Mohamed El Azaar

378 posts

Mohamed El Azaar banner
Mohamed El Azaar

Mohamed El Azaar

@med0x2e

RedTeamer & Security Researcher, used to be a full-stack Dev, Manga/Anime Otaku.

Dubai, United Arab Emirates Katılım Mart 2013
277 Takip Edilen1.6K Takipçiler
Sabitlenmiş Tweet
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
Releasing a tool(s) for patching/injecting shellcode into MS-Authenticode signed PE files without breaking the signature, used for; * Bit/Sig Flipping PEs (EXE, DLL, Sys ..etc) * Encrypt/Inject shellcode into PEs * Decrypt/Load shell code from modified but still signed PE files.
Mohamed El Azaar tweet mediaMohamed El Azaar tweet mediaMohamed El Azaar tweet mediaMohamed El Azaar tweet media
English
9
317
688
0
bohops
bohops@bohops·
Last week, I joined the IBM @XForce Adversary Simulation team. I am excited and grateful to work with such an incredibly talented group. Cheers to new adventures!
English
50
12
257
20.9K
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
@r00t0v3rr1d3 Well, a NuC then, but it is only the payload part anyway, and it is usually a matter of preference, sticking with Intel Macs has a lot of downsides these days…
English
1
0
0
358
Chris Shields
Chris Shields@r00t0v3rr1d3·
@med0x2e I didn’t include the “cloud” in my previous statement, but again, you are using another “computer” as a solution. And I’m certainly not putting payloads of mine that need testing in an Azure VM.
English
1
0
0
133
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
Anyone (Red Team) managed to fully migrate to Mac M1/2/3 and figured workarounds for all the x86 stuff needed to run tools or test malware targeted for x86 (ex; x86 emulation on win11 arm), wondering how often one needs to switch to intel devices if needed and what to account for
English
6
0
6
2.8K
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
@r00t0v3rr1d3 Not all VMs need to be on Intel devices, did some initial testing with ARM VMs and are good enough for most of RT work, I found win11 (arm) x86 emulation surprisingly good, the exception here is x86/64 payload testing.., an azure Win VM should cover that..
English
1
0
1
315
Chris Shields
Chris Shields@r00t0v3rr1d3·
@med0x2e I love how everyone’s solution is to use another computer or separate server hardware. Don’t get me wrong, love the home lab scene, but I’m also not going to spend “Apple money” on something to browse the web or console into the VMs on a server. If it MUST be a Mac, Intel only.
English
1
0
4
315
Mohamed El Azaar retweetledi
simo
simo@_simo36·
I've audited the Android kernel in late 2023, and reported 10+ kernel bugs to Google, along with 2 exploits. Today, I'm releasing the first exploit, targeting the Mali GPU on Pixel devices, accessible from an untrusted_app context. github.com/0x36/Pixel_GPU…
English
27
262
1K
114.8K
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
“Revolutionary” is abused to the extent it has become meaningless these days. any app is dubbed as revolutionary by marketing/sales, lies upon lies, seriously !! I hate stupid Ads.. If you hear “Revolutionary”, expect BS.
English
0
0
2
342
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
@C5pider Great work Paul :), Also switched to PIC instead of PE loaders 2 years ago and have been wondering ever since if it is only me or I’m doing something wrong…
English
1
0
5
639
bohops
bohops@bohops·
👀
bohops tweet media
QME
4
0
45
8.4K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
APT 41 / BARIUM Known to run: "whoami.exe" also launched via wmiexec (HOW DARE THEY!) Better tell them they would be fired from a red team , I'm sure they will cry about that.... /S Our industry is very odd.....
mRr3b00t tweet mediamRr3b00t tweet media
English
29
86
626
157K
Dominic Chell 👻
Dominic Chell 👻@domchell·
It's mental how MS legitimately use domains that they allow their Azure customers to register hosts on... how is anyone supposed to spot whats malicious c2/phishing and not? 🤯
Dominic Chell 👻 tweet media
English
12
22
289
74.8K
Arun
Arun@dazzyddos·
Hey my infosec pals! Just wondering, if cybersecurity wasn’t a thing, or if you had to bounce from it someday, what other gig do you think you’d be rocking?
English
9
0
5
880
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
@rad9800 Real APTs have Time & Resources on their side, they are not bound to 4/8 weeks of time for both preparation and execution.., as long as that is true, Imo their Tools will be always more advanced (ex; doublepulsar)
English
0
0
6
491
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
It seems MS decided to just fix/patch all the `Forced/Coerced` Auth primitives on Windows 11, Anyone else ended up with a similar conclusion ? obviously after trying all the tools/methods.
English
0
0
3
613
Mohamed El Azaar
Mohamed El Azaar@med0x2e·
@an0n_r0 Nice work, I remember making it work few years back when Dinvoke was released, I can’t seem to find that piece of code though.., but I remember it was messy, ur approach is much cleaner (ILmerge)
English
0
0
1
283
an0n
an0n@an0n_r0·
Built a special JS stager for Cobalt Strike (or for anything else). Actually it is based on C# .NET, and it is super simple (full source is on the screenshot) because it uses the PE mapper from DInvoke. Currently managed to bypass Defender. Sharing some details in this thread.
an0n tweet media
English
7
49
210
24K
Mohamed El Azaar retweetledi
an0n
an0n@an0n_r0·
What worked for me after a long trial and error process: used ILMerge for linking the SimpleStager.exe and DInvoke.dll assemblies together. github.com/dotnet/ILMerge Other solutions (Costura Fody or ConfuserEx compressor) were failing in the GadgetToJScript deserialization phase.
English
1
2
5
1.5K
Mor Davidovich
Mor Davidovich@dec0ne·
Introducing DavRelayUp - A port of #KrbRelayUp with modifications to allow for NTLM relay from WebDAV to LDAP and abuse #RBCD in order achieve #LPE in domain-joined windows workstations where LDAP signing is not enforced. Demo in second tweet. github.com/Dec0ne/DavRela…
English
9
168
391
79.7K