LainKusanagi

100 posts

LainKusanagi banner
LainKusanagi

LainKusanagi

@unknownseeker99

Systems, people and ideas, all of them have hidden vulnerabilities | CRTO | CRTP | OSCP | PNPT

Katılım Eylül 2021
176 Takip Edilen638 Takipçiler
LainKusanagi
LainKusanagi@unknownseeker99·
In this article I’ll show how to find and modify the assembly of binaries and shellcode as a way to evade byte based detection. I’ll first show how to do this manually then how to script it and finally show a tool we can also use. @luisgerardomoret_69654/modifying-the-assembly-of-binaries-and-shellcode-for-evasion-687874c5eb00" target="_blank" rel="nofollow noopener">medium.com/@luisgerardomo#penetrationtesting
English
0
14
80
5.3K
LainKusanagi
LainKusanagi@unknownseeker99·
@idkhiddenwtf This guy ruined my country bro I'm Venezuelan what are you doing posting him with books 😭
English
0
0
1
116
idkhidden
idkhidden@idkhiddenwtf·
idkhidden tweet media
ZXX
17
304
3.5K
67.5K
LainKusanagi
LainKusanagi@unknownseeker99·
In this article I show how to modify and compile a Shellcode loader made in Golang and then use it to load a Sliver C2 beacon. #redteaming #penetrationtesting @luisgerardomoret_69654/using-a-golang-shellcode-loader-with-sliver-c2-for-evasion-43a95f5ebc35?postPublishedType=repub" target="_blank" rel="nofollow noopener">medium.com/@luisgerardomo
English
0
1
8
465
LainKusanagi
LainKusanagi@unknownseeker99·
@S1r1u5_ Both of you are right, I wholeheartedly believe CTF can really upskill you and humble you but also think you need to keep learning IT and setting your own labs on the side, he is right that at least AV evasion CTF are rare. I think we should encourage people to do both things.
English
1
0
2
352
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
more importantly tho - CTF humbles you. it drags your ignorant i-know-it-all ass out of the mud, gives you the reality check, and forces you to level up every single day. i won't be going to bug bounty or security research until i grind CTFs for year or two(depends how fast you are) when you’re with your teammates competing people all over the world, you really see where you stand in capabilities and start to optimizes for where you are good at.
English
1
1
46
2.3K
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
probably just engagement farming. CTF hate is usually skill insecurity and copium. plus all those skills mentioned are table stakes for any decent CTFers, they’re buys pwning browsers and tearing apart complex apps.
Het Mehta@hetmehtaa

Stop wasting time on CTF challenges. Learn Docker security, EDR evasion, network segmentation, SAML/OAuth flows, WAF configuration, and how to debug production incidents. You'll be 10x more hireable than someone who rooted 500 vulnerable VMs.

English
10
12
229
22.1K
LainKusanagi
LainKusanagi@unknownseeker99·
I liked user, really digging into the application, really hard to figure the last step but once you do and look back, it makes a lot of sense. For root its more simpler than it looks and with the right search you can find what you need. labs.hackthebox.com/achievement/ma… #hackthebox
English
1
0
27
770
LainKusanagi
LainKusanagi@unknownseeker99·
@mccleod1290 If you just want to do bb you may not need oscp. I feel im not too experienced yet and this was my first bug. Stuff Ive found helpful was reading bb reports, watching yt channels like bb reports explained, zseano, nahamsec interviews, staying persistent and focusing on impact.
English
0
0
1
109
LainKusanagi
LainKusanagi@unknownseeker99·
First triaged bug on a bug bounty program, wish me luck! #bugbounty
LainKusanagi tweet media
English
2
1
57
2.2K
LainKusanagi
LainKusanagi@unknownseeker99·
Really tough machine, learned a lot from it, for user you will have to look into more novel AD attacks and get creative with ACLs. For root some enumeration and understanding clues should get you the next step and then perform kerberos abuse. labs.hackthebox.com/achievement/ma… #hackthebox
English
0
2
25
644