Danijel Grah

1.1K posts

Danijel Grah

Danijel Grah

@r4shimo

wanna be balanced hacker and unlearner of all the things | SOC | Security | Professionally injured athlete | The cat is alive | Tweets are my own.

Katılım Ekim 2012
293 Takip Edilen321 Takipçiler
Danijel Grah retweetledi
MagicSword
MagicSword@magicswordio·
Attackers don’t need stolen certificates. They only need 8 bytes. By flipping 4 bytes in the PE checksum and 4 in the certificate padding, they generate 2⁶⁴ unique driver hashes while keeping Microsoft’s digital signature valid. Why it matters: - Those 8 bytes sit outside the region Windows verifies. - Every variant looks “signed and trusted.” - Hash-based blocking becomes useless overnight. That’s how TrueSightKiller evolved into 2,500+ signed variants. All trusted by Windows, all capable of killing EDRs in seconds. Check out: magicsword.io/blog/truesight…
MagicSword tweet media
English
17
174
827
73.7K
Danijel Grah retweetledi
Hossam
Hossam@0xHossam·
New Blog Post: PowerShell Exploits – Modern APTs and Their Malicious Scripting Tactics I’ve just published a new blog where I explore how PowerShell is used in red team operations, especially by advanced persistent threats (APTs), with a focus on evasion. In the blog, you’ll find: - A detailed explanation of AMSI (Antimalware Scan Interface) and how to bypass it with PowerShell - How we can abuse .NET to run PowerShell commands without PowerShell and without getting detected, and how this works - Methods of AMSI memory patching in C with many practical examples and effective public tools like Invoke-Obfuscation - How APTs create their own methods to avoid detection by security tools with practical, effective demonstrations - Practical examples of underused techniques like CLSID hijacking and exploiting lesser-known LOLBins - Introducing PowerLoad3r: An advanced, evasive malicious PowerShell script loader. Read it from here -> bit.ly/40YXheT "All the techniques and tests are done against Kaspersky EDR, so you’ll get real-world demos :)" A special shoutout to @0xNinjaCyclone for inspiration. #redteam #evasion
Hossam tweet mediaHossam tweet mediaHossam tweet mediaHossam tweet media
English
6
127
460
32.4K
Danijel Grah retweetledi
nyxgeek
nyxgeek@nyxgeek·
"This is our world now... the world of the electron and the switch, the beauty of the baud." From the Hacker's Manifesto, aka The Conscience of a Hacker, by The Mentor. First published in Phrack Issue 7, 1986. Loved seeing this in the movie Hackers. phrack.org/issues/7/3.html
nyxgeek tweet media
English
1
2
11
1.1K
Danijel Grah retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
We can also use a regular expression to search for *.rdp files in the temporary folders that Outlook uses to detect traces of #MidnightBlizzard / #Nobelium activity 🔍 A short form would be: \\Content\.Outlook\\[A-Z0-9]{8}\\[^\\]{1,255}\.rdp$ Or as string contains combo: \AppData\Local\Microsoft\Windows\ \Content.Outlook\ .rdp ✨ a match means that the file has been opened right from the email attachments I have added that filename IOC to THOR Lite's signature database #L4422" target="_blank" rel="nofollow noopener">github.com/Neo23x0/signat…
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
Florian Roth ⚡️@cyb3rops

Microsoft forgot to include the hashes of the RDP files and I wrote a YARA rule to detect them Hashes db326d934e386059cc56c4e61695128e 40f957b756096fa6b80f95334ba92034 f58cf55b944f5942f1d120d95140b800 b38e7e8bba44bc5619b2689024ad9fca e1d7de6979c84a2ccaa2aba993634c48 f7e04aab0707df0dc79f6aea577d76ea 48ed82f14472518251086afc26d886ea 3d7e2ee43faf15c1776aa0277db1c2a5 280ab6fa6087c57b43cd5ac6c257082c YARA rule github.com/Neo23x0/signat… It'll be available in THOR Lite and THOR Cloud Lite in 1h:20m

English
3
74
286
33.4K
Danijel Grah retweetledi
Hackmanac
Hackmanac@H4ckmanac·
🚨Data Breach Alert ‼️ IntelBroker, in collaboration with EnergyWeaponUser and zjj, claims to be selling data from a recent Cisco breach. The compromised data reportedly includes GitHub and GitLab projects, SonarQube projects, source code, hardcoded credentials, certificates, customer SRCs, confidential Cisco documents, Jira tickets, API tokens, AWS private buckets, Cisco technology SRCs, Docker builds, Azure storage buckets, private and public keys, SSL certificates, and Cisco premium products. Several high-profile companies, including Verizon, AT&T, Bank of America, Barclays, British Telecom, Microsoft, Vodafone, and Chevron, are allegedly impacted. Samples have been provided.
Hackmanac tweet media
English
20
152
460
104.6K
Danijel Grah retweetledi
LaurieWired
LaurieWired@lauriewired·
With all the linux RCE drama, it's a good time to bring up a neat scoring system that you (may) not have heard of. EPSS is the cool younger brother of CVSS. Patching just 3.5% of all known vulnerabilities covers 67.8% of what is exploited in the wild. Assuming you don't have infinite resources, it theoretically lets you focus on the CVEs that are more actionable.
LaurieWired tweet media
English
19
145
1.1K
117.4K
Danijel Grah retweetledi
🅰🅳🅼
🅰🅳🅼@securityfreax·
A security feature that was long overdue - it protects browser cookies with TPM, making them strictly device bound. Device Bound Session Credentials #non-goals" target="_blank" rel="nofollow noopener">github.com/WICG/dbsc?tab=… #Gamechanger
English
0
11
20
2.4K
Danijel Grah retweetledi
J̵o̵h̶n̵n̷y̶ ̵W̸i̶t̵h̴a̴d̵
We finally published JarPlant (Java Archive Implantat Toolkit) on GitHub! It's still a work in progress, but it works (mostly). It's a red team tool for injecting malicious code into Java apps and libraries. Use responsibility. github.com/w1th4d/JarPlant
English
1
21
69
8.8K
Danijel Grah retweetledi
Nathan McNulty
Nathan McNulty@NathanMcNulty·
Needed to test something... and I still can't believe this Defender AV / Tamper Protection bypass works :( Sure, you need admin rights to install another AV, but Tamper Protection is supposed to prevent even admins from disabling Defender, right?
Nathan McNulty tweet media
English
14
29
159
26.4K
Danijel Grah retweetledi
spencer
spencer@techspence·
Interesting attack path.. 😈 cc @dotdotdotHorse @offsecdeer/abusing-adcs-ndes-for-privilege-escalation-e4d306c9ca97" target="_blank" rel="nofollow noopener">medium.com/@offsecdeer/ab…
English
0
44
139
9.5K