247CTF

1.5K posts

247CTF banner
247CTF

247CTF

@247CTF

🏆 The 247CTF continuous security competition 📺 YouTube for CTF fundamentals https://t.co/0RP7w5pej2 🏁 https://t.co/FATXT1bqrW for CTF challenges

Australia เข้าร่วม Nisan 2019
88 กำลังติดตาม5.4K ผู้ติดตาม
ทวีตที่ปักหมุด
247CTF
247CTF@247CTF·
247CTF{f9591934c302bc8a29fad566fcf438cd}
English
8
4
87
0
247CTF รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
During a recent Active Directory intrusion test, @croco_byte was led to devise a new versatile attack vector targeting Group Policy Objects, allowing their exploitation through NTLM relaying. synacktiv.com/publications/g…
English
6
109
244
37.5K
247CTF รีทวีตแล้ว
Charlie Bromberg « Shutdown »
Here is a first draft on an NTLM relay mindmap 🙂 from authentication coercion to post-relay exploitation. I'll gladly update/correct it if you think there are things wrong or missing. ➡️Featured on The Hacker Recipes thehacker.recipes/ad-ds/movement…
Charlie Bromberg « Shutdown » tweet media
English
16
312
835
0
247CTF รีทวีตแล้ว
Rasta Mouse
Rasta Mouse@_RastaMouse·
[BLOG] Ok, I've written about my experience of battling with both managed and unmanaged memory allocations to try and improve @FuzzySec's Melkor POC. rastamouse.me/building-a-sli…
Rasta Mouse@_RastaMouse

@domchell 💯 I thought of doing a blog post showing ways to minimise or clear heap memory allocations in your C# tooling, kinda like programming OPSEC tips that don’t rely of the GC. Not sure how useful it would be though.

English
1
68
170
46.6K
247CTF รีทวีตแล้ว
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
EDRSandblast-GodFault: a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine callbacks, Object Callbacks and ETW TI provider) and LSASS protections github.com/gabriellandau/…
English
2
56
151
12K
247CTF รีทวีตแล้ว
assume_breach
assume_breach@assume_breach·
I just published Home Grown Red Team: SMB Pivots With Havoc C2 link.medium.com/Ap3Xk0HKjCb An updated article for lateral movement with Havoc.
English
5
123
388
28.1K
247CTF รีทวีตแล้ว
Justin Gardner
Justin Gardner@Rhynorater·
SUCH a good read. I love the section where they explicitly explain the process used to write custom shellcode for OpenBSD. Even for a noob to Binary Exploitation that was so easy to follow and really emboldening to go after these sort of bugs. Bravo! blog.assetnote.io/2023/08/09/exp…
English
2
41
193
15.7K
247CTF รีทวีตแล้ว
Mor Davidovich
Mor Davidovich@dec0ne·
Excited to share my new research: a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local/remote processes. github.com/ShorSec/DllNot… An accompanying blog post with more details: shorsec.io/blog/dll-notif…
ShorSec Cyber Security@ShorSecLtd

We are excited to share a new "threadless" process injection technique by @dec0ne. This new technique utilizes DLL Notification Callbacks in the remote process to trigger the shellcode github.com/ShorSec/DllNot… Detailed blog post: shorsec.io/blog/dll-notif… Demo video in next tweet

English
6
141
411
47.6K
247CTF รีทวีตแล้ว
Justin Gardner
Justin Gardner@Rhynorater·
. @samwcyo's write ups not only contain a 👌 amount of technical details, but also tell a story and describe the mentality required to find these internet breaking bugs. Also, note the verbiage surrounding "interesting" or "curious". Essential. Must read: samcurry.net/points-com/
English
0
30
141
10.8K
247CTF รีทวีตแล้ว
SpecterOps
SpecterOps@SpecterOps·
Continuing their journey through offensive data, @harmj0y, @tifkin_, and @0xdab0 break down some common challenges in post-exploitation work flows. ghst.ly/45d5oF3
English
0
19
79
7.8K
247CTF รีทวีตแล้ว
Riccardo
Riccardo@dottor_morte·
Me and @Her0_IT did a fair bit of research against one of the leading EDRs in the sector. This first post will hopefully be the start of a long saga, documenting all of our findings. This first part was dated back in 2020: riccardoancarani.github.io/2023-08-03-att…
English
3
69
183
16.8K
247CTF รีทวีตแล้ว
phish 🐟
phish 🐟@dunderhay·
Published a write-up on successfully phishing a target using AD FS with MFA. Covers some of the challenges and how I finally got it working 🎣 research.aurainfosec.io/pentest/hook-l…
English
3
115
297
31.1K
247CTF รีทวีตแล้ว
Kyle Avery
Kyle Avery@kyleavery·
New DLL hijacking opportunities, triggered using DCOM for lateral movement: github.com/WKL-Sec/dcomhi…
English
1
115
299
43.5K