Fabio Baroni

@Fabiothebest89

Ethical hacker, pen tester, dev, web designer, vulnerability assessment, forensics, malware analysis. Founder

Italy
Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @Fabiothebest89

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Fabiothebest89

  1. Prikvačeni tweet
    9. kol 2016.
    Poništi
  2. proslijedio/la je Tweet
    10. svi 2019.

    New blog post is up starting a series of looking at just how Mimikatz achieves its magic, beginning with WDigest (and ending with a bit of lsass DLL loading fun).

    Poništi
  3. proslijedio/la je Tweet
    17. stu 2019.

    Defenders should deploy this settings: HKLM\SYSTEM\CurrentControlSet\Control\Lsa Dword: RunAsPPL Value: 1 Protects dumping of Lsass with a simple registry value. Encountered that on an engagement recently. 🤯 Mimikatz driver needed to bypass Details

    Poništi
  4. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    17. sij

    If you have AppLocker deployed, be aware that most times when Windows 10 is updated/upgraded, it creates a TASKS_MIGRATED folder under C:\windows\system32 that has the CREATOR OWNER, meaning that users can create and execute files from the folder and bypassing AppLocker 😱

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    17. sij

    I spent some time learning about blockdlls and parent process spoofing from and . Using a recent sample from SubTee, I modified it to spoof the parent process and inject x64 shellcode from a dll on UNC into hidden iexplore.exe.

    Poništi
  7. proslijedio/la je Tweet
    19. sij

    command-line MSBuild.exe detection's got your down? How about MSBuild without MSBuild.exe?

    Poništi
  8. proslijedio/la je Tweet
    20. sij

    Dear , Putting the private key for a CA blessed certificate in firmware is a bad idea. and I found a couple a couple terrible things.

    Poništi
  9. proslijedio/la je Tweet
    20. sij

    Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:

    Poništi
  10. proslijedio/la je Tweet
    20. sij

    my new current project. automatic ropchain generation!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    13. pro 2019.

    And... Wafw00f 2.0 is out. Major rewrite and so many new detections. Thanks for all the hard work!

    Poništi
  12. proslijedio/la je Tweet
    15. pro 2019.

    Are you ready to takeover subdomains? ;) I have developed a tool to scan subdomain takeover vulnerabilities. Found 300+ vulnerable subdomains on Twitter,Yahoo,Pinterest,Periscope,Spotify,HarvardUni,StanfordUni,BerkeleyUni,YaleUni,PrincetonUni... Its free!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    14. pro 2019.

    Pretty good workshop, describing Windows drivers DSE bypassing! It allows run LiveCloudKd with own hvmm.sys driver on Windows Server 2019 with Dec 2019 patches and Secure Boot enabled.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    16. pro 2019.

    My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: I really enjoyed my last 3 years working on it, also due to my great colleagues, especially , , and

    Poništi
  15. proslijedio/la je Tweet
    15. pro 2019.

    So I translated to myself 's article on Exploitation and the internals of Windows 10 RS5 (Userspace), and Saar suggested I'll upload it for everyone, so why not :) I hope this helps as it helped me, thank you Saar!

    Poništi
  16. proslijedio/la je Tweet
    4. ožu 2019.

    Want to learn how to do well in your ? Here's a guide from

    Poništi
  17. proslijedio/la je Tweet
    1. ožu 2019.

    Need privilege escalation? Have access to SMB and NFS shares? Automate looking for credentials! 1) pip3 install -r requirements.txt sudo apt-get install cifs-utils 2) git clone 3) python3 -p all -w -v -H hosts.lst -C creds.lst

    Poništi
  18. proslijedio/la je Tweet
    21. velj 2019.

    C# (CL +AMSI bypass), here the quick&dirty code:

    Poništi
  19. proslijedio/la je Tweet
    25. velj 2019.

    Reverse shell in Node.JS

    Poništi
  20. proslijedio/la je Tweet
    28. velj 2019.
    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    28. velj 2019.

    Want to learn how to do well in your ? Here's a guide from

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·