Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ptrpieter
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ptrpieter
-
Pieter Ceelen proslijedio/la je Tweet
Video recording of my presentation with
@ptrpieter at Black Hat Asia 2019 is online. MS Office in Wonderland: 50 minutes of offensive tradecraft with Word and Excel. Exploiting fields, Power Query, VBA stomping, Excel4 macros, AMSI bypasses and more fun.https://youtu.be/9ULzZA70DzgHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lol, another SLK/XML macro warning bypass. Recommendation do NOT “Disable all macros without notification” on excel4mac, this setting enabled direct execution of any Xlm macro.. Nice find
@wdormannhttps://kb.cert.org/vuls/id/125336/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pieter Ceelen proslijedio/la je Tweet
Evil Clippy: our new tool for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse many macro security analysis tools. Read our blog post for details: https://outflank.nl/blog/2019/05/05/evil-clippy-ms-office-maldoc-assistant/ …pic.twitter.com/HbY8uOQYTS
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New blog: Bypassing AMSI for VBA https://outflank.nl/blog/2019/04/17/bypassing-amsi-for-vba/ … No need for complex stuff / memory patching, you can circumvent this AMSI implementation in many other ways
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mailman just delivered inspiration for research: an old school book on Word. Gotta love legacy, 1993 here I come :-)pic.twitter.com/zY74C4oRKt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pieter Ceelen proslijedio/la je Tweet
More info on hiding HTTP requests, this time using Pipelining:https://digi.ninja/blog/pipelining.php …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New blog on Word Field abuse, https://outflank.nl/blog/2019/04/02/ms-word-field-abuse/ …. Contains full details on 'arbitrary file read' and 'credential popup' in Microsoft Word (CVE-2019-0540 and CVE-2019-0561) as reported by
@StanHacked and me and presented at#BHasiaHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Slides and recording of 'MS Office file format sorcery'
@stanhacked and I gave at@WEareTROOPERS#TR19 are live. Lots of offensive Office tricks; hiding macros from AV, AMSI bypasses, persistence and much more... Video: https://www.youtube.com/watch?v=iXvvQ5XML7g … slides:https://github.com/outflanknl/Presentations/blob/master/Troopers19_MS_Office_file_format_sorcery.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pieter Ceelen proslijedio/la je Tweet
Slides from the BlackHat presentation of
@ptrpieter and myself titled “Office in Wonderland” are now available at https://i.blackhat.com/asia-19/Thu-March-28/bh-asia-Hegt-MS-Office-in-Wonderland.pdf …. This deck is packed with offensive MS Office tradecraft, abusing “features” in Word and Excel.#BHASIAHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just finished my Blackhat Asia talk with
@StanHacked! We disclosed why Microsoft introduced a new security warning to mitigate our "Word field" trickery (CVE-2019-0540 and CVE-2019-0561) and a lot other cool stuff.pic.twitter.com/xKzO1oQSnq
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pieter Ceelen proslijedio/la je Tweet
Lateral movement via ExecuteExcel4Macro and DCOM. Big plus: this method allows for direct shellcode injection into Excel.exe on the remote host. Moreover, AMSI is completely blind to XLM. I just released PowerShell and Cobalt Strike implementations at https://github.com/outflanknl/Excel4-DCOM ….
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pieter Ceelen proslijedio/la je Tweet
New blog! Abusing Exchange: One API call away from Domain Admin. From any user with a mailbox to Domain Admin. Probably affects the majority of orgs using AD and Exchange.https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
October has been a heavy research month. Lots of cool office tricks and attacks discovered. Just submitted a talk for troopers with
@StanHacked. Next up: finalize some blogs on older stuff, submit newer stuff to MS securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Full writeup and explanation of code athttps://outflank.nl/blog/2018/10/12/sylk-xlm-code-execution-on-office-2011-for-mac/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Still having Office 2011 for MacOS installed? Don't open CSV's anymore. Attached a 400 bytes CSV file that gives 0 warnings, can write to an arbitrary (persistence) location (Sylk+XLM named CSV). Who though you couldn't weaponize CSV files...pic.twitter.com/8zpFyXIBsF
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We've reported the issue to Microsoft, as product is EOL no patch will be created. And all because I mis clicked a document on my train ride home
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New Office Magic from
@stanhacked and me. Opening Sylk files + XLM Macro on Office 2011 for Mac shows no Macro warning, no protected mode. All Macro's are directly executed! Full details at https://outflank.nl/blog/2018/10/12/sylk-xlm-code-execution-on-office-2011-for-mac/ …. Attack may even work when both office 2016 + 2011 are installedPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The Sylk file that
@stanhacked just shared can also be renamed to .csv. Requires one additional click, but hey. We have just weaponized CSV!pic.twitter.com/kPdMXIIxmB
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ever seen a phishing campaign that uses macros and DocX files? Come to the Office Magic Show 12:00
@Derbycon, where@stanhacked and I will show how its done and a lot of other cool tricks.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.