mintko

33 posts

mintko banner
mintko

mintko

@m1ntko

Katılım Temmuz 2020
395 Takip Edilen31 Takipçiler
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
Just over 24 hours until @_kripteria takes the stage at @h_c0n to revisit the design and methodology of attack graphs in Active Directory, showcasing new approaches with Neo4LDAP.
BlackArrow tweet media
English
0
9
17
1.1K
mintko retweetledi
Iago Abad
Iago Abad@IagoAbad·
Hi! I just published a technical deep dive into a complex and fun N-day vulnerability that allows to get RCE in a very popular e-commerce platform. Check it out! hiddeninslack.github.io/posts/from-sst…
English
0
9
12
717
mintko retweetledi
Inés
Inés@ineesdv·
Tangled is a social engineering platform that weaponizes calendar event processing in Outlook and Gmail to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction. github.com/ineesdv/Tangled Technical breakdown: tarlogic.com/blog/abusing-c…
English
2
46
148
9.1K
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
Meetings You Didn’t Plan, But We Did In this post, @ineesdv breaks down how calendar event processing in Outlook and Gmail can be abused to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction ➡️Read more: tarlogic.com/blog/abusing-c…
BlackArrow tweet media
English
0
20
21
3K
mintko retweetledi
krp
krp@_kripteria·
Overly complex ACL graphs? Neo4LDAP now helps you prioritise attack paths without losing visibility. • Editable ACE weights • Shadow Relationships Details + PoC 👇 @kripteria.sec/finding-optimal-attack-paths-in-active-directory-with-neo4ldap-3d2158419f35" target="_blank" rel="nofollow noopener">medium.com/@kripteria.sec…
English
0
1
1
76
mintko retweetledi
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
Although direct access to disk is not new at all, especially when it comes to forensics, I think this approach could be useful in a number of contexts during a RT engagement. github.com/Kudaes/MFTool
English
2
8
43
2.4K
mintko retweetledi
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
I've just released Eclipse, a PoC of what I call Activation Context Hijack. This technique redirects any application to load an arbitray DLL, allowing to inject code into any trusted process. More info available on Github. github.com/Kudaes/Eclipse
English
5
85
216
14.8K
mintko retweetledi
krp
krp@_kripteria·
I created a tool designed to simplify the generation of proxy DLLs (i know, a bit late to the game) while addressing common conflicts related to windows.h when it comes to redefining an existing function when performing proxy DLL. It was a fun project 😁 github.com/Krypteria/Prox…
English
0
17
47
3.5K
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
In a few hours, our colleague @_Kudaes_ will talk at @EuskalHack about call stack spoofing to hide the execution of implants from memory. #ESCVII ➡️ Read more: #ponente7" target="_blank" rel="nofollow noopener">securitycongress.euskalhack.org/ponentes_es.ht…
BlackArrow tweet media
English
0
5
18
1.3K
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
Are you aware of this technique for achieving fileless persistence? Find out how it works and how to detect it. ➡️ github.com/blackarrowsec/…
BlackArrow tweet media
English
1
8
18
1.3K
mintko retweetledi
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
Although it's nothing new, @ineesdv and I are pleased to publish our own ROP-based implementation of the code fluctuation technique. We've tried to keep it simple and functional, avoiding to use common features like Timers, HWBP or APCs. github.com/Kudaes/Shelter
English
3
74
188
16K
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
Enhanced version of secretsdump from #Impacket to dump credentials without touching disk. This feature takes advantage of the WriteDACL privileges held by local administrators to provide temporary read permissions on registry hives. github.com/fortra/impacke…
English
3
127
305
24.1K
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
Are you aware that Threat Actors can use virtualization as an effective evasion technique? Our #ThreatHunting team presents some useful queries to detect this technique. ➡️ github.com/blackarrowsec/…
BlackArrow tweet media
English
1
8
15
1.5K
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
Watchguard has fixed 4 vulnerabilities in Watchguard EPDR discovered by our researchers @antuache and @Calvaruga. These vulnerabilities can be used to turn-off the defensive capabilities of the product and achieve privilege escalation. ➡️ Advisories: watchguard.com/es/wgrd-psirt/…
BlackArrow tweet media
English
0
14
23
3.3K
mintko retweetledi
BlackArrow
BlackArrow@BlackArrowSec·
In our latest post, @xassiz introduces a new technique to obtain cleartext passwords from MSSQL by abusing linked servers through the ADSI provider. ➡️ Read more: tarlogic.com/blog/linked-se…
BlackArrow tweet media
English
1
35
40
6.6K