RandomDhiraj's profile picture. Learning & Fuzzing! (https://www.fuzzing.at)

Dhiraj

@RandomDhiraj

Learning & Fuzzing! (https://www.fuzzing.at)

Happy Friday! I just published XRayC2 a command & control framework that uses AWS X-Ray as a communication channel. medium.com/@dhiraj_mishra… #infosec #redteam


Dhiraj 님이 재게시함

🛠️ A serverless command & control (C2) framework 🗓️ Leverages Google Calendar APIs, as a covert communication channel between operators and a compromised system github.com/deriv-security…


I just published MeetC2 - A serverless command & control (C2) framework that leverages Google Calendar APIs, as a communication channel. github.com/deriv-security… #infosec #redteam


Just thought of sharing. YubiKey's OATH app lets you name accounts anything including base64 files, turning into a tiny file storage. #infosec #redteam

RandomDhiraj's tweet image. Just thought of sharing. YubiKey's OATH app lets you name accounts anything including base64 files, turning into a tiny file storage.
#infosec #redteam

Yesterday at DEFCON 33, we participated in the Bio Hacking Village and conducted security assessment of PET/CT imaging systems. Successfully identifying three vulnerabilities, which were responsibly reported to the vendor. #infosec #defcon33

RandomDhiraj's tweet image. Yesterday at DEFCON 33, we participated in the Bio Hacking Village and conducted security assessment of PET/CT imaging systems. Successfully identifying three vulnerabilities, which were responsibly reported to the vendor.
#infosec #defcon33
RandomDhiraj's tweet image. Yesterday at DEFCON 33, we participated in the Bio Hacking Village and conducted security assessment of PET/CT imaging systems. Successfully identifying three vulnerabilities, which were responsibly reported to the vendor.
#infosec #defcon33

Alright! I'll be presenting my tool "SmuggleShield" at BlackHat USA, see you there if you are around.(github.com/RootUp/Smuggle…) #infosec #redteam #blueteam

RandomDhiraj's tweet image. Alright! I'll be presenting my tool "SmuggleShield" at BlackHat USA, see you there if you are around.(github.com/RootUp/Smuggle…)
#infosec #redteam #blueteam

Dhiraj 님이 재게시함

Offensive Phishing Operations Update 2 Released: maldevacademy.com/phishing-cours… - HTML Smuggling Strategies - Analyzing and Evading SmuggleShield (S/O @RandomDhiraj) - Integrating Anti-Bot With HTML Smuggling - SVG Smuggling - WebAssembly Smuggling


Dhiraj 님이 재게시함

The next update for the Offensive Phishing Operations course will be heavily focused on HTML Smuggling and will be going up against @RandomDhiraj's awesome SmuggleShield. We'll also be demonstrating a module that combines anti-bot capabilities with HTML smuggling. More info:…


Stoked! Our (@r00treaver) work on SVG Smuggling is now part of MITRE ATT&CK (T1027.017)! attack.mitre.org/techniques/T10… #infosec #redteam

RandomDhiraj's tweet image. Stoked! Our (@r00treaver) work on SVG Smuggling is now part of MITRE ATT&CK (T1027.017)!
attack.mitre.org/techniques/T10…
#infosec #redteam

Dhiraj 님이 재게시함

Never trust a favicon at face value. 👀 @RandomDhiraj demonstrates how attackers can hide malicious files inside .ico icons by exploiting their dual directory structure — allowing payloads to slip past filters in a stealth move similar to HTML smuggling.

Just learned a neat way of hiding file within favicon (.ico). You can manipulate the dual directory entry structure and smuggle any file type in it. Here is a quick raw script I put together for testing.(github.com/RootUp/Persona…) #infosec #redteam

RandomDhiraj's tweet image. Just learned a neat way of hiding file within favicon (.ico). You can manipulate the dual directory entry structure and smuggle any file type in it. Here is a quick raw script I put together for testing.(github.com/RootUp/Persona…)
#infosec #redteam
RandomDhiraj's tweet image. Just learned a neat way of hiding file within favicon (.ico). You can manipulate the dual directory entry structure and smuggle any file type in it. Here is a quick raw script I put together for testing.(github.com/RootUp/Persona…)
#infosec #redteam


Loading...

Something went wrong.


Something went wrong.