Mohamed El Azaar

@med0x2e

Redteamer, used to be a Java|Angular Developer, Security & Manga/Anime enthusiast

Vrijeme pridruživanja: ožujak 2013.

Tweetovi

Blokirali ste korisnika/cu @med0x2e

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @med0x2e

  1. Prikvačeni tweet
    7. lis 2019.

    A signature based bypass for AMSI using GadgetToJScript; a tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS based scripts.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    Wrote a post on how to use GadgetToJScript with Covenant & Donut Thanks to for the answering my queries and helping me while exploring tool 🙏

    Poništi
  4. proslijedio/la je Tweet

    That epic Microsoft moment❤️ Recently worked on and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    12. sij
    Poništi
  6. proslijedio/la je Tweet

    "Information is power. But like all power, there are those who want to keep it for themselves." Aaron Schwartz would be 33 by now.

    Poništi
  7. proslijedio/la je Tweet
    4. stu 2019.

    New blog post looking at how Cobalt Strike’s “blockdlls” command works, how to recreate it in our own payloads, and a quick look at Arbitrary Code Guard.

    Poništi
  8. proslijedio/la je Tweet
    26. lis 2019.

    Quick POC to spawn a process with PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON using VBA.

    Poništi
  9. 31. lis 2019.

    If you've ever come across an IOS application built with Kony & Frida fu doesn't help in bypassing SSL pinning; add below entries to info.plist: <key>allowselfsignedcertificate</key> <true/> <key>allowbundledonly</key> <string>NO</string> package -> sign -> deploy -> have fun.

    Poništi
  10. proslijedio/la je Tweet
    30. lis 2019.

    Our new blog post on abusing the SYLK file format. This 1980s file type can host macros in modern versions of MS Office / Excel without hitting protected mode. Post includes recommendations for mitigation (note: active abuse in the wild).

    Poništi
  11. 27. lis 2019.

    To be specific, 10 lines of code to inject shellcode into the current running process using a classic CreateThread based shellcode injection method.

    Prikaži ovu nit
    Poništi
  12. 27. lis 2019.

    Calling win32 API from jscript/vbscript using ExecuteExcel4Macro in less than 10 lines of JS code. 0/56 on VT and not getting flagged by WinDefender/AMSI for the moment. A simple script to automate the process; & credits:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    18. tra 2019.

    My first blog on abusing the Service Control Manager and DLL hijacks for lateral movement. I cover methodology, detections and proof of concept code. Thanks to / for all their detection contributions!

    Poništi
  14. 25. lis 2019.

    Added VBA support (-e for hex or b64 VBA gadgets encoding)

    Poništi
  15. proslijedio/la je Tweet
    20. lis 2019.

    PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON can be your friend

    Poništi
  16. 19. lis 2019.

    Running Mimikatz using GadgetToJScript from JS or VBS ‘cscript mimi.js privilege::debug < safe.txt’ Steps:

    Poništi
  17. proslijedio/la je Tweet
    15. lis 2019.

    Releasing my bloodhound helper tool, cypheroth. It helps save time you would have spent running bloodhound cypher queries in the neo4j web interface by dumping all the important info out to spreadsheets. Comes with a great set of starting queries.

    Poništi
  18. proslijedio/la je Tweet
    11. lis 2019.

    Don't like AV on the box? Hook the admin password prompt with Frida and disable it as regular user 🙃

    Poništi
  19. proslijedio/la je Tweet
    10. lis 2019.

    Combine ()'s SILENTTRINITY with ()'s GadgetToJScript. We can use js/vbs as a stager for SILENTTRINITY.

    Poništi
  20. proslijedio/la je Tweet
    3. lis 2019.

    I don't remember who posted this on Twitter a few years ago, but whoever you are: you have improved every night I've spent in a hotel since.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·