Utilisateur anonyme

8 posts

Utilisateur anonyme

Utilisateur anonyme

@Jetwitte9

Red Teamer

Katılım Temmuz 2019
111 Takip Edilen1 Takipçiler
Utilisateur anonyme
Utilisateur anonyme@Jetwitte9·
@TwoSevenOneT But if you delete the symlink Windef doesn't know where to find its folder and doesn't work anymore 🫤
English
0
0
0
9
Two Seven One Three
Two Seven One Three@TwoSevenOneT·
#redteam You can exploit the update functionality vulnerability of #Windows Defender to move its executable folder to a location of your choosing. After that, you can use DLL Sideloading for persistence, inject code, or simply disable it... #blueteam
Two Seven One Three tweet mediaTwo Seven One Three tweet mediaTwo Seven One Three tweet media
English
8
88
415
32.6K
Utilisateur anonyme
Utilisateur anonyme@Jetwitte9·
@HacklikeHacker @hackthebox_eu @hackinarticles @hackplayers Hi man! I came across your write-up for this box on your blog, could you explain how you came across the LFI with the pattern "mvg:<FILE>[20x20+20+20]" ? I can't find anything that would explain how to find this technique (the ImageTragick articles don't talk about this scheme)
English
0
0
1
13
Utilisateur anonyme
Utilisateur anonyme@Jetwitte9·
@an0n_r0 What version did you use? I can confirm it works on Windows 10 21H1 but not on 22H2
English
2
0
1
1.5K
Utilisateur anonyme retweetledi
an0n
an0n@an0n_r0·
Meterpreter + Metasploit is absolutely awesome. And anyway, it is not even certain that Defender will catch it: add the stageless payload using basic encoding into a template exe (thread exec), disable autoload of stdapi (you can load it later after callback), and that's all. 💥
an0n tweet media
Josh@passthehashbrwn

It's insane that Meterpreter + the Metasploit backend is a jawdroppingly complex piece of malware that many of us could (and do) learn so much from, but people call it shit because the default artifacts are sigged by Defender

English
12
161
713
132.9K
Utilisateur anonyme
Utilisateur anonyme@Jetwitte9·
@BlackArrowSec @antuache @_Kudaes_ Tested on a Windows 10 19044.1288 version and it doesn't work????? I verified with ProcMon if the dll is loaded and it is but the command is never executed (I tried different one)
English
1
0
0
174
Utilisateur anonyme
Utilisateur anonyme@Jetwitte9·
Hello @tryhackme! I organize with current and former students of my cybersecurity promotion an cybersecurity event! We would really like to be sponsored by TryHackMe for this event, is there a way we could discuss for a sponsorship?
English
0
0
0
0