Necromancer

269 posts

Necromancer banner
Necromancer

Necromancer

@ZeroMemoryEx

Cyber Security Consultant | Security Researcher

شامل ہوئے Aralık 2019
498 فالونگ2K فالوورز
پن کیا گیا ٹویٹ
Necromancer
Necromancer@ZeroMemoryEx·
I’ve released a PoC and a technical write-up for a local privilege escalation vulnerability I discovered last year and reported to Lenovo PSIRT, affecting many gaming laptop brands, including Lenovo, MSI, Thunderobot, and others. github.com/ZeroMemoryEx/C…
English
3
36
125
8.7K
Necromancer
Necromancer@ZeroMemoryEx·
@smakosh @yezz123 We can go even lower kfta dyal djaj : 300dh lma dyal bir : free internet : 50dh mchrok m3a bzf nas khbz karm: 10dh ( 7to f ma bach yrtab ) srdine : laknti 9rib b7ar sydo kra : camping tent
Indonesia
2
0
7
484
Smakosh
Smakosh@smakosh·
@yezz123 $200 - 1947.2 dh/month Own nothing be happy
Smakosh tweet media
English
6
0
73
10.3K
Yezz123
Yezz123@yezz123·
My monthly cost of living in Morocco 🇲🇦 🏘️ 400$ I own, so I do monthly maintenance/cleaning 🥗 700$ I usually don't like to cook, so I eat outside a lot ⚡ 500$ Electricity + Clean Water 🛜 120$ Wifi 🚗 500$ For car Maintenance (Cleaning - Gazoline - Extra retouch) 📦 1500$ Spoilling my self with shopping and gifts 🤸‍♂️ 60$ Gym Subscription 📱 150$ Online Subscription Total: 3,930$/Month ^ 35,900 Moroccan Dirham
Yezz123 tweet mediaYezz123 tweet mediaYezz123 tweet mediaYezz123 tweet media
Thomas Sanlis 🥐@T_Zahil

My monthly cost of living in France 🇫🇷 🏠 1,400€ loan for the appartment 🥗 450€ food, organic only, with meat fish etc 📦 300€ average for various expenses (bars, orders, etc) ⚡160€ electricity + gaz 📱 45€ phone + internet 🚌 17€ average for transportation Total: 2,372€/month

English
87
10
359
150K
Necromancer
Necromancer@ZeroMemoryEx·
@rustdesk @ESET @anydesk @TeamViewer No idea, but from my point of view, a threat actor can easily deploy it stealthily, while other remote desktop apps are harder due to the message box that appears when someone tries to connect.
English
1
0
1
1.2K
rustdesk
rustdesk@rustdesk·
I'm happy to see that @ESET has marked RustDesk as a PUA, but the problem is: why aren't @AnyDesk and @TeamViewer marked the same way? Aren't they also remote access software?
rustdesk tweet mediarustdesk tweet media
English
11
23
255
38.6K
Necromancer
Necromancer@ZeroMemoryEx·
@0x_alibabas Thanks. didn’t try BaitAndSwitch. when I suggested a redirect policy, it wasn’t an option they said it was incompatible with their SDK. It also took a long time for them to implement a fix, so I gave up testing.
English
0
0
0
138
Alibabas
Alibabas@0x_alibabas·
@ZeroMemoryEx Nice post! Did you try to use BaitAndSwitch to bypass FILE_FLAG_OPEN_REPARSE_POINT? In don't understand why companies don't want to set the redirection flag lmao
English
1
0
1
191
Necromancer
Necromancer@ZeroMemoryEx·
I’ve released a PoC and a technical write-up for a local privilege escalation vulnerability I discovered last year and reported to Lenovo PSIRT, affecting many gaming laptop brands, including Lenovo, MSI, Thunderobot, and others. github.com/ZeroMemoryEx/C…
English
3
36
125
8.7K
Necromancer
Necromancer@ZeroMemoryEx·
@7N7 Then calls DuplicateHandle with the DUPLICATE_CLOSE_SOURCE option which should close it in the source process allowing you to open it freely and dump everything without the user noticing.
English
0
0
1
76
Necromancer
Necromancer@ZeroMemoryEx·
@7N7 2. The last issue was that browser processes open the cookies database file with sharing flags that prevent other processes from accessing it. To bypass that you can enumerate handles until you find the right one via NtQuerySystemInformation
English
1
0
1
86
.
.@7N7·
yearly maldev bug in my brain is calling my name
English
2
0
8
1.5K
Necromancer
Necromancer@ZeroMemoryEx·
@7N7 If I remember correctly, if the user is already using the browser and you inject the DLL, it closes once creds are dumped. I didn’t look deeply, but I just run the browser with a new profile (since you can’t spawn two instances), headless then inject dll and pull data via RPC.
English
0
0
1
40
Necromancer
Necromancer@ZeroMemoryEx·
@7N7 Yeah it’s a lot of effort since you have to handle both ABE and the classic one in ABE some maldevs focus on stealth while others don’t because the browser closes and users notice i can share what I did if you’re interested or you can figur it out yourself if you like challenges.
English
1
0
1
121
Necromancer
Necromancer@ZeroMemoryEx·
@7N7 Damn, too many things waiting for you down there it almost gave me brain damage.
Necromancer tweet media
English
1
0
1
207
.
.@7N7·
im working on a windows stealer. will be ossed soon like the mac one last year. it is interesting how the most effective method for decrypting browser data nowadays requires you to inject a dll into a browser process itself.
English
3
0
7
2.7K
Necromancer
Necromancer@ZeroMemoryEx·
@AUZombie This is their builder. You can see the features since it checks authentication on the client side if you set the response of /api/users to true.
Necromancer tweet media
English
2
0
3
179
luu
luu@AUZombie·
On SalatStealer (aka WEB_RAT) - I noted an interesting use of a service worker to execute panel health checks and rotate through backup panel domains when one goes down to allow the operator uninterrupted access. See thread 🧵
luu tweet media
English
2
3
14
1.9K
sixtyvividtails
sixtyvividtails@sixtyvividtails·
@ZeroMemoryEx Kinda true! Hard rule: IRP.AssociatedIrp.SystemBuffer is always either null, or non-paged pool. So one never needs ProbeForRead the SystemBuffer itself (but may need IRP.UserBuffer and IRPsp.Type3InputBuffer). Note "ObjectAttributes->ObjectName->Buffer": gotta Probe all 3 items.
English
1
0
1
132
Necromancer
Necromancer@ZeroMemoryEx·
It’s been a while since I posted any updates here, so here’s a recap. I’ve fixed errors and memory leaks, improved error handling, added file restriction and integrity bypass features, and implemented a driver swap for disk and memory for more detail,check github.com/ZeroMemoryEx/C…
English
4
26
134
10.7K
Necromancer
Necromancer@ZeroMemoryEx·
@sixtyvividtails Hello @sixtyvividtails, quick question ProbeForRead is only for METHOD_NEITHER not METHOD_BUFFERED right? In METHOD_BUFFERED the I/O Manager already probes and copies the buffer so probing again causes an access violation (you'd be probing a kernel address).
English
1
0
1
122
sixtyvividtails
sixtyvividtails@sixtyvividtails·
@ZeroMemoryEx Yes, that is correct, try-except should be used; but Probe should also be used. E.g. if user sends -666 as address of ObjectAttributes, try-except won't catch dereference of such address (as it's invalid *ring0* address).
English
2
0
2
330