c0rnbread

52 posts

c0rnbread

c0rnbread

@0xC0rnbread

Katılım Mart 2023
213 Takip Edilen173 Takipçiler
Sabitlenmiş Tweet
c0rnbread
c0rnbread@0xC0rnbread·
Today I'm releasing Xenon, a custom Mythic agent for Windows targets written in C. Notable features include: 📁 Modular command/code inclusion 🦠 Malleable C2 Profile support 🪨 Compatible with Cobalt Strike BOFs github.com/MythicAgents/X… Blog series - c0rnbread.com/creating-mythi…
English
6
91
288
19.4K
c0rnbread retweetledi
Armada
Armada@armadaops·
The RedSun zero-day proved that you cannot patch against bad logical design. We are broadcasting The Operator View live right here on X today at 1:00 PM EST. Nick Swink (@0xC0rnbread ) is performing a deep-dive dissection of the recent Windows LPE 0-day vulnerabilities by Nightmare-Eclipse. Today’s agenda: Full breakdown of the RedSun exploit code. Live demo: Standard User -> NT AUTHORITY\SYSTEM. Why the vendor’s initial dismissal created a crisis for the enterprise. Join us at 1:00 PM EST to see the technical ground truth of the RedSun exploit. Drop your questions in the replies and we will address them live. #CyberSecurity #0day #LiveStream #InfoSec #ThreatIntel #TheOperatorView #Armada #ArmadaOps #RedSun
Armada tweet media
English
0
2
3
136
Octoberfest7
Octoberfest7@Octoberfest73·
@lildylannn Great research! It was quite the adventure working with Claude to get the c-style COM interfaces / headers / etc. still mulling over what the “so what” or use case is really gonna be for the BOF version
English
1
0
2
673
sully
sully@sullycodesstuff·
@weezerOSINT this is a uac escalation exploit there’s another that is still unpatched and has been around since at least nt 6.0 no popups, no detection, etc this is nothing new had the same experience reporting to microsoft, they brushed me off, even gave them fully functional poc source
English
2
0
14
11.7K
impulsive
impulsive@weezerOSINT·
Windows defender has been compromised. right now there is a public unpatched exploit that gives any app on your windows PC full system admin access. no password. no popup. nothing your antivirus doesnt stop it. your antivirus IS the exploit. windows defender is the attack vector ransomware gangs can use this to encrypt your entire machine and steal every saved password, browser session, and discord token you have. fully patched windows 11. real time protection on thread
impulsive tweet mediaimpulsive tweet media
English
221
1.5K
8.9K
2.2M
c0rnbread retweetledi
vx-underground
vx-underground@vxunderground·
Another zero day exploit released by some nerd (can't remember name right now) because they're annoyed with Microsoft. It's been confirmed by other nerds. It is yet another legit zero day. Whew. github.com/Nightmare-Ecli…
English
87
532
4.7K
314.6K
c0rnbread retweetledi
Armada
Armada@armadaops·
Reminder: We are broadcasting The Operator View live right here on X today at 1:00 PM EST. Nick Swink (@0xC0rnbread ) is taking over the timeline to show exactly how malicious browser extensions silently steal credentials and bypass your MFA. You do not even have to leave the app to watch the full technical breakdown. Drop your questions in the replies and we will see you at 1:00 PM. #CyberSecurity #AppSec #LiveStream #InfoSec #ThreatIntel #TheOperatorView #Armada #ArmadaOps
Armada tweet media
English
0
1
1
44
c0rnbread retweetledi
Armada
Armada@armadaops·
GDC day 3 is here! Tomorrow morning, we’re taking the stage to talk about the "wild west" of game enforcement. Armada's very own Threat Intelligence Lead, Steven Guris, will be sharing how we hunt down bad actors and protect IP at scale. Don’t let your EULA be just a piece of paper. Steven will discuss: - Tracking anonymous targets across borders - Turning intel into legal action - Real-world strategies for fraud & anti-cheat 📍 Catch him tomorrow, 3/11 at 11:30 AM PT in Room 2000, West Hall #GDC2026 #ThreatIntelligence #GameSecurity #InfoSec #CyberLaw #ArmadaExperts #ArmadaOps
Armada tweet media
English
0
2
2
88
c0rnbread retweetledi
Armada
Armada@armadaops·
Leveling up game security requires more than just code. It takes a solid legal strategy. 🛡️ 🎮 Catch Threat Intel Lead, Steve Guris at #GDC2026 on March 11th (11:30 AM PT) for an essential panel on fighting fraud, cheating, and IP infringement. Learn how @armadaops and other industry leaders coordinate across legal and security teams to protect players. See you there! 🤝 #GDC #GameDev #GameLaw #CyberSecurity #IndieDev
Armada tweet media
English
0
2
1
76
c0rnbread retweetledi
Armada
Armada@armadaops·
DC bound! We are officially a Silver Sponsor for @DistrictCon this weekend and we couldn't be more excited to support this amazing community. Looking forward to the talks, the hacking, and meeting all of you. Come say hi! #DistrictCon #ArmadaOps #Security #risk3sixty
Armada tweet media
English
0
1
4
216
c0rnbread retweetledi
Matt Zorich
Matt Zorich@reprise_99·
Having responded to probably hundreds of incidents at this point, from ransomware to APT's, in my experience, the lack of knowledge on how to adequately secure Entra applications and service principals continues to be the biggest knowledge gap most defending teams have. You should be able to securely configure apps, detect compromise of apps and understand how to investigate compromise of apps. It seems overwhelming at first, but it isn't. Get started like this Secure them: •Use managed identities where possible - negates the need for credential handling •Limit privilege - reduce both the permissions granted and add additional API specific restrictions (i.e don't grant read/write all to all SharePoint sites, just the ones an application needs to access). This includes pushing back on vendors or internal teams that request privilege not required •High privileged applications should have no direct owners - lower privileged users can be granted direct ownership of an app, don't do this, govern the ability to manage applications via Entra ID roles •Configure credential restrictions such as requiring shorter lived secrets or enforcing use of certificates •Remove unused apps and service principals, this can prevent existing high privileged apps being leveraged and reduces your supply chain compromise footprint for multitenant apps •Monitor risk events for service principals like you would users Detect compromise of them: •Alert on application creation or application credential creation - may be noisy in large environments, but a good starting point •Alert on credentials being added to service principals - credentials generally live on the application object, service principal credential creation should be rare •Alert on permission consent - this can detect not only malicious activity but permission creep •Alert on anomalous resource access - does your app usually access only Azure Storage, and suddenly it accesses Microsoft Graph? - this may indicate a compromised credential •Alert on anomalous ASN or location access - does your app usually access only from a specific ASN or country, and suddenly that changes? - this may indicate a compromised credential Many of these are covered by Defender for Cloud Apps and other tools out of the box, but it is worth ensuring you are covered down and what they actually mean. Investigate compromise of them: Know how to query the following logs and understand the events surfaced •Entra ID sign in data - filter on service principal sign in events via the Entra portal or Kusto in the Defender XDR portal •Entra ID audit logs - filter on events related to the service principal via the Entra portal or Kusto in the Defender XDR portal. Service principals can be used to further establish persistence, such as creation of users or additional service principals, rinse and repeat for any malicious additions to your environment •Microsoft Graph - was the compromised app used to access data via Microsoft Graph? You can query via the Defender XDR portal using Kusto to find these events •Defender for Cloud Apps - did the compromised app access other M365 services? You can query via the Defender XDR portal using Kusto to find these events •Unified Audit Log - you can retrieve the events related to the compromised app via the audit functionality inside the Defender XDR portal
English
16
112
578
63.6K
c0rnbread
c0rnbread@0xC0rnbread·
#features" target="_blank" rel="nofollow noopener">github.com/MythicAgents/X…
ZXX
0
0
1
52
c0rnbread
c0rnbread@0xC0rnbread·
I released Xenon v0.0.3 here are the biggest updates: 🔗Added SMB agents with link and unlink cmds ⚒️Now supports forge with easy access to hundreds of BOFs and .NET assemblies 🛞Redesigned tasking to only one network request per sleep cycle ⚙️ Output changes and bug fixes
English
2
1
3
100
c0rnbread
c0rnbread@0xC0rnbread·
@dmcxblue Personally I'd be very cautious opening any VS projects. Easy code exec
English
2
0
6
873
David
David@dmcxblue·
Took a minute but the Cobalt Strike beacon source code has been taken down #redteam
David tweet media
English
4
5
55
17K
c0rnbread
c0rnbread@0xC0rnbread·
Multiple subdomains are hosting the phishing page which is masquerading as a Chrome browser extension. h[x] [x]pps://www.arcane0x0.exchange/ h[x] [x] ps://googlechromestore.arcane0x0.exchange/
English
1
0
0
75
c0rnbread
c0rnbread@0xC0rnbread·
@0x0exchange Be advised! There is an active phishing campaign targeting Arcane wallet users. It's currently the 3rd result when Googling "Arcane wallet extension". The phishing page downloads a malicious Windows executable that tries to install remote access tool ScreenConnect.
c0rnbread tweet media
English
1
0
1
127