Ryan Preston

562 posts

Ryan Preston banner
Ryan Preston

Ryan Preston

@awsmhacks

Keyboard Cagefighter, Console Cowboy, cache me sliding into your DC's #secKC

House of Zero Katılım Ekim 2015
631 Takip Edilen335 Takipçiler
Ryan Preston retweetledi
mgeeky | Mariusz Banach
mgeeky | Mariusz Banach@mariuszbit·
🔥 Super excited to soon present my lifetime project publicly🤩 - 4yrs of R&D + 1y in commercial sale - Weaponization of 95+ file types - 140kLOC - 20+ tools - 10+ shellcode exec techniques (ts) - 8 MSI ts - 20+ LNK ts - 30+ script/macro ts ⚡ Battle tested, low-profile arsenal
mgeeky | Mariusz Banach tweet mediamgeeky | Mariusz Banach tweet media
English
27
130
760
57.8K
Defcon Parties
Defcon Parties@defconparties·
We have a new party page defconparties.com that allows you to build your own party agenda by selecting the events you are interested in attending. Our party list is also built into the @defcon hacker tracker. #defcon32 #BHUSA
Defcon Parties tweet mediaDefcon Parties tweet media
English
3
23
57
14.3K
Ryan Preston retweetledi
Peter Winter-Smith
Peter Winter-Smith@peterwintrsmith·
Today I am pleased to announce the release of a code analyser I’ve been working in my free time - wSAST (wsast.co.uk) wSAST aims to make code analysis easier for application security consultants by providing tools to graph relationships, find paths between functions, and identify entry points into codebases as well as perform full dataflow and static analysis using a powerful rules engine. Rules for analysis can propagate taints, express arbitrary relationships between variables, and attach arbitrary data to variables as they flow through the application during simulated execution. Rules can be written as simple XML format rules (for simpler types such as function rules, variable and type rules, and data rules), or in .NET for completely customised rules which can then be as convoluted as you like. Multiple sources can be attached to any variable and multiple sinks to any trace, which then come and go from execution scope per a specified scope anchor. Since wSAST is implemented over a custom intermediate language (WSIL) to which all supported languages are translated it will be able to support multiple languages. At the moment only Java core language support has been completed, and C support is about 95% complete but has no rules at this time. My plan for the moment is to keep the core engine closed source but make all the rules, the front end, rules engine all open source and .NET based. I plan to make further steps towards this by releasing the code for these components to the wSAST GitHub when developer guides are finished. It will be possible for developers to add custom language support (if they’re brave enough!) using the interfaces provided, and the C to WSIL translator will be open source as an example. I hope people find this useful! Don’t hesitate to contact me if you have any questions, on here or on @wsastsupport
English
12
158
428
98.8K
Ryan Preston retweetledi
:)
:)@pwnsauc3·
Made a tool which finds DLL files with RWX section in memory. I came up with this idea after I stumbled upon an interesting article by @SecurityJoes github.com/pwnsauc3/RWXFi…
English
2
58
184
21.8K
Ryan Preston retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
New blog: Obtaining Domain Admin from Azure AD by abusing Cloud Kerberos Trust I teased this a bit during my Windows Hello talks, now found some time to write about this interesting technique. Also contains defenses and detection opportunities. dirkjanm.io/obtaining-doma…
English
8
329
775
90.7K
Ryan Preston retweetledi
Chris Bakke
Chris Bakke@ChrisJBakke·
GPT-5: can perfectly build any website GPT-6: can build and run a company GPT-7: passes Turing test GPT-8: overthrows world governments GPT-9: fails to understand how Jira is supposed to work, gives up, asks humans for help
English
289
2.4K
23.1K
2.5M
Ryan Preston retweetledi
vx-underground
vx-underground@vxunderground·
We are happy to announce we are hosting our first ever Malware Research Contest! Sponsored by our friends at @SentinelOne * Must be novel research * Applicants can only be from the United States due to anti-gambling and money laundering laws * First place is a new Macbook Pro ♥️
GIF
English
11
58
211
107.7K
Ryan Preston retweetledi
Elon Musk
Elon Musk@elonmusk·
Master Plan 3, the path to a fully sustainable energy future for Earth will be presented on March 1. The future is bright!
Elon Musk tweet media
English
8.6K
16.6K
137.3K
22.2M
Ryan Preston retweetledi
hermit
hermit@ackmage·
reverse shell? do u mean hollaback curl?
English
35
640
3.6K
0
Ryan Preston retweetledi
Ryan Naraine
Ryan Naraine@ryanaraine·
This is a must-see for me at LABScon next week: ** The life and times of Sysinternals -- Mark Russinovich, Microsoft (@markrussinovich) Agenda is legit 💪 #day-1" target="_blank" rel="nofollow noopener">labscon.io/#day-1
English
0
15
54
0
Ryan Preston retweetledi
Antonio Cocomazzi
Antonio Cocomazzi@splinter_code·
We are releasing an alternative way for elevating to SYSTEM when you have SeTcbPrivilege How? Leveraging AcquireCredentialsHandle through an SSPI hook that allows authenticating as SYSTEM to SCM Should be "lighter" than the classic S4U cc @decoder_it gist.github.com/antonioCoco/19…
Antonio Cocomazzi tweet media
English
5
202
529
0
Ryan Preston retweetledi
PUNS
PUNS@ThePunnyWorld·
What did Yoda say when he saw himself in 4K? HDMI
English
259
6.7K
69.5K
0
Ryan Preston retweetledi
Chetan Nayak (Brute Ratel C4 Author)
@Zeusb0x Yep. You are partially correct but theres a lot more to it than EAT and IAT hooks. Finding syscalls are fine, but in order to do that you must first find the ntdll in memory which is the tricky part. I think if you evade S1, you by default evade almost every EDR there is.
English
0
2
5
0
Ryan Preston retweetledi
Session
Session@session_app·
sometimes encrypting your message is not enough.
Session tweet media
English
86
375
3K
0
Ryan Preston retweetledi
Duane Michael
Duane Michael@subat0mik·
SCCM network access accounts (NAAs) are back... And they're not going away. Not only can we query the credential blobs from WMI, we can also retrieve previously used account blobs from the CIM repository, even if the computer is no longer a client... posts.specterops.io/the-phantom-cr…
English
5
194
443
0