Ivan Spiridonov

334 posts

Ivan Spiridonov banner
Ivan Spiridonov

Ivan Spiridonov

@xbz0n

Penetration Tester | #OSCE³ | #OSWE | #OSEP | #OSED | #CRTO | #CRTL | #CRTE | #OSCP | #BSCP | Offsensive Security Consultant

Katılım Eylül 2015
1.1K Takip Edilen1.8K Takipçiler
Ivan Spiridonov retweetledi
RST Cloud
RST Cloud@rst_cloud·
#threatreport #LowCompleteness Mythic C2 with EarlyBird Injection and Defender Evasion | 29-06-2025 Source: xbz0n.sh/blog/mythic-c2… Key details below ↓ 💀Threats: Mythic_c2, Earlybird_injection_technique, Cobalt_strike_tool, Domain_fronting_technique, Apollo, Process_injection_technique, Credential_harvesting_technique, Antidebugging_technique, Polymorphism_technique, 🤖LLM extracted TTPs:` T1001.003, T1003, T1027, T1027.005, T1036.004, T1036.005, T1055.002, T1055.012, T1055.019, T1071.001, ... 🧨IOCs: - File: 20 - Path: 1 💽Software: Nginx, WordPress, Ubuntu, sudo, Docker, curl, Windows Error Reporting, Windows Defender 🔢Algorithms: prng, xor, exhibit 🔠Functions: decrypt, Execute, GetEmbeddedPayload, AdvancedPayloadLoader, Run, main, Get-MpComputerStatus 🗂️Win API: CreateProcessW, VirtualAllocEx, WriteProcessMemory, QueueUserAPC, ResumeThread 📜Programming Languages: php #threatreport: The article discusses the intricacies of constructing effective command and control (C2) infrastructure, specifically highlighting the Mythic C2 framework and the EarlyBird injection method to achieve stealth during red team operations. It critiques the simplistic approach often taken by red teamers who rely on basic setups like Cobalt Strike, emphasizing that modern security teams can quickly identify and neutralize such obvious threats. The core of this C2 infrastructure centers on using HTTP/HTTPS redirectors to obscure the actual C2 server from direct exposure to the internet. This is accomplished through a direct Nginx proxy configuration, where genuine web traffic conceals C2 communications. By leveraging legitimate content, encrypted traffic, and valid certificates, the setup aims to present a façade of normalcy to detection systems. The system routes all communications through a decoy site, which is designed to look legitimate and serve as a cover for the C2 traffic, minimizing the chances of detection. Central to the operation is the EarlyBird injection technique, which enhances the stealth capacity of the payload. This method exploits the Windows process creation workflow by creating processes in a suspended state, allowing for memory allocation and injection without triggering immediate alerts. This timing allows code execution during the process's initialization phase, before most security monitors can activate. The article provides a detailed view of how the loader interacts with system processes, specifically how it targets legitimate processes like WerFault.exe for injection, masking its malicious nature while maintaining operational capability. It also discusses the importance of using real domain names and SSL certificates in the setup, adding layers of obfuscation that make detection exceedingly challenging for blue teams. By ensuring that all communications resemble legitimate traffic patterns, the risk of exposure is significantly lowered. For instance, payloads are disguised as benign file types, such as font downloads, further embedding malicious activity within ordinary Internet behavior. The infrastructure's resilience is enhanced by implementing fallback strategies and ensuring that should one part of the system fail, others can maintain functionality. This involves automatic payload rotation and increasingly sophisticated obfuscation techniques to agitate static and dynamic analysis tools. The article emphasizes the necessity of adopting a defense-oriented mindset to anticipate and mitigate detection tactics used by modern endpoint security solutions.
RST Cloud tweet media
English
0
1
5
561
Ivan Spiridonov retweetledi
spencer
spencer@techspence·
How do you meaningfully improve the security of your AD environment? Run these free tools quarterly: - PingCastle - ScriptSentry - Locksmith - ADeleginator If you just ran these tools and fixed everything identified by them, your AD environment will not only be more secure, but you’ll sleep better at night.
English
24
159
1K
73.9K
Ivan Spiridonov
Ivan Spiridonov@xbz0n·
No C2 backbone in your red team op? Tightrope, no net. My new article digs into C2 layers & how I use Nginx to bounce HTTP/HTTPS traffic on the sly. Keeps it tough to crack. xbz0n.sh/blog/c2-redire… #C2 #RedTeam
English
1
8
18
891
Ivan Spiridonov retweetledi
Smukx.E
Smukx.E@5mukx·
My maldev works and practices [Oct 2024]: + Remote Process Injection using NTAPI: github.com/Whitecat18/Rus… + Code injection using (NtCreateSection,NtMapViewOfSection) : github.com/Whitecat18/Rus… + Payload Shuffling Technique: github.com/Whitecat18/Rus… + Local Mapping Injection: github.com/Whitecat18/Rus… + Enable Token Access: github.com/Whitecat18/Rus… + Module Extractor: github.com/Whitecat18/Rus… + DLL Injector [Added Features++]: github.com/Whitecat18/Rus… + PPID Spoofing: github.com/Whitecat18/Rus… + Code injection using CreateMutex: github.com/Whitecat18/Rus… + EDRChecker: github.com/Whitecat18/Rus… [Oct 2024] For More Codes: For More Codes: github.com/Whitecat18/Rus… #maldev #EDR #redteaming #Program #shellcode #evasion #pwn #testing #tools #LearnAndGrow
Smukx.E tweet mediaSmukx.E tweet mediaSmukx.E tweet media
English
7
142
513
29.4K