BlackArrow

72 posts

BlackArrow banner
BlackArrow

BlackArrow

@BlackArrowSec

BlackArrow - offensive driven defense #redteam #threathunting by @Tarlogic

شامل ہوئے Haziran 2019
14 فالونگ1.5K فالوورز
پن کیا گیا ٹویٹ
BlackArrow
BlackArrow@BlackArrowSec·
Meetings You Didn’t Plan, But We Did In this post, @ineesdv breaks down how calendar event processing in Outlook and Gmail can be abused to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction ➡️Read more: tarlogic.com/blog/abusing-c…
BlackArrow tweet media
English
0
20
21
3K
BlackArrow
BlackArrow@BlackArrowSec·
Just over 24 hours until @_kripteria takes the stage at @h_c0n to revisit the design and methodology of attack graphs in Active Directory, showcasing new approaches with Neo4LDAP.
BlackArrow tweet media
English
0
9
17
1.1K
BlackArrow
BlackArrow@BlackArrowSec·
Are you aware that even with App-Bound Encryption, attackers can still attempt to steal browser cookies? Our #ThreatHunting team explains how the technique works and how to detect it. ➡️ github.com/blackarrowsec/…
BlackArrow tweet media
English
1
1
4
383
BlackArrow
BlackArrow@BlackArrowSec·
AvePoint has fixed a vulnerability in DocAve, Perimeter and Compliance Guardian discovered by our researchers @m1ntko and @Calvaruga. This vulnerability can be used to achieve Remote Code Execution (RCE) in affected systems. ➡️ Advisory: avepoint.com/company/docave…
BlackArrow tweet media
English
0
8
8
1.4K
BlackArrow
BlackArrow@BlackArrowSec·
Are you aware that WebDAV and search-ms can trick users into executing remote files as if they were local? Our #ThreatHunting team breaks down how the technique works and how to detect it. ➡️ github.com/blackarrowsec/…
BlackArrow tweet media
English
1
5
15
957
BlackArrow ری ٹویٹ کیا
EuskalHack
EuskalHack@EuskalHack·
¡No parpadees si no te lo quieres perder! Kurosh Dabbagh nos habla de "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" #WindowsInternals #Malware #EDR @_Kudaes_
EuskalHack tweet media
Español
0
12
33
2.3K
BlackArrow
BlackArrow@BlackArrowSec·
In a few hours, our colleague @_Kudaes_ will talk at @EuskalHack about call stack spoofing to hide the execution of implants from memory. #ESCVII ➡️ Read more: #ponente7" target="_blank" rel="nofollow noopener">securitycongress.euskalhack.org/ponentes_es.ht…
BlackArrow tweet media
English
0
5
18
1.3K
BlackArrow
BlackArrow@BlackArrowSec·
Are you aware of this technique for achieving fileless persistence? Find out how it works and how to detect it. ➡️ github.com/blackarrowsec/…
BlackArrow tweet media
English
1
8
18
1.3K
BlackArrow ری ٹویٹ کیا
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
Although it's nothing new, @ineesdv and I are pleased to publish our own ROP-based implementation of the code fluctuation technique. We've tried to keep it simple and functional, avoiding to use common features like Timers, HWBP or APCs. github.com/Kudaes/Shelter
English
3
74
188
16K
BlackArrow
BlackArrow@BlackArrowSec·
Enhanced version of secretsdump from #Impacket to dump credentials without touching disk. This feature takes advantage of the WriteDACL privileges held by local administrators to provide temporary read permissions on registry hives. github.com/fortra/impacke…
English
3
127
305
24.1K
BlackArrow ری ٹویٹ کیا
HackOn
HackOn@HackOnURJC·
🚨 Confirmamos primera charla 🚨 Ines (@ineesdv) y Kurosh (@_Kudaes_ ), operadores de Red Team en la unidad de seguridad ofensiva de Tarlogic, son la primera charla confirmada de la #HackOn2024. 👨‍💻 Muchas gracias por venir, estamos encantados de recibiros.
HackOn tweet media
Español
0
12
28
2.8K
BlackArrow
BlackArrow@BlackArrowSec·
Our colleague @IagoAbad has weaponized the leaked token handles technique for MSSQL. Now open token handles in MSSQL's process (sqlservr.exe) can be abused to change security context and escalate privileges both locally and in the domain. github.com/blackarrowsec/…
English
0
61
131
10.3K