IncognitoSearch's profile picture.

Incognito

@IncognitoSearch

Incognito reposted

New on the blog: @michaelbarclay_ revives registry-based tradecraft using a telemetry gap in the hive restoration process. The blog also includes PoC code and detection guidance. 📃 preludesecurity.com/blog/rehabilit…


Incognito reposted

Implemented a number of persistence methods in a BOF. Nothing ground breaking but might be useful to some. github.com/leftp/RegPersi…


Incognito reposted

Inspired by @TrustedSec article on remotely starting Windows services, enjoy our python unauthenticated EFS trigger developed with @Hypnoze57 Enjoy! github.com/Hypnoze57/rpc2…


Incognito reposted

Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. research.google/resources/data… Dataset is available for download at: ▪️console.cloud.google.com/storage/browse… [Login required] ▪️gs://net-ntlmv1-tables

sekurlsa_pw's tweet image. Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. 
research.google/resources/data…
Dataset is available for download at:
▪️console.cloud.google.com/storage/browse… [Login required]
▪️gs://net-ntlmv1-tables

Incognito reposted

Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm


Incognito reposted

Remotely enable the EFS service for Win11 systems? No problem with rpcping. Just worked for me from remote with a low privileged user. 🧐

ShitSecure's tweet image. Remotely enable the EFS service for Win11 systems? No problem with rpcping. Just worked for me from remote with a low privileged user. 🧐
ShitSecure's tweet image. Remotely enable the EFS service for Win11 systems? No problem with rpcping. Just worked for me from remote with a low privileged user. 🧐

Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services. In our new blog, @freefirex2 breaks down the types of service triggers that exist and how they can be activated with little to no code required. trustedsec.com/blog/theres-mo…



Incognito reposted

Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Tit…


Incognito reposted

What I learned today. Nice - I wasn't aware of the InstallProduct method from PowerShell to fetch a remotely hosted MSI file and subsequently install it. Invoke-WebRequest is one of the more popular methods, at least in our incident response cases. As always, there is more!…

malmoeb's tweet image. What I learned today. Nice - I wasn't aware of the InstallProduct method from PowerShell to fetch a remotely hosted MSI file and subsequently install it.

Invoke-WebRequest is one of the more popular methods, at least in our incident response cases.

As always, there is more!…

Incognito reposted

Whenever I see people say the red teaming should only use TI, it seems unusual because if you're mature enough to need a red team, your EDR vendor will likely pick up on many currently known threats in the public eye. At that point, you're stuck modifying things away from what's…


Incognito reposted

This is so much! 🔥🔥😎 Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth is done which could be relayed to LDAP without Signing enabled. Or relayed to ADCS for a certificate. github.com/warpnet/MS-RPC…


Incognito reposted

Since several people already asked: the slides from @fabian_bader and myself for @WEareTROOPERS are available! "Finding Entra ID CA bypasses-the structured way". We talked about FOCI, BroCI, CA bypasses, scopes and getting tons of tokens. Check it at dirkjanm.io/talks/


Incognito reposted

[BLOG] Integrating Tradecraft Garden PIC loaders into Cobalt Strike rastamouse.me/harvesting-the…


Incognito reposted

While posted jokingly, "Read Teaming" is very much is the reality of the current state of Red Teaming. If you want to learn about why this approach is both highly effective and gaining popularity, check out: deceptiq.com/blog/rise-of-r…

deceptiq.com

Read Teaming: How Modern Attackers Bypass EDR & Security Tools | Deceptiq

Discover why 'Read Teaming' attacks bypass traditional security. Learn how attackers use your own documentation against you and why deception is critical.

If you can motivate yourself to spend 8+ hours a day, 5 days a week to read through: - Atlassian - Jira - Slack - GitHub - Other internal SaaS applications without guaranteed results, you'll be an amazing red teamer.



Incognito reposted

WMI Research and Lateral Movement blog.fndsec.net/2024/09/11/wmi… TLDR: In this article, we will go over the WMI technology, the potential attack vectors it opens, some detection pitfalls (from an attacker’s perspective), and how we can enumerate the technology for useful capabilities.…

5mukx's tweet image. WMI Research and Lateral Movement

blog.fndsec.net/2024/09/11/wmi…

TLDR: In this article, we will go over the WMI technology, the potential attack vectors it opens, some detection pitfalls (from an attacker’s perspective), and how we can enumerate the technology for useful capabilities.…

Incognito reposted

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to @d_tranman for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki


Incognito reposted

KrbRelayEx-RPC tool is out! 🎉 Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;) github.com/decoder-it/Krb…

decoder_it's tweet image. KrbRelayEx-RPC tool is out! 🎉
Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;) 
github.com/decoder-it/Krb…

Incognito reposted

The detailed version of our #WorstFit attack is available now! 🔥 Check it out! 👉 blog.orange.tw/posts/2025-01-… cc: @_splitline_

Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! 🐈‍



Incognito reposted

Worst fit is a Windows attack surface that exploits the Best-Fit charset conversion feature! This attack provides path traversal, argument injection, and RCE in numerous well known applications! Links in next post👇

usetraceix's tweet image. Worst fit is a Windows attack surface that exploits the Best-Fit charset conversion feature!

This attack provides path traversal, argument injection, and RCE in numerous well known applications!

Links in next post👇

Incognito reposted

every time someone wants help with getting a job in cs and i recommend them a plan or a course they always end up not doing it i've had exactly 1 friend actually follow through and now he works at a large bank you need to do the hard things. the industry is tough. i find that…


Loading...

Something went wrong.


Something went wrong.