Karkas

29 posts

Karkas

Karkas

@CDC_FI

I identify as a Threat

Germany Katılım Nisan 2018
138 Takip Edilen23 Takipçiler
Karkas
Karkas@CDC_FI·
@HaifeiLi a lot ppl might not know that you can disable certain API Calls with registry Keys/GPOs: #blacklist-configuration" target="_blank" rel="nofollow noopener">adobe.com/devnet-docs/ac… HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown\cJavaScriptPerms tBlackList=RSS.addFeed|Util.readFileIntoStream ...and you are safe :)
English
1
1
9
695
Haifei Li
Haifei Li@HaifeiLi·
Fun fact about the Adobe Reader 0day: actually, it's the "AdobeCollabSync.exe" ("C:\Program Files\Adobe\Acrobat DC\Acrobat\AdobeCollabSync.exe") process who communicates to the attacker-controller server, not the "Acrobat.exe". Therefore, if you're hunting the threat with your e.g EDR telemetry, you may want to look at that "AdobeCollabSync.exe" process too. #threatintel
English
4
51
265
40.9K
Karkas
Karkas@CDC_FI·
@dcuthbert met him countless times even in the smallest Cons where he held top notch talks and always stopped for questions... true legend. Will never be forgotten
English
0
0
2
477
Daniel Cuthbert
Daniel Cuthbert@dcuthbert·
Everyone today is a hacker in a sense but there are very few OG hackers on which shoulders we stand Oh dude, Felix “FX” Lindner you were so much a hackers hacker and you will be missed RIP my friend and thank you
Daniel Cuthbert tweet media
English
51
135
581
79K
Rebane
Rebane@rebane2001·
i built an entire x86 CPU emulator in CSS (no javascript) you can write programs in C, compile them to x86 machine code with GCC, and run them inside CSS
English
329
1.1K
10.2K
1.1M
Karkas
Karkas@CDC_FI·
@5mukx Dood it´s 2026... who cares about userland hooks?
English
2
0
12
2.1K
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
The firewall blocks it; headline calls it cyber war Call it: blocked requests, scans, probes, bot traffic
Florian Roth ⚡️ tweet media
English
10
3
54
5.8K
Karkas
Karkas@CDC_FI·
@yarden_shafir Once you reach the level "I´ve forgottn more stuff than the average Junior level Analyst knows" you enter the realm of the true masters
English
0
0
1
54
Yarden Shafir
Yarden Shafir@yarden_shafir·
Spent all morning debugging an issue. Eventually found the answer in a blog post. That I wrote. 5 years ago.
English
15
8
206
15.8K
Karkas
Karkas@CDC_FI·
@techspence Let´s move everything to the cloud, they know how to do security
English
1
0
4
100
spencer
spencer@techspence·
What’s the cybersecurity equivalent of finding out Santa isn’t real? Having EDR != you are secure Your turn 😆
English
50
2
105
15.3K
Kyle Cucci
Kyle Cucci@d4rksystem·
Ever since I was baby I've wanted speak or give a workshop at Defcon.. This year I get to finally make that dream happen. It's on, @rpargman 😎
Kyle Cucci tweet media
English
14
13
161
18K
Karkas
Karkas@CDC_FI·
@yarden_shafir It´s a Kookaburra, in germany we call it "laughing Hans" :D They are quite intelligent birds ;) Kookaburra - Wikipedia
English
1
0
0
102
Yarden Shafir
Yarden Shafir@yarden_shafir·
This cute little thing sounds like a witch laughing in a dark forest and has tried to kill me twice so far
Yarden Shafir tweet media
English
9
2
43
4.1K
Karkas
Karkas@CDC_FI·
Today I improved and rereleased a Project: github.com/Karkas66/Early… The original Code by 0xNinjaCyclone had hardcoded Injection Process Name and static plain Shellcode. I wanted to load dynamic Shellcode from files into a process of my choice. To get rid of plain msfvenom shellcode detections by several AVs I made a basic XOR Encryption of the embedded shellcode. I also made a Visual Studio 2022 Template, ready to compile and run. Did not yet find the problem why not msfvenom shellcode crashes the hosting payload process. So just use msfvenom SC for now. I successfully tested with meterpreter_reverse_tcp
English
0
0
0
241
Karkas
Karkas@CDC_FI·
@m4ul3r_0x00 Early Cascade Injection, nice work, thanks
English
0
0
2
159
m4ul3r
m4ul3r@m4ul3r_0x00·
m4ul3r tweet media
ZXX
3
3
17
2.5K
Karkas
Karkas@CDC_FI·
@_RastaMouse it realy is. But learn my lesson: Don´t Update (OTC Wifi Dongle) without backing up the SD Card first
English
0
0
1
90
Rasta Mouse
Rasta Mouse@_RastaMouse·
I got one of those dodgy open source game consoles - the R36S. It's actually really neat 😅
English
2
0
8
2.6K
Karkas
Karkas@CDC_FI·
@C5pider @Octoberfest73 yeah sure it´s not... did not yet look into the code when writing the comment. Will steal the best ideas anyway! btw, nice Framework @c5pider was hard to get into it, but yet fun to learn
English
0
0
0
97
5pider
5pider@C5pider·
@SOC5444 @Octoberfest73 This is not the same. While both of you wrote a stager, his is focused on creating a secure staging process by validating and verifying the retrieved stage against an MD5 checksum.
English
1
0
0
119
Octoberfest7
Octoberfest7@Octoberfest73·
Happy to share another open source project- An x64 position-independent shellcode stager that validates the downloaded payload stage prior to execution. Integration with Cobalt Strike out of the box. Check out Secure_Stager here: github.com/Octoberfest7/S…
English
1
50
175
11.2K
Kyle Cucci
Kyle Cucci@d4rksystem·
Thanks a lot @jstrosch for the great conversation and allowing me to demo some malware analysis techniques on your channel! If you missed it, you can find it here. 😎 youtube.com/watch?v=odRgHC…
YouTube video
YouTube
Josh Stroschein | The Cyber Yeti@jstrosch

🔥 Today's the day - Kyle Cucci (@d4rksystem) joins the stream to talk #EvasiveMalware! Join us at 1pm CDT 👇 😈 youtube.com/live/odRgHCfQC… We'll discuss the book and Kyle will provide some live demos of the content - it's going to be awesome!

English
3
6
33
4K
Outflank
Outflank@OutflankNL·
New Blog Alert! 🚨 Introducing Early Cascade Injection, a stealthy process injection technique that targets Windows process creation, avoids cross-process APCs, and evades top-tier EDRs. Learn how it combines Early Bird APC Injection & EDR-Preloading: outflank.nl/blog/2024/10/1…
Outflank tweet media
English
4
183
428
36.2K