Spiky Sabra

29 posts

Spiky Sabra

Spiky Sabra

@SpikySabra

Research initiative - We aim to wake the industry @T045T3 @0xs0ns3

israel เข้าร่วม Eylül 2022
7 กำลังติดตาม271 ผู้ติดตาม
AM
AM@AdiMahluf·
@SpikySabra Sabra kadabra ;)
Latviešu
1
0
1
0
Spiky Sabra
Spiky Sabra@SpikySabra·
Watch how MIOB blocks Kernel-Cactus from exploiting vulnerable drivers (video) - at the video you can see Kernel-Cactus stealing the SYSTEM token and implementing it within the new cmd.exe instance. MIOB Driver prevents exploitation using IRP monitoring
English
1
0
0
0
Spiky Sabra
Spiky Sabra@SpikySabra·
Thread hijacking, it's simple, its magic. What if we could give it a wierd twist that is somehow less detected? How can we loose some API calls that relate to changing instruction pointer while using a vulnerable driver? How do you inject an EDR? spikysabra.gitbook.io/kernelcactus/p…
English
2
16
57
0
Spiky Sabra
Spiky Sabra@SpikySabra·
Access tokens are the beating heart of a process. stealing tokens is an important method attackers need in order to escalate their privileges. What if you could steal both local and AD tokens with one command line? Well..now you can ! Check this out : spikysabra.gitbook.io/kernelcactus/
English
4
55
173
0
Pavol Červeň
Pavol Červeň@CervenPavol·
@SpikySabra @alexsho71327477 @GabrielLandau I did some tests with Win 11. No crashes. I found only problem with --etw. When I disabled Windows Defender then it works anyway (tried copy some malware sample). Other things worked nice and I tried almost all parameters. Nice work!
English
1
0
1
0
Spiky Sabra
Spiky Sabra@SpikySabra·
@francisacer1 @alexsho71327477 @GabrielLandau Well, there are plenty of edge cases, depends also on the logon type . But mostly in order to perform lateral movement you must validate session and cached credentials ,while using the same token value mostly takes care of things. Also we believe it's more stealthy.
English
2
0
2
0
Spiky Sabra
Spiky Sabra@SpikySabra·
@pat_mayer @codex_tf2 You are correct as well. Pros and cons like all in life. With that being said, we made sure the service would never come back. You check the section regarding destroying a service 😎
English
0
0
0
0
Pat Mayer
Pat Mayer@pat_mayer·
@SpikySabra @codex_tf2 Killing it would also mean that the defender can’t contain the host or execute any remote command and just like you say, more damage can be done during that time !! If the host goes back online, everybody will focus on the host, what happen etc etc etc
English
1
0
1
0
Spiky Sabra
Spiky Sabra@SpikySabra·
A lot has been said about removing hooks and kernel callbacks to stop an EDR from detecting malicious activity. What if we could terminate the process completely? Well ...we can. Check this out: spikysabra.gitbook.io/kernelcactus/
English
4
110
333
0
Pavol Červeň
Pavol Červeň@CervenPavol·
@alexsho71327477 @GabrielLandau @SpikySabra Your work with BYOVD is interesting. Not only gain privileges but run process like PP or PPL. Another very interesting thing is possibility "downgrade" PP or PPL process to normal process and then dump it or debug it. Did you try it with Win 11?
English
2
0
1
0
Spiky Sabra
Spiky Sabra@SpikySabra·
@alexsho71327477 @GabrielLandau Well.. instead of creating a new token object , we re use the value of an existing one. Using less API calls = less detections. Also, when you duplicate tokens in a domain environment, they are not valid for actions outside of your machine, while using this method they are valid
English
1
0
1
0
alex short 🇺🇦
alex short 🇺🇦@alexsho71327477·
@GabrielLandau @SpikySabra yes, this is correct way. also we can create token yourself, after get SeCreateTokenPrivilege. for what here driver (which at first need have and sign) unclear for me
English
2
0
1
0
Spiky Sabra
Spiky Sabra@SpikySabra·
@codex_tf2 We agree completely! And yet the possibility is scary. A malicious adversary that is going "guns blazing" would not care about a red flag though... Sometimes a few seconds without EDR is all it takes to make serious damage.
English
1
0
3
0
CodeX
CodeX@codex_tf2·
@SpikySabra killing the EDR is risky tho, if they have any way of detecting it and it flags thats a HUGE red flag. That and ive seen friends who werent allowed to totally kill the EDR due to ROE
English
1
0
10
0
Spiky Sabra
Spiky Sabra@SpikySabra·
@GabrielLandau In our point of view, the arbitrary read / write IOCTLS are more dangerous then others, since they expose the attacker to endless possibilities
English
0
0
1
0