Russel Van Tuyl

2K posts

Russel Van Tuyl

Russel Van Tuyl

@Ne0nd0g

Hacker, Coder, and Friend

Tennessee, Knoxville Katılım Ocak 2009
1.3K Takip Edilen2.1K Takipçiler
Russel Van Tuyl retweetledi
SpecterOps
SpecterOps@SpecterOps·
Veterans bring a mission-first mindset to #cybersecurity leadership. In a guest column for Federal News Network, @Ne0nd0g shares how military experience builds resilient cyber teams & protects critical govt missions. Check out the article for more ⤵️ ghst.ly/49rszzb
English
0
2
5
1.4K
Russel Van Tuyl retweetledi
Chris Thompson
Chris Thompson@_Mayyhem·
My SCCM BloodHound OpenGraph collector, ConfigManBearPig, is finally ready to share! It can enumerate all of the relay TAKEOVERs and a few CRED and ELEVATE techniques from Misconfiguration Manager with just a domain account. Let me know what you find! specterops.io/blog/2026/01/1…
English
5
76
180
13.9K
Russel Van Tuyl retweetledi
Jared Atkinson
Jared Atkinson@jaredcatkinson·
With OpenGraph, we hope to empower to community to extend the attack graph however they see fit. However, we have encountered many pitfalls over the past 8+ years that we hope you can avoid. Andy does an awesome job explain how to do just that while showing examples of those very situations for you to learn from!
SpecterOps@SpecterOps

BloodHound OpenGraph makes adding nodes and edges simple, but building effective attack graph models? That's where the real work begins. @_wald0 breaks down the theory, best practices, and requirements you need to know. ghst.ly/44Zv7DJ

English
0
3
11
3.6K
Russel Van Tuyl retweetledi
Luke Paine
Luke Paine@v3r5ace·
I'm excited to get my latest blog post about purple team efficacy out into the wild! You may feel like the point I'm making is obvious, but I'd argue that a lot of concepts seem obvious only when you're faced with an argument on it's behalf. posts.specterops.io/to-infinity-an…
English
2
15
33
6K
Russel Van Tuyl retweetledi
Jared Atkinson
Jared Atkinson@jaredcatkinson·
My On Detection series is back! In this edition I explore how the same behavior (operation chain) can be implemented using several different execution modalities and the implications of this for detection engineers. posts.specterops.io/behavior-vs-ex…
English
1
52
111
22.7K
Russel Van Tuyl retweetledi
SpecterOps
SpecterOps@SpecterOps·
👋 Hello, Nashville! If you’re at #WiCyS2024 come by Booth 228 to chat with a few Specters and learn more about us.
SpecterOps tweet media
English
0
6
21
4.5K
Russel Van Tuyl retweetledi
Matt Creel
Matt Creel@Tw1sm·
Been working to improve my BOF/C dev skills, created some BOFs mimicking SQLRecon modules as a fun learning exercise github.com/Tw1sm/SQL-BOF
English
5
61
182
18.6K
Russel Van Tuyl retweetledi
Jeff McJunkin
Jeff McJunkin@jeffmcjunkin·
Imposter Syndrome is real, but you can take it multiple ways: 1) Out of any group, there is always something to learn 2) Out of any group, there is knowledge that only you have. Share it! Be excellent to each other, always be learning, and always share!
Jeff McJunkin tweet media
English
10
128
393
0
Russel Van Tuyl
Russel Van Tuyl@Ne0nd0g·
Amazing thread by @__invictus_ . I also believe that there’s a lot of value in exercising response and think we should be doing this more so organizations are more ready when the inevitable happens.
Tim@__invictus_

There seems to be this idea that red teaming is about improving detection, whilst true in part people seem to ignore incident response. You cant assess IR effectiveness without spreading through a network undetected. Imo assessing IR provides far more value. Some examples...

English
0
0
5
533
Justin Bui
Justin Bui@slyd0g·
Hermes is finally updated for Mythic 3.0 and it doesn't require the Darling kernel module anymore! This means the Hermes container is _much_ more stable. Read about the update here :D slyd0g.medium.com/upgrading-herm…
English
2
12
38
4.6K
Russel Van Tuyl retweetledi
Winslow
Winslow@senzee1984·
MutationGate is a new approach to bypass EDR's inline hooking by replacing an unhooked NTAPI's SSN with a hooked NTAPI's SSN at run time with hardware breakpoint. github.com/senzee1984/Mut…
English
3
61
134
17K
Russel Van Tuyl
Russel Van Tuyl@Ne0nd0g·
@C__Sto saved the day and pointed me towards the windows.NewCallback() function so that I don’t need cgo for the COFF loader. The function must return only 1 uintptr; hoping that doesn’t cause any problems as I implement the Beacon API💪🏽🎉 #NewCallback" target="_blank" rel="nofollow noopener">pkg.go.dev/golang.org/x/s…
English
0
0
2
172
Russel Van Tuyl
Russel Van Tuyl@Ne0nd0g·
@C__Sto I did consider reaching out to you specifically to look at using ASM. Not off the table, but want to get things fully functional with cgo before going that route.
English
1
0
0
130
C Sto
C Sto@C__Sto·
@Ne0nd0g I think you may be able to set up functions with a different ABI if you use asm, though I’m not sure I’d wish that on anyone even if it worked
English
1
0
0
29
Russel Van Tuyl
Russel Van Tuyl@Ne0nd0g·
Finally got a proof of concept COFF & BOF loader working all in Go. There’s still a lot of work to be done though like take arguments, handle more relocation types, and implement the rest of the Beacon functions. Currently works for TrustedSec’s whoami BOF.
English
2
1
42
3.3K
Russel Van Tuyl
Russel Van Tuyl@Ne0nd0g·
@jsecurity101 I agree with you, detect the technique, not the tool. Tools leverage different techniques, sometimes unique to that tool.
English
0
0
3
530
Jonny Johnson
Jonny Johnson@JonnyJohnson_·
Detection has to move off of brittle C2 detections. Detect behaviors. I’m sorry but Merlin, Havoc, etc isn’t special. C2s are just containers to execute actions. Service creation is service creation. Process injection is process injection. The list goes on.
Nasreddine Bencherchali@nas_bench

I'm here to remind you that the most underrated and slept on C2 is actually Merlin. Been there for a long time and still have a very low detection rate across the board. You all be underestimating the power of low detections with go based stuff.

English
6
30
174
39.7K