tasty pepperoni

15 posts

tasty pepperoni

tasty pepperoni

@tastypepperoni

OSEP | OSCP | CRTO

Katılım Kasım 2021
220 Takip Edilen163 Takipçiler
tasty pepperoni
tasty pepperoni@tastypepperoni·
Stateful Connection With Spoofed Source IP — NetImpostor Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP github.com/tastypepperoni…
English
0
0
1
88
tasty pepperoni
tasty pepperoni@tastypepperoni·
@M_haggis Great work on detections! About the location, from where the driver was loaded, it can be easily bypassed with --driver option. You can specify the location and the filename of the driver with it. So, we can't rely on that method alone
English
0
0
1
22
The Haag™
The Haag™@M_haggis·
Most will need to register a service which is pretty standard. In this case - EventCode 7045. Do some hunts, you'll realize most drivers load from pretty standard locations. When something new loads outside of those paths - 👀👀👀
The Haag™ tweet media
English
2
0
3
249
The Haag™
The Haag™@M_haggis·
PPLBlade 🗡️ is not the first to incorporate a driver 🛠️ in order to disable or evade controls 🚫. How can we effectively monitor 🖥️ such activities across multiple endpoints 🔍 and on a larger scale 📊? Let's explore some analytic ideas using Sysmon, Aurora and WinEventLogs📈.
English
2
12
32
8.5K
tasty pepperoni
tasty pepperoni@tastypepperoni·
@rolphin @Sam0x90 @abhijithbr nt authority\system level shell can be started, if you're an admin(using psexec for example). You're still going to have SeDebugPrivilege there.
English
0
0
0
203
rolphin
rolphin@rolphin·
@Sam0x90 @abhijithbr @tastypepperoni About prevention: what about removing the SeDebugPrivilege from admin group ? (Leave it to a specific admin group without members until needed ?)
English
1
0
0
37
tasty pepperoni
tasty pepperoni@tastypepperoni·
@_Kudaes_ @theluemmel Again, specific conditions might exist, but these kinds of conditions are in every bypass, vulnerability, etc. We come to the basic baseline: There's a prevention mechanism, to prevent access to PPL. You still get access to the PPL, you invalidate the prevention. Simple as that.
English
1
0
0
116
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
@tastypepperoni @theluemmel From kernel you are allowed to interact with any process, including PPL. In order to call something a bypass (imho) it is required to be something preventing you from doing so, which is not the case once the driver is loaded.
English
2
0
2
198
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
@theluemmel @tastypepperoni That's an alive debate rn, but imo there is already a security boundary, which is that you need SeLoadPrivilege to load a (digitally signed) driver. Once that's done, I don't see the PPL bypass. I see it more like why tf the EDR allows a random binary to load PS's driver xD
English
2
0
7
577
tasty pepperoni
tasty pepperoni@tastypepperoni·
@_Kudaes_ @theluemmel Sure, there can exist mitigations to prevent you from doing this, and yes, IF those mitigations are present, then there is no bypass. But this "IF" can exist in every exploit, every vulnerability, every bypass. This does not mean that we should not call it its name.
English
0
0
1
127
tasty pepperoni
tasty pepperoni@tastypepperoni·
@_Kudaes_ @theluemmel Whether this is exploit/vulnerability can be debated, sure. But when it comes to the term "bypass", i think the tool fulfills the term definition. The Defense mechanism(PPL) is there, to prevent you from doing something, yet you accomplish your malicious goal.
English
1
0
1
101
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
@theluemmel @tastypepperoni This is MS's AV, not MDE (EDR). And I would not consider that bringing your own kernel driver is a PPL bypass, It is the intended behaviour! Maybe I'm missing something here 🙃
English
2
0
2
1.1K
tasty pepperoni
tasty pepperoni@tastypepperoni·
@theluemmel @techspence Don't forget to add the obfuscation option if the host, running SMB is defended by Windows Defender as well. SMB machine's Defender will detect the dump file as well and delete it. Turn on the obfuscation to exfil the obfuscated version, so the new Defender will leave it alone.
English
0
0
0
64
tasty pepperoni retweetledi
LuemmelSec
LuemmelSec@theluemmel·
Ran into a problem while trying to compile @tastypepperoni's PPLBlade: github.com/tastypepperoni… The rootcause is compiling go stuff on linux for windows so it runs into errors. However you can do it like this: OOS=windows GOARCH=amd64 go build -o bin/pplblade.exe Et voila :)
LuemmelSec tweet mediaLuemmelSec tweet media
English
1
7
21
2.5K