Did you know explorer.exe can directly use WebDAV.
Building an attack chain involving a .zip TLD, Windows Explorer, WebDAV and a jar file.
badoption.eu/blog/2023/06/01…
Did you know explorer.exe can directly use WebDAV.
Building an attack chain involving a .zip TLD, Windows Explorer, WebDAV and a jar file.
badoption.eu/blog/2023/06/01…
Finally I think I am "OK" where I finally reached with this Framework, about 10 methods for attachments and 6 container. I will continue this tool, really loving it how it's coming up. Break Time. 😌
#redteam#BREAKTIME
I made a tool that will generate an obfuscated DLL to bypass AMSI & ETW without getting blocked by AV. Patch and patchless (hwbp) options available. Could be useful for pentests. Was also good to practice my C. 😬 Enjoy! github.com/icyguider/LightsO…
After watching some Offensive Talks, looks like application is really popular started looking into running applications, some are easy but custom ones I am still working on it. 😅
#redteam
After the recommendation - @mubix , I added the URL File extensions for credentials I tried adding more files but there was no option for obfs or encryption, at least not in my skillz. Also added more containers this time for MOTW and the use of Outlook Attachments.
#redteam
New process injection technique through entry points hijacking.
- Threadless or threaded, at will.
- No hooking.
- No RWX memory permissions.
- No new threads with start address pointing to the injected shellcode.
github.com/Kudaes/EPI
Windows Metadata: If you code in C# & need to call Windows API directly I can strongly recommend the Windows Metadata project.
Just import the metadata into ILSpy & you will get language specific WinAPI declarations for C#.
github.com/microsoft/windows…
Let's be honest sometimes we don't want a shell, right? Or maybe we can't because of our malicious code 😟. Let's capture creds then abusing the Icon location of the LNK file, user just needs to visit the folder location of the LNK and BOOM!! hashes.
#redteam
I like the enthusiasm from people who are working on Labs and learned a ton from them, but me, it was painful!! 4 months!!! 4!!!!!. No more Labs.
#redteam
Quick update on the Hackfest Hollywood summit! CFP is open! Submit here by July 17th!
sans.org/mlp/pen-test-hackfe…
Keynotes:
Day 1: @chompie1337
Day 2: @inversecos
Confirmed talks by @FuzzySec & @33y0re!
In person is only $325 & free virtual! This will sell out! Reg soon!
More containers added to test if they remove MOTW, some built in Windows one's don't work any longer. 😢
Well a few more attachments to work on for today.
#redteam
Attachments peek my interest specially when there are plenty!. The pif file got my curiosity, I had to programmatically build the pif so I can choose the execution/injections I wanted, in this POC I added AES, will add the container options and XOR as well!!. ⚔️🔴📎
#redteam