b_sendpacket's profile picture. Security Researcher | Malware Analysis & Reverse Engineering | https://infosec.exchange/@0x1c

twentyeight

@b_sendpacket

Security Researcher | Malware Analysis & Reverse Engineering | https://infosec.exchange/@0x1c

twentyeight reposted

The slides from our @reconmtl talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolodev), are now online! Slides: synthesis.to/presentations/… Plugin: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. The slides from our @reconmtl talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolodev), are now online!

Slides: synthesis.to/presentations/…

Plugin: github.com/mrphrazer/obfu…

Did you know that WinDbg has a `dx` command that lets you define variables, cast memory, and walk structures? Here's some absolutely cursed code I wrote today to walk the PEB, locate ntdll.dll, and dump its exports - using only `dx`!

b_sendpacket's tweet image. Did you know that WinDbg has a `dx` command that lets you define variables, cast memory, and walk structures?

Here's some absolutely cursed code I wrote today to walk the PEB, locate ntdll.dll, and dump its exports - using only `dx`!

twentyeight reposted

After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering. As such, I built a #Ghidra Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings). Blog:👉blog.washi.dev/posts/recoveri…

washi_dev's tweet image. After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering.

As such, I built a #Ghidra Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings).

Blog:👉blog.washi.dev/posts/recoveri…

twentyeight reposted

How Component Object Model (COM) works. #ThreatHunting #DFIR #Windows #Microsoft

ACEResponder's tweet image. How Component Object Model (COM) works.

#ThreatHunting #DFIR #Windows #Microsoft

twentyeight reposted

victim does WHAT

AzakaSekai_'s tweet image. victim does WHAT

2024-05-14 (Tuesday): #DarkGate activity. HTML file asks victim to paste script into a run window. Indicators available at bit.ly/4bjvMAC #TimelyThreatIntel #Unit42ThreatIntel #Wireshark #InfectionTraffic

Unit42_Intel's tweet image. 2024-05-14 (Tuesday): #DarkGate activity. HTML file asks victim to paste script into a run window. Indicators available at bit.ly/4bjvMAC

#TimelyThreatIntel #Unit42ThreatIntel #Wireshark #InfectionTraffic
Unit42_Intel's tweet image. 2024-05-14 (Tuesday): #DarkGate activity. HTML file asks victim to paste script into a run window. Indicators available at bit.ly/4bjvMAC

#TimelyThreatIntel #Unit42ThreatIntel #Wireshark #InfectionTraffic
Unit42_Intel's tweet image. 2024-05-14 (Tuesday): #DarkGate activity. HTML file asks victim to paste script into a run window. Indicators available at bit.ly/4bjvMAC

#TimelyThreatIntel #Unit42ThreatIntel #Wireshark #InfectionTraffic
Unit42_Intel's tweet image. 2024-05-14 (Tuesday): #DarkGate activity. HTML file asks victim to paste script into a run window. Indicators available at bit.ly/4bjvMAC

#TimelyThreatIntel #Unit42ThreatIntel #Wireshark #InfectionTraffic


twentyeight reposted
0x6D6172636F's tweet image.

twentyeight reposted

What a great opportunity for a #BinaryRefinery showcase! xt exe | xt | push [ | bat | carve -d string | iffs = | b64 | pop k i | carve -sd b64 | aes --iv=eat:i eat:k | zl | peek -mm ] 📌 github.com/binref/refiner…

huettenhain's tweet image. What a great opportunity for a #BinaryRefinery showcase!

xt exe | xt | push [
  | bat
  | carve -d string
  | iffs =
  | b64
  | pop k i
  | carve -sd b64
  | aes --iv=eat:i eat:k
  | zl
  | peek -mm ]

📌 github.com/binref/refiner…

In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat. youtu.be/3MVu0s5ofxE

jstrosch's tweet image. In this video we'll explore #OneNote process activity using #procmon/Process Hacker. Then use #onedump to fully unravel the attack chain. We'll also investigate some anti-analysis in a .NET dropper and decrypt the final payload, which leads to #AsyncRat.

youtu.be/3MVu0s5ofxE


twentyeight reposted

Huge congrats to @b_sendpacket and @Autonomatom for being the first students to finish the Introduction to Malware Binary Triage (IMBT) course! They have now received their certificates of completion 🥳


United States Trends

Loading...

Something went wrong.


Something went wrong.