HoangSpecial

@SpecialHoang

Security Researcher | Pentester | Red Team | APT69

Vrijeme pridruživanja: prosinac 2018.

Tweetovi

Blokirali ste korisnika/cu @SpecialHoang

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SpecialHoang

  1. 14. stu 2019.

    Thanks to for releasing their write up on CVE-2019-1405 and CVE-2019-1322. I figured it is time for me to learn some COM stuff so I whip up a PoC. Source: . Video: Thanks to and

    Poništi
  2. 29. lis 2019.

    I don't RT much unless it is really good or it is from . In this case, was able to fulfill both criteria. Looking forward to seeing this being used in every red team C2!

    Poništi
  3. proslijedio/la je Tweet
    8. ruj 2019.

    Thanks to all of our crew for the tireless work this weekend. New friends, late nights, and a new found hatred of barcodes. 🥇🏆💻

    , , i još njih 7
    Poništi
  4. 8. ruj 2019.

    We did it . Thank you to everyone for the carrying and the humbling experience. And thank you to for hosting!

    Poništi
  5. proslijedio/la je Tweet
    28. srp 2019.

    Pretty sure I’ve read this plot line in sci-fi

    Prikaži ovu nit
    Poništi
  6. 22. srp 2019.

    After 10 days of minimal sleep and thank to for the majority of the work, here we have it - . I've learned so much along the way and I am looking forward to the RCE version.

    Poništi
  7. 28. lip 2019.

    Weaponizing CVE-2018-19321 for privilege escalation and potentially EDR bypass. Paying my monthly blog tax. "Gigabyte responded that, according to its PM and engineers, its products are not affected by the reported vulnerabilities."

    Poništi
  8. 19. lip 2019.

    I got a crazy idea to test on EDRs. Now that I am not working, I have no EDR to work with. Send help pls. Or name me a good EDR that is being used (a lot) that i can legally purchase at a reasonable price. Thanks.

    Poništi
  9. 21. svi 2019.

    I always looked up to one of my ex-manager due to his OSCE and OSEE. Now that I'm here, I guess it is time time for me to pursuit the OSEE next!

    Poništi
  10. 14. svi 2019.

    OSCE tmr so I figured I finish this month long write up today. Hooking Wow64 Heaven's Gate!

    Poništi
  11. 12. svi 2019.
    Poništi
  12. 11. tra 2019.

    Follow me on my journey to reverse and bypass some new sneaky anticheat in a widely popular game. Rito, please no sue. PS: I feel like I only use twitter to promote my blog lol.

    Poništi
  13. proslijedio/la je Tweet
    23. ožu 2019.

    As promised, "Defeating Userland Hooks (ft. Bitdefender)". Apologies for the rough explanations!

    Poništi
  14. 4. velj 2019.

    Disable Protected Process Light (PPL) protection with WindowsD. In case you are going against an environment/AV product that enable PPL on certain processes.

    Poništi
  15. 18. sij 2019.

    ProcDump and Mimikatz getting blocked by EDR? Check out my new blog regarding how to bypass them and source code is included!

    Poništi
  16. 13. sij 2019.

    Ever want to hook functions stealthily? Check out my new blog! Vectored Exception Handling Hooking!

    Poništi
  17. 9. sij 2019.

    New Blog post about Outflank's Excel 4.0 Macro!

    Poništi
  18. proslijedio/la je Tweet
    8. pro 2018.

    Wanted to call api directly from using w/o declaring the signature 1st Call : Application.ExecuteExcel4Macro "call(""shell32"", ""ShellExecuteA"", ""JJCCCCJ"", 0, ""open"",""calc"", """", """", 5)" JJCCCCJ return/param1/.../param6 J int C string

    Poništi
  19. 17. pro 2018.

    COMHijacking base source code! Getting that persistent without showing up on Autorun! Credit to all the researchers! Source: Gif:

    Poništi
  20. 16. pro 2018.

    Dumping lsass.exe from \Device\PhysicalMemory without needing a handle. Next step is reversing lsass for hash and creds! Thank you to Can Bölük and everyone else that was involved! Blog post and code will be publish later!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·