ShellStorm

@bhohenadel

Computer security enthusiast and martial artist. I like to find holes in defenses and exploit them. OSCP, OSCE, CISSP.

Guelph
Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @bhohenadel

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bhohenadel

  1. proslijedio/la je Tweet
    prije 18 sati

    Stay positive Lolbins... not! rundll32 advpack.dll, RegisterOCX calc.exe rundll32 advpack.dll, #12 calc.exe rundll32 advpack.dll, #+12 calc.exe rundll32 advpack.dll, #-4294967284 calc.exe

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  5. proslijedio/la je Tweet
    3. velj
    Poništi
  6. proslijedio/la je Tweet
    4. velj
    Poništi
  7. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  10. 1. velj

    Currently halfway through this with my daughter. It's surprisingly exciting. The production quality is surprisingly good.

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    31. sij

    Wrote a post on how to use GadgetToJScript with Covenant & Donut Thanks to for the answering my queries and helping me while exploring tool 🙏

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    How to hack yourself admin rights on any Autopilot installed Windows 10 - aka The Return of the Shift+F10!

    Poništi
  14. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    31. sij

    The code to execute in JS via "System.Runtime.InteropServices.RegistrationServices" here: You need to expose a static method public static void UnRegisterClass(string key) And of course you need an assembly object :) Cheers

    Poništi
  16. proslijedio/la je Tweet
    31. sij

    👋 - Taking a minute to introduce myself alongside the brilliant & as your DerBates moderator team😀What are DerBates? A place where *all* are welcome to join & discuss a provocative topic related to InfoSec. The aim is to foster discussion ...

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    30. sij
    Poništi
  18. proslijedio/la je Tweet
    29. sij

    Popping a shell on Splunk If someone subverted a forwarder or splunkd or had a shell running on your search head, would you know? Are you baselining your sec infra?

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  20. proslijedio/la je Tweet
    29. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·