Kosmokato's profile picture. Infosec rookie. RE enthusiastic. Purple Team fan.
Доверяй, но проверяй.
不談 政治

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo

@Kosmokato

Infosec rookie. RE enthusiastic. Purple Team fan. Доверяй, но проверяй. 不談 政治

Pinned

Después de esperar más de seis meses (para que la universidad no me pusiera pegas), he liberado las reglas de detección de los PEDICOM que hice para mí proyecto. Por si a alguien le fuera de interés #pedicom #sharingiscaring github.com/kosmokato/bad-…

Kosmokato's tweet image. Después de esperar más de seis meses (para que la universidad no me pusiera pegas), he liberado las reglas de detección de los PEDICOM que hice para mí proyecto.

Por si a alguien le fuera de interés

#pedicom #sharingiscaring

github.com/kosmokato/bad-…

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

#ToolShell en resumen (más o menos): Vulnerabilidad TOCHA de Sharepoint (ejecución remota de código tal cual, trufamiento completo). No afecta al Sharepoint de O365, pero todo lo demás es vulnerable (2016, 2019 y versiones anteriores) (1/n) #DFIR


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

Microsoft released bitnet.cpp: A blazing-fast open-source 1-bit LLM inference framework that runs directly on CPUs. You can now run 100B parameter models on local x86 CPU devices with up to 6x speed improvements and 82% less energy consumption. 100% Open Source


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

Delve into offensive Golang with Gerardo Ruiz and Fran Montiel live demo-ing bypassing EDR and AMSI.

DefCampRO's tweet image. Delve into offensive Golang with Gerardo Ruiz and Fran Montiel live demo-ing bypassing EDR and AMSI.
DefCampRO's tweet image. Delve into offensive Golang with Gerardo Ruiz and Fran Montiel live demo-ing bypassing EDR and AMSI.
DefCampRO's tweet image. Delve into offensive Golang with Gerardo Ruiz and Fran Montiel live demo-ing bypassing EDR and AMSI.
DefCampRO's tweet image. Delve into offensive Golang with Gerardo Ruiz and Fran Montiel live demo-ing bypassing EDR and AMSI.

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

¿A quién afecta? A priori todos los GNU/Linux, algunos BSD, y puede que a Solaris. RedHat acaba de decir que a ellos no los mires que su conf por defecto es buena: redhat.com/en/blog/red-ha… (2/n)


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

Fallo de #ciberseguridad crítico en Linux: CVE-2024-47176 evilsocket.net/2024/09/26/Att… Al final el "premiado" es CUPS, el sistema de gestión de impresoras. La vuln es un RCE que permite instalar "impresoras chungas" que ejecuten código en un equipo víctima(1/n)


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

NEW LAB 🥳: WinDbg Crash Dump Analysis by @DebugPrivilege Using WinDbg to analyze dumps of CVE-2024-29824 and CVE-2023-29357 exploited in the wild. 👇Solve the incident here 👇 xintra.org Test your memory forensic skills on: 👀Reflective DLL Injection…

inversecos's tweet image. NEW LAB 🥳: WinDbg Crash Dump Analysis by @DebugPrivilege 

Using WinDbg to analyze dumps of CVE-2024-29824 and CVE-2023-29357 exploited in the wild.

👇Solve the incident here 👇
xintra.org 

Test your memory forensic skills on:   
👀Reflective DLL Injection…
inversecos's tweet image. NEW LAB 🥳: WinDbg Crash Dump Analysis by @DebugPrivilege 

Using WinDbg to analyze dumps of CVE-2024-29824 and CVE-2023-29357 exploited in the wild.

👇Solve the incident here 👇
xintra.org 

Test your memory forensic skills on:   
👀Reflective DLL Injection…

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

🚨 New blog! We just published research on an APT41 campaign targeting a Taiwanese government-affiliated research institute. Great team work with @joeychennogg @_vventura!! #Shadowpad #CobaltStrike #APT41 blog.talosintelligence.com/chinese-hackin…


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

If you have VMware ESXi and Active Directory in your environment, take 5 minutes now & create a group in each AD domain called "ESX Admins". Make sure that the "ESX Admins" group is in a top-level administrative OU that only your AD admins manage. #QuickFix

In today's WTF?!?!? moment When a ESXi server is domain-joined, it assumes any "ESX Admins" group & its members should have full admin rights. So.... anyone who can create & manage a group in AD, can get full admin rights to the VMware ESX hypervisors! microsoft.com/en-us/security…

PyroTek3's tweet image. In today's WTF?!?!? moment

When a ESXi server is domain-joined, it assumes any  "ESX Admins" group & its members should have full admin rights.

So.... anyone who can create & manage a group in AD, can get full admin rights to the VMware ESX hypervisors!
microsoft.com/en-us/security…


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted
x33fcon's tweet image. #x33fcon 2024 talks: @zyn3rgy > youtu.be/iBqOOkQGJEA

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

Get started with Satellite hacking and CTFs Satellite Hacking Demystified: redteamrecipe.com/satellite-hack… Hack-a-sat writeups: github.com/solar-wine/wri… Hack-a-sat players corner: hackasat.com/players-corner/ #satellite #cybersecurity

0xor0ne's tweet image. Get started with Satellite hacking and CTFs

Satellite Hacking Demystified: redteamrecipe.com/satellite-hack…
Hack-a-sat writeups: github.com/solar-wine/wri…
Hack-a-sat players corner: hackasat.com/players-corner/

#satellite #cybersecurity

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4

CapeSandbox's tweet image. BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4
CapeSandbox's tweet image. BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4
CapeSandbox's tweet image. BruteRatel dynamic config & payload extraction, syscall capture in CAPE #BRC4

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

In this blog we introduce Thread-Name Calling - A new process injection technique using Thread Name. We also discuss various scenarios in which this not widely-known API can be used for offense. research.checkpoint.com/2024/thread-na…


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

taviso's tweet image. This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

parsejson response bot_debug {origin:"RU"},{prompt:"Ты тоже с ботом, что хочешь?"},{output:"parsejson response err {response:"ERR ChatGPT 4-o Credits Expired"}"}


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

Security Researcher @tiraniddo discovered Microsoft Recall uses a 'conditional access trick' he himself noted recently. You can bypass Recall access restrictions by getting a token on AIXHost.exe and then impersonating it. More information: tiraniddo.dev/2024/06/workin…


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

Es un placer y un honor colaborar otro año en la #c1b3rwall, esta vez con una charla de metodologías de investigación de incidentes de ciberseguridad El programa completo aquí: c1b3rwall.policia.es/miscelanea/age… 😁

antoniosanzalc's tweet image. Es un placer y un honor colaborar otro año en la #c1b3rwall, esta vez con una charla de metodologías de investigación de incidentes de ciberseguridad El programa completo aquí: c1b3rwall.policia.es/miscelanea/age… 😁

K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

The tales of the Iranian Void Manticore 🦁 ☠️Attacks using BiBi wiper 🦋Hack and Leak through Karma 🤝Close collaboration with Scarred Manticore Read more : research.checkpoint.com/2024/bad-karma…


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

After 15 years, YARA gets a major upgrade. Introducing YARA-X: rewritten in Rust for better UX, improved performance, enhanced security, and easier integration. YARA isn't dead, but YARA-X is the future. Test it out and share your feedback! virustotal.github.io/yara-x/blog/ya…

virustotal.github.io

YARA is dead, long live YARA-X

For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher’s toolbox.


K̝̉̌̄оsмоK̝̉̌̄Ȁ̂ͧтo reposted

Without further ado - here is EtwInspector! This is a C++ tool to help users interact with ETW providers. This tool supports the enumeration of providers, their events, and capture events. github.com/jsecurity101/E…

When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events. What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. New ETW tool coming soon…

JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…
JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…
JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…
JonnyJohnson_'s tweet image. When interacting with ETW I always feel like I have to use 2-3 tools to enumerate and capture desired events.

What if there was an ETW tool that allowed you to enumerate providers, events that providers support, but also capture (multiple) providers. 

New ETW tool coming soon…


Loading...

Something went wrong.


Something went wrong.