Diego Capriotti

519 posts

Diego Capriotti banner
Diego Capriotti

Diego Capriotti

@naksyn

Network Boogeyman

The heap Katılım Haziran 2014
273 Takip Edilen1.1K Takipçiler
Diego Capriotti
Diego Capriotti@naksyn·
I don't think we'll see this for sum-zero game type of jobs (like offense or defense) the pace increased for both players and who is slowing down loses. Different story for jobs without an "enemy" like food provision, where I currently believe we'll get to 0 working days pretty fast.
English
0
0
0
42
Rasta Mouse
Rasta Mouse@_RastaMouse·
If AI is so productive, why are we not just working 1-2 day weeks?
English
18
3
65
7K
MagicSword
MagicSword@magicswordio·
Great question! This isn’t TrueSight-specific. The hash-changing trick works on any validly signed driver by modifying PE fields that aren’t covered by Authenticode (checksum + cert padding). The signature stays valid, but the hash changes. TrueSight is just the driver attackers are abusing most right now.
English
2
2
12
3.4K
MagicSword
MagicSword@magicswordio·
Attackers don’t need stolen certificates. They only need 8 bytes. By flipping 4 bytes in the PE checksum and 4 in the certificate padding, they generate 2⁶⁴ unique driver hashes while keeping Microsoft’s digital signature valid. Why it matters: - Those 8 bytes sit outside the region Windows verifies. - Every variant looks “signed and trusted.” - Hash-based blocking becomes useless overnight. That’s how TrueSightKiller evolved into 2,500+ signed variants. All trusted by Windows, all capable of killing EDRs in seconds. Check out: magicsword.io/blog/truesight…
MagicSword tweet media
English
16
172
826
73.9K
Rasta Mouse
Rasta Mouse@_RastaMouse·
Anybody used rohitab API Monitor on Windows 11? Doesn't seem to work for me.
English
5
0
7
4.5K
Diego Capriotti retweetledi
Percy Liang
Percy Liang@percyliang·
Wrapped up Stanford CS336 (Language Models from Scratch), taught with an amazing team @tatsu_hashimoto @marcelroed @neilbband @rckpudi. Researchers are becoming detached from the technical details of how LMs work. In CS336, we try to fix that by having students build everything:
English
46
574
4.9K
677.3K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I want to zoom in on this question a little bit. It is indeed possible to perform general purpose computation on GPU/integrated graphics. All frameworks like OpenGL, Direct3d, Vulcan and CUDA support this through shaders. From an attacker compat perspective OpenGL is the most attractive (bindings are native). You can easily implement something like RC4 in GLSL for example .. 👀
etherret🐾@witchof0x20

@vxunderground I wonder if you could push obfuscated payloads and deobfs them on the GPU, skipping over heuristics that might usually catch that sort of thing

English
3
0
11
4.5K
Diego Capriotti
Diego Capriotti@naksyn·
@NullMode_ Got an APC Smart-UPS 1500VA rack mounted since 2 years. Quite happy with it. Make sure to choose an UPS that is capable of pure sine wave output
English
0
0
0
54
Luke Rogerson
Luke Rogerson@NullMode_·
Anyone got a UPS at home? Any recommendations?
English
5
1
4
1.7K
Diego Capriotti
Diego Capriotti@naksyn·
When you need to put the cat out of the sack to vendors and clients you'd better share what you found otherwise imposters will do before you stealing your credit. It all boils down to knowing when to share to vendors and clients and getting credit publicly when it's not an internal technique anymore. I see it as a simple risk-management scenario.
English
0
0
2
146
Justin Elze
Justin Elze@HackingLZ·
We have a similar approach as @0xBoku get some mileage and share. Between explaining how things work to client blue teams and EDR vendors actively REing things it’s not a secret for that long. It’s also lost a lot lately that red teams are building/built off each others research from both public and private sharing.
English
2
2
17
1.3K
Tim MalcomVetter
Tim MalcomVetter@malcomvetter·
It’s so silly watching hype over red team tools built for a new technique. Is 15 minutes of internet fame still worth blowing (all your R&D time for) your technique and arming real bad guys who have zero dev skills? If your kit is amazing, I challenge you to publish it mostly complete, so only those who can understand it can complete it and use it, helping all the little orgs out there who don’t need to be squashed by mediocre adversaries with few skills and big consulting funded toolkits.
English
9
3
40
12K
Diego Capriotti
Diego Capriotti@naksyn·
This is because future budgets are largely driven by "historical spending" and not by efficiency. No one ever wanted to judge other Departments' spending thus making enemies and risking careers. Historical spending is a "solution" that avoids human weaknesses and democratizes inefficiency making it the norm. Spreading inefficiency over a certain threshold makes it unattributable. So vast that no one will pay for it. Genius game going on for decades everywhere
English
0
0
1
74
Diego Capriotti
Diego Capriotti@naksyn·
@Ab4y98 Glad you liked the presentation! Indeed Python is still underrated IMHO.
English
0
0
1
11
Daniel Abay
Daniel Abay@Ab4y98·
@naksyn Just watched youtube.com/watch?v=_TEnBL… TBH, I really didn't know that Python has so much power in terms of "Red Teaming Evasion" because all the learning material out there is based on C/C++. And it's really nice to see someone take Python to the next level.
YouTube video
YouTube
English
1
0
1
30
Adam Chester 🏴‍☠️
That is a long ass way of saying… she’s talking bollocks! Like, proper bollocks! Like… I lost brain cells listening to this level bs (And it actually starts off semi cohesive) 😂
vx-underground@vxunderground

A woman's rant is going semi-viral in political circles on Twitter and Facebook. Some are citing her rant as evidence of potential electoral interference during the 2024 Presidential election. The woman's opening remarks claim she possesses a CCIE (Cisco Certified Internetwork Expert) — a very prestigious certification which is often possessed by truly dedicated people. Currently there are only 45,000 active CCIE holders worldwide. Only 3% of Cisco cert holders attempt it ... and only 26% pass — it has a 74% failure rate. Now it should be stated that no one in our group possesses a CCIE. We do not claim to be network experts, we're just malware nerds. However, despite our lackluster understanding of networking (beyond the computer science basics of the OSI model), we can confidently say this woman does not possess a CCIE and we believe she is lying. Additionally, we would like to note we did indeed watch this entire video. Despite this woman's jargon and clear ... plainly wrong information... we decided to give her a chance to speak her mind and opinion. We do not recommend watching the entire 8 minute video. You will have no benefit from it. At roughly 4 minutes you will see, very clearly, this is not a technical person.

English
2
0
5
2.2K
Diego Capriotti
Diego Capriotti@naksyn·
This has been one of my favorites for a while, but now it's time to let it go. Here's my preferred way of getting the KeePass db that we often hunt for: downgrade the executable to version 2.53, use CVE-2023-24055 and wait for the busy admin to trigger the dump of the database. The target can remain clean and you can simply check for the dump creation. KeePass version 2.53 can still open kdbx created with the version 2.57 and if using a proper xml the user will likely notice nothing. Update alerts can also be disabled within the xml. gist.github.com/naksyn/6d5660d…
English
0
49
181
18.5K
Rasta Mouse
Rasta Mouse@_RastaMouse·
@naksyn @_xpn_ Don't really get lightning often in the UK. Just rain, rain, and more rain, so unless you're telling me water explodes....?
English
1
0
0
133
Rasta Mouse
Rasta Mouse@_RastaMouse·
@_xpn_ That’s it, I’m gonna go live in the woods where things don’t explode.
English
2
0
3
831
Steve Borosh
Steve Borosh@rvrsh3ll·
Idea: Use this on offense selectively or collect the network and process offline to build a picture of the tech stacks in the environment. Need something like @harmj0y's Nemesis to enrich the data. You could even timeline user action and use behavioral analysis for target select.🤔
David das Neves@david_das_neves

[Repo] RetrievIR is an impressive PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices. buff.ly/3yxSlTO #PowerShell #CyberSecurity

English
1
5
15
1.9K
IAM!ERICA
IAM!ERICA@EricaZelic·
I don't know how you parents do parenting and work as well. Just arranging dog sitters while moving is stressful enough.
GIF
English
4
0
14
891
Dave Kennedy
Dave Kennedy@HackingDave·
Swung by TB to order from my son lol. Proud of this dude.
Dave Kennedy tweet media
English
53
4
760
39.2K