Hubbl3 retweetledi
Hubbl3
444 posts

Hubbl3
@_Hubbl3
CEO at BC Security LLC Infosec Professional | Engineer | Skier
Katılım Mart 2020
25 Takip Edilen496 Takipçiler
Hubbl3 retweetledi
Hubbl3 retweetledi

I'll just leave this here with a reminder that a free workshop is starting at noon est
logout.gitbook.io/ad-privesc-wit…
English

@_Hubbl3 @byt3bl33d3r It's been a hot minute, but I actually pushed some working/clean code of the stuff I was talking about for this if you wanted to give it a look for Empire
github.com/MythicAgents/A…
The specific logic is in ByteArrayMetaPathImporter
English
Hubbl3 retweetledi
Hubbl3 retweetledi

Most importantly, you will be "hacking" into Wells Fargoat as part of this class.
Note: No goats were harmed in the making of this CTF.

BC Security@bcsecurity
Don't miss your chance to sign up and dive into the core principles of command and control frameworks while mastering Sliver. This course emphasizes practical, hands-on experience in a lab environment and concludes with an exciting capstone CTF challenge. Secure your spot now!
English
Hubbl3 retweetledi

Don't miss the next episode of Code & Cask today at 5pm EST. We will be looking at python and webdav along with looking at Microsoft's new Python in Excel feature.
twitch.tv/bcsecurity

English

@snehalantani The Israelis aren't exactly shy about about civilian collateral and you could control the distribution of the trigger through targeting of known numbers. But we won't know more for a while and the strength of explosion does point to some kind of hardware modification
English

@_Hubbl3 The risk of somebody discovering it and blowing the op, or the risk of the global reaction to accidentally harming a civilian makes a true upstream supply chain attack hard to fathom. Maybe JIT supply chain interdiction right before distribution
English

It’s pretty incredible. You need physical access to install explosives. You probably need a firmware update in order to have a specific number or code trigger the explosive. You need placement and access to distribute the devices to the right people 🤯
Shaun Maguire@shaunmmaguire
This attack will go down in the history books It seems like Israel has had enough, after almost a year of rockets being fired from Lebanon into Israel
English

@HackingLZ I'm really curious to find out if there were hardware modifications or if it was purely a software/firmware attack.
English

@_RastaMouse commenting just so I can follow because I would love to know too.
English

@ShitSecure hmm, weird. I haven't tried a rust binary in a bit but I was planning on using it in a training in a few weeks😅
I wonder if an API changed? I have recently been unable to find a working python shellcode injector that doesn't crash the parent process either
English

@_Hubbl3 It even applies for just Hello World. Any binary I tried so far.
English
Hubbl3 retweetledi

We are excited to be heading to @Blackhatmea! Come upgrade your skills with our Evasion course. Learn how open-source tools & custom toolsets remain stealthy through application of code obfuscation & TTPs like API unhooking & C2 traffic modification.
English
Hubbl3 retweetledi

BlackSuit Ransomware
🌟Analysis & reporting completed by @MetallicHack, @yatinwad, & @malforsec.
🎵Audio: Available on Spotify, Apple, YouTube and more!
📚Report: thedfirreport.com/2024/08/26/bla…
English

@HackingLZ @TheDFIRReport But wow I haven't seen spread through the C$ folder in a while. That is some old school TTPs
English

@HackingLZ @TheDFIRReport Cue the "I thought APT was supposed to stand for advance" comments 🙄
English

New @TheDFIRReport BlackSuit Ransomware
thedfirreport.com/2024/08/26/bla…
English
Hubbl3 retweetledi


