psylinux's profile picture.

Marcos Azevedo

@psylinux

Marcos Azevedo reposted

It's all about perspective!


Marcos Azevedo reposted

Voltage glitching attack illustrated


Marcos Azevedo reposted

No way, this really works! 🤯 % dig txt dfir.<redacted>.<tld> +short [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [.Forms.MessageBox]::Show('DFIR FTW!','BlueTeam <3')

malmoeb's tweet image. No way, this really works! 🤯

% dig txt dfir.&amp;lt;redacted&amp;gt;.&amp;lt;tld&amp;gt; +short

[System.Reflection.Assembly]::LoadWithPartialName(&apos;System.Windows.Forms&apos;); [.Forms.MessageBox]::Show(&apos;DFIR FTW!&apos;,&apos;BlueTeam &amp;lt;3&apos;)
This post is unavailable.

Marcos Azevedo reposted

"Red Team Local Privilege Escalation - Writable SYSTEM Path Privilege Escalation - Part 1" #pentest #redteam #infosec praetorian.com/blog/red-team-…

CyberWarship's tweet image. &quot;Red Team Local Privilege Escalation - Writable SYSTEM Path Privilege Escalation - Part 1&quot;

#pentest #redteam #infosec
praetorian.com/blog/red-team-…
CyberWarship's tweet image. &quot;Red Team Local Privilege Escalation - Writable SYSTEM Path Privilege Escalation - Part 1&quot;

#pentest #redteam #infosec
praetorian.com/blog/red-team-…
CyberWarship's tweet image. &quot;Red Team Local Privilege Escalation - Writable SYSTEM Path Privilege Escalation - Part 1&quot;

#pentest #redteam #infosec
praetorian.com/blog/red-team-…

Marcos Azevedo reposted

"No-Fix Local Privilege Escalation Using KrbRelay With Shadow Credentials" #pentets #redteam #infosec icyguider.github.io/2022/05/19/NoF…

CyberWarship's tweet image. &quot;No-Fix Local Privilege Escalation Using KrbRelay With Shadow Credentials&quot;

#pentets #redteam #infosec
icyguider.github.io/2022/05/19/NoF…
CyberWarship's tweet image. &quot;No-Fix Local Privilege Escalation Using KrbRelay With Shadow Credentials&quot;

#pentets #redteam #infosec
icyguider.github.io/2022/05/19/NoF…
CyberWarship's tweet image. &quot;No-Fix Local Privilege Escalation Using KrbRelay With Shadow Credentials&quot;

#pentets #redteam #infosec
icyguider.github.io/2022/05/19/NoF…

Marcos Azevedo reposted

iPhone Setup for Reversing and Debugging naehrdine.blogspot.com/2022/05/iphone…


Marcos Azevedo reposted

On that note, there are obvious ways of bypassing the mitigation... I would try it on Windows 11 to see if it still worked if I cared enough to install that abomination 😁

tiraniddo's tweet image. On that note, there are obvious ways of bypassing the mitigation... I would try it on Windows 11 to see if it still worked if I cared enough to install that abomination 😁

Something I find interesting is how it's based on a token flag, similar to the child process mitigation. It should follow across impersonation boundaries, however it seems that for that to work both the primary and impersonation tokens need the flag set. Seems like an oversight.



Marcos Azevedo reposted

Coding in Assembly is easy. It's like riding a bike. Except the bike is on fire & you're on fire & everything is on fire & you're in Hell.

sehnaoui's tweet image. Coding in Assembly is easy.
It&apos;s like riding a bike. Except the bike is on fire &amp;amp; you&apos;re on fire &amp;amp; everything is on fire &amp;amp; you&apos;re in Hell.

Marcos Azevedo reposted

I really hated Linux auditing until I found this. Couple it with Laurel and it becomes really easy to ingest these types of logs. Best of all, logging on linux is so rare most adversaries won't see it coming and get caught instantly. Demo here: youtube.com/watch?v=lc1i9h…

ippsec's tweet card. Detecting Exploits - OMIGod (Linux Logging with Auditd)

youtube.com

YouTube

Detecting Exploits - OMIGod (Linux Logging with Auditd)

For #auditd on #Linux you can use my best practice auditd configuration, which is still actively maintained and gets frequent updates via PR If you've found ways to improve it, please provide them as pull request to help everyone else github.com/Neo23x0/auditd

cyb3rops's tweet image. For #auditd on #Linux you can use my best practice auditd configuration, which is still actively maintained and gets frequent updates via PR 

If you&apos;ve found ways to improve it, please provide them as pull request to help everyone else 

github.com/Neo23x0/auditd
cyb3rops's tweet image. For #auditd on #Linux you can use my best practice auditd configuration, which is still actively maintained and gets frequent updates via PR 

If you&apos;ve found ways to improve it, please provide them as pull request to help everyone else 

github.com/Neo23x0/auditd
cyb3rops's tweet image. For #auditd on #Linux you can use my best practice auditd configuration, which is still actively maintained and gets frequent updates via PR 

If you&apos;ve found ways to improve it, please provide them as pull request to help everyone else 

github.com/Neo23x0/auditd


Marcos Azevedo reposted

"Computers are good at following instructions, but not at reading your mind." — Donald Knuth


Marcos Azevedo reposted

Time to leak this old (but gold) Pre-Auth RCE effecting some RedHat products. I had already leaked it some years ago at @AlligatorConBR and in the @h2hconference web training (with my friends @reefbr and @marcioalm). s3.amazonaws.com/files.joaomato…


Marcos Azevedo reposted

CTF Sites : Biggest Collection Of CTF Sites : ctfsites.github.io


Marcos Azevedo reposted

Taking the pain out of C2 Infrastructure (Part 1) 'trying to ease the pain deploying/configuring reverse proxies which should be in front of your C2 platform.' #infosec #pentest #redteam byt3bl33d3r.substack.com/p/taking-the-p…


Marcos Azevedo reposted

Omg this TikTok by @donrestarone explaining log4shell. I really should go to bed.


Marcos Azevedo reposted

Just added support to LDAP Serialized Payloads in the JNDI-Exploit-Kit. This attack path works in *ANY* java version as long the classes used in the Serialized payload are in the application classpath. Do not rely on your java version being up-to-date and update your log4j ASAP!

marcioalm's tweet image. Just added support to LDAP Serialized Payloads in the JNDI-Exploit-Kit. This attack path works in *ANY* java version as long the classes used in the Serialized payload are in the application classpath. Do not rely on your java version being up-to-date and update your log4j ASAP!

Loading...

Something went wrong.


Something went wrong.