCyber·
If you have not implemented a detection for suspicious IIS worker (w3wp.exe) processes, now is your time to do it. The Windows server components rely on IIS, not only WSUS, the same was the case with the last SharePoint vulnerability. github.com/Bert-JanP/Hunt…
Bert-Jan 🛡️@BertJanCyber

Some good technical content around the WSUS vulnerability (CVE‑2025‑59287) has been published by @eyesecurity. research.eye.security/wsus-deseriali…

English
3
32
164
24.3K
Zeroed
Zeroed@Zeroedtech·
I've recently been experimenting with using .NET profilers to hook .NET functions under IIS and decided to write up a blog post while it was fresh in my mind zeroed.tech/blog/hooking-n…
English
1
31
105
9.8K
Lucho
Lucho@lucho_in_Oz·
SharePoint attacks are slowing down. What is next 🥹
English
1
0
1
71
Tib3rius
Tib3rius@0xTib3rius·
.@TheRealC3rul34n sent me this after I was telling her about my SharePoint struggles + success. She gets me. 🥰
Tib3rius tweet media
English
1
8
67
3.7K
Zeroed
Zeroed@Zeroedtech·
Not a bad read, I think they may be overanalysing a compiled webshell and its a shame they didn't get a memory dump but its great to see more companies talking about this stuff github.com/RedDrip7/Night…
English
0
0
3
314
Zeroed
Zeroed@Zeroedtech·
@vinopaljiri Nice, I've always assumed these timestamps had just been tampered with
English
0
0
1
40
Jiří Vinopal
Jiří Vinopal@vinopaljiri·
[1/4] Have you ever seen a malware sample with a weird—maybe even future—PE timestamp? ➡️ Is it a .NET app? I recently saw some research publications labeled as "timestomped"...but that’s wrong. 🧠 It’s probably just a deterministic/repro build 🔍 Watch this video for a quick demo #malware #reversing #research
English
4
9
39
5.1K
Zeroed
Zeroed@Zeroedtech·
After a bit more digging it look like its referenced in Microsoft.JScript, Version=8.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a but not Microsoft.JScript, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a The later of which is used by my IIS
Zeroed tweet media
English
0
0
1
189
Zeroed
Zeroed@Zeroedtech·
For years I've seen adversaries using the "unsafe" keyword in their JScript eval shells and assumed it was required to eval complex statements (i.e code), but after trying to work out what it actually does for some training I'm working on I found it does nothing! Its unreferenced
Zeroed tweet media
English
1
0
1
255
Zeroed
Zeroed@Zeroedtech·
@AlienPacket @DebugPrivilege Sometimes you just don't care, as long as you achieve your objective, does it really matter that the blue team knows how you did it? A lot of the c# malware I look at does very little to hide what it's doing
English
0
0
1
35
Zeroed
Zeroed@Zeroedtech·
@DebugPrivilege Is there something dnSpy isn't handling for you?
English
0
0
1
438
Zeroed
Zeroed@Zeroedtech·
@0x706972686f @fr0gger_ For sure. It's good to see some official advice from Microsoft, even if it only covers static machine keys
English
0
0
2
21
🔥
🔥@0x706972686f·
@fr0gger_ @Zeroedtech you're probably already all over this, but in case you're not.
English
1
0
2
107
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
📢 New Microsoft Threat Report: "ViewState Code Injection Attacks Using Publicly Disclosed ASP.NET Machine Keys" I wanted to understand deeper how works the attack so I created a detailed overview. Hope that helps 🤓 👉 microsoft.com/en-us/security…
Thomas Roccia 🤘 tweet media
English
7
77
230
19.2K
Zeroed
Zeroed@Zeroedtech·
@inversecos @XintraOrg Can you clarify how the payment terms work? Are the values you have listed ranging from you can take a lump sum of 10k plus 50% of training sales through to a lump sum of 30k to essentially buy the rights to the training course?
English
1
0
1
581
inversecos
inversecos@inversecos·
XINTRA: Call for Trainings is NOW OPEN 🚨😍 We are actively seeking new trainings for @XintraOrg targeting blue/red teams. XINTRA PAYMENT TERMS Total Paid      +    Royalty --------------------------------- $10,000 USD     |     50% Split $25,000 USD     |     25% Split $30,000 USD     |     0% Split All trainings will be assessed by our Review Board. Apply Here 👇 forms.gle/afVCifhpCRc1pK… Read More Information 👇 xintra.org/community @XintraOrg
inversecos tweet media
English
6
23
109
24.8K
Zeroed
Zeroed@Zeroedtech·
Thank you to everyone who attended my training session and a massive thanks to @BSidesCbr for providing me the opportunity to run it. The slides and any code we used can be found here zeroed.tech/blog/bsides-20… I'd love any feedback on the session
English
0
5
16
2K