Hubbl3

444 posts

Hubbl3

Hubbl3

@_Hubbl3

CEO at BC Security LLC Infosec Professional | Engineer | Skier

Katılım Mart 2020
25 Takip Edilen496 Takipçiler
Hubbl3 retweetledi
BC Security
BC Security@bcsecurity·
Our new #blog from @_Hubbl3 breaks down how Offensive IronPython techniques remain a powerful threat to networks, even 4 years after Turla's initial deployment of these TTPs.
English
0
20
88
4K
checkymander
checkymander@checkymander·
@_Hubbl3 @byt3bl33d3r It's been a hot minute, but I actually pushed some working/clean code of the stuff I was talking about for this if you wanted to give it a look for Empire github.com/MythicAgents/A… The specific logic is in ByteArrayMetaPathImporter
English
1
0
1
24
checkymander
checkymander@checkymander·
doing bad things to IronPython to force it to load libraries from a byte array using reflection The internal keyword is just a guideline really, anyways
checkymander tweet media
English
1
0
30
2.9K
Hubbl3 retweetledi
BC Security
BC Security@bcsecurity·
Empire has come a long way since its humble beginnings. If you haven't used it in some time, take a look at how it's grown into a multi-language powerhouse. For our dedicated users check out the post for exciting news about the upcoming release!
English
1
14
39
2.5K
Hubbl3 retweetledi
BC Security
BC Security@bcsecurity·
Don't miss the next episode of Code & Cask today at 5pm EST. We will be looking at python and webdav along with looking at Microsoft's new Python in Excel feature. twitch.tv/bcsecurity
BC Security tweet media
English
0
1
1
568
Hubbl3
Hubbl3@_Hubbl3·
Wow another wave of explosions in Lebanon through radios. Starting to think this is more about PsyOps and creating a deep mistrust of communication devices by Hezbollah
English
0
0
4
218
Hubbl3
Hubbl3@_Hubbl3·
@snehalantani The Israelis aren't exactly shy about about civilian collateral and you could control the distribution of the trigger through targeting of known numbers. But we won't know more for a while and the strength of explosion does point to some kind of hardware modification
English
0
0
0
54
Snehal Antani
Snehal Antani@snehalantani·
@_Hubbl3 The risk of somebody discovering it and blowing the op, or the risk of the global reaction to accidentally harming a civilian makes a true upstream supply chain attack hard to fathom. Maybe JIT supply chain interdiction right before distribution
English
1
0
0
25
Hubbl3
Hubbl3@_Hubbl3·
@HackingLZ I'm really curious to find out if there were hardware modifications or if it was purely a software/firmware attack.
English
0
0
2
153
Justin Elze
Justin Elze@HackingLZ·
Wonder if someone got talked into buying pagers from one location
Justin Elze tweet media
English
14
9
81
4.9K
Rasta Mouse
Rasta Mouse@_RastaMouse·
Does anybody know how/where you can download older versions of KB4052623 (i.e. Defender Definition Updates)? Microsoft Update Catalog only provides the latest version.
English
6
1
16
7.7K
Hubbl3
Hubbl3@_Hubbl3·
@_RastaMouse commenting just so I can follow because I would love to know too.
English
0
0
1
242
Hubbl3
Hubbl3@_Hubbl3·
@ShitSecure hmm, weird. I haven't tried a rust binary in a bit but I was planning on using it in a training in a few weeks😅 I wonder if an API changed? I have recently been unable to find a working python shellcode injector that doesn't crash the parent process either
English
0
0
1
191
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
@_Hubbl3 It even applies for just Hello World. Any binary I tried so far.
English
1
0
0
351
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Anyone knows what’s needed to reflectively load MSVC compiled rust binaries? All public PE Loaders I tried so far crash 🤔
English
6
4
24
19.2K
Hubbl3 retweetledi
BC Security
BC Security@bcsecurity·
We are excited to be heading to @Blackhatmea! Come upgrade your skills with our Evasion course. Learn how open-source tools & custom toolsets remain stealthy through application of code obfuscation & TTPs like API unhooking & C2 traffic modification.
English
0
4
12
647
Hubbl3
Hubbl3@_Hubbl3·
@HackingLZ @TheDFIRReport But wow I haven't seen spread through the C$ folder in a while. That is some old school TTPs
English
0
0
0
75
Hubbl3 retweetledi
BC Security
BC Security@bcsecurity·
Interested in getting started with offensive security? Our new Sliver Ops course is designed as an introduction to command and control frameworks, guiding students through the basics of the Sliver framework while familiarizing them with attacking Windows and Linux systems
English
0
9
39
22.3K