Michael B.

57 posts

Michael B. banner
Michael B.

Michael B.

@DownWithUpSec

Windows security researcher/reverse engineer. The more you know, the more you realize you don't.

Internet, Earth Katılım Mart 2019
49 Takip Edilen780 Takipçiler
Michael B.
Michael B.@DownWithUpSec·
AWStrace: Another Windows Strace attempt by me. Using a named pipe and shellcode inside the remote process, send registers back and pretty print the output.
Michael B. tweet media
English
1
7
27
1.6K
Michael B.
Michael B.@DownWithUpSec·
Because of the recent Notepad++ situation here is another good source about WB. As opposed to just simple decryption/re-encryption, this also shows how to use the heap execute capability. cirosec.de/en/news/abusin…
English
0
6
24
2.1K
Michael B.
Michael B.@DownWithUpSec·
@aionescu @witherornot1337 @HackingLZ @vxunderground I remember watching Alex's talk in 2020, and it was always on the back of my mind. I finally sat down around 2023 and worked out a simple PoC to use the decrypting/re-encrypting capabilities of it. Crazy to see it actually being used in the wild.
English
0
0
0
66
vx-underground
vx-underground@vxunderground·
THE CHINESE GOVERNMENT USED MICROSOFT WARBIRD APIS FOR OBFUSCATION > proof-of-concept by @DownWithUpSec in 2023 > 30 stars on GitHub > 62 likes on Xitter This is fucking FIRE research. Insanely slept on research. I am FLABBERGASTED.
vx-underground tweet media
English
25
143
1.9K
89.2K
Michael B.
Michael B.@DownWithUpSec·
@diversenok_zero Awesome, this is great to know. I kept thinking maybe I had a permissions problem. 😅
English
0
0
0
67
diversenok
diversenok@diversenok_zero·
@DownWithUpSec That's a volatile (REG_FLAG_VOLATILE) key; i.e., it only exists in memory and does not persist changes to the hive file. There are a few more of these throughout the registry. You can detect them via NtQueryKey with KeyFlagsInformation.
English
1
0
2
100
Michael B.
Michael B.@DownWithUpSec·
Exporting registry data in the "hive" format seems to ignore the "BIOS" key under HKLM\HARDWARE\DESCRIPTION\System. You can export it directly, but exporting any parent will not contain the "BIOS" key and its values
English
1
0
7
1.5K
Michael B.
Michael B.@DownWithUpSec·
"This thing I need is open source. Surely someone has audited this code?" 🙃
English
0
0
8
1.4K
Michael B.
Michael B.@DownWithUpSec·
@sixtyvividtails Sadly not. Looks like all if your CPU doesn't support MPX (which newer ones won't) the MPX instructions will be treated as NOPs.
English
1
0
1
88
sixtyvividtails
sixtyvividtails@sixtyvividtails·
@DownWithUpSec Interesting if this api would still work if MPX is unsupported/disabled. Or, cutting to the chase, would the handler be able to catch the regular "bound" instruction executed from ring3 🤔
English
1
0
1
100
Michael B.
Michael B.@DownWithUpSec·
Something interesting I stumbled upon: In Windows, for Intel's MPX, a driver could use KeRegisterBoundCallback to handle/hook the BOUND #BR exception. This function will eventually get called from the IDT's KiBoundFault
English
1
1
3
2.4K
Michael B.
Michael B.@DownWithUpSec·
Here's an old project that I polished up a bit: github.com/DownWithUp/WHP… Essentially the idea was to have some introspection into an OS at the hypervisor level. It was also a foray into the Windows Hypervisor Platform API.
English
0
3
6
0
Michael B.
Michael B.@DownWithUpSec·
Just a quick little post on how to use the the undocumented API NtPssCaptureVaSpaceBulk to gather a process' virtual memory in a single call. Read more here: downwithup.github.io/Blog/8.html
English
0
23
70
0
Michael B.
Michael B.@DownWithUpSec·
So .msu files really are just .cab files? 😅
English
0
0
0
0
Michael B.
Michael B.@DownWithUpSec·
@hyp3rlinx Looks interesting! 3rd party contributions welcome?
English
1
0
0
0
Hyp3rlinx
Hyp3rlinx@hyp3rlinx·
Launched malvuln.com a week ago, all about vulnerabilities in Malware. Using the handle "malvuln"... feedback welcome.
English
8
42
129
0
Michael B. retweetledi
rebecca hill
rebecca hill@beccidee17·
What a shot taken from Melbourne Australia 🔭🪐
rebecca hill tweet media
English
3.5K
178.1K
1.1M
0
Michael B.
Michael B.@DownWithUpSec·
Windows Defender needs to be resource restricted. Seems like a good use for a job object.
English
0
0
2
0
Michael B.
Michael B.@DownWithUpSec·
@jonasLyk Could also be due to the fact that it creates a device and symbolic link (GLOBAL??). Just guesses though.
English
1
0
0
0
Jonas L
Jonas L@jonasLyk·
but why vhd that require admin privs to mount and Not iso?
English
3
1
8
0
Michael B.
Michael B.@DownWithUpSec·
Even when disabled, Windows Defender continues to squander computer resources. Highly annoying.
Michael B. tweet media
English
0
0
3
0
Michael B.
Michael B.@DownWithUpSec·
@omerk2511 I think playing around with callbacks is always something interesting and a good way to learn about internals.
English
1
0
1
0
Omer Katz
Omer Katz@omerk2511·
Just turned 17. Well, time flies... My first goal for this year is to improve my kernel development skills. Does anybody have some cool project ideas? EDR-related stuff can be pretty interesting :)
English
9
1
58
0