Frown – An Instrumentation Challenge : Navigating The Setup And Solutions

0

In the world of cybersecurity and ethical hacking, challenges often serve as valuable training grounds for aspiring professionals. "Frown – An Instrumentation Challenge" is one such intriguing puzzle that promises to test your skills in setting up a complex environment and finding innovative solutions. In this article, we'll delve into the nuts and bolts of this challenge, explore the...

Linux Kernel CVE-2023-6546 : Unveiling A Critical Vulnerability

0

This is a custom exploit which targets Ubuntu 18.04+20.04 LTS/Centos 8/RHEL 8 to attain root privileges via arbitrary kernel code execution on SMP systems. Features Highlights of the significant features include: Bypasses KASLR Bypasses SMAP/SMEP Supports Linux x86_64 Exploit The exploit consists of a binary executable which exploits the vulnerability. File PathDescriptionexploit.cThe C file containing the exploit codesymbolsScripts for generating kernel offsets When the exploit binary is run,...

GraphStrike – Empowering Cobalt Strike With Microsoft Graph API Integration

0

GraphStrike is a suite of tools that enables Cobalt Strike's HTTPS Beacon to use Microsoft Graph API for C2 communications. All Beacon traffic will be transmitted via two files created in the attacker's SharePoint site, and all communications from Beacon will route Why? Threat intelligence has been released regarding several different APTs leveraging Microsoft Graph API and other Microsoft services for offensive...

AI Exploits – Vulnerabilities And Threats In Machine Learning Infrastructure

0

The AI world has a security problem and it's not just in the inputs given to LLMs such as ChatGPT. Based on research done by Protect AI and independent security experts on the Huntr Bug Bounty Platform, there are far more impactful and practical attacks against the tools, libraries and frameworks used to build, train, and deploy machine learning models. Many of these...

EchoDrv – Unveiling Kernel Vulnerabilities In ECHOAC Anti-Cheat Driver echo_driver.sys

0

In the realm of cybersecurity, the relentless battle between attackers and defenders rages on. Enter EchoDrv, a potent tool that exposes the vulnerabilities lurking within the ECHOAC anti-cheat driver, echo_driver.sys. In this article, we delve into the world of EchoDrv, exploring its usage, sponsors, and the credits behind its creation, all while emphasizing the importance of responsible use in...

Ghost – Unmasking The Intricacies Of A Remote Access Trojan

0

Ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution...

LOLSpoof – A Clever Technique To Evade Command Line Detection And Maintain OPSEC

0

LOLSpoof is a an interactive shell program that automatically spoof the command line arguments of the spawned process. Just call your incriminate-looking command line LOLBin (e.g. powershell -w hidden -enc ZwBlAHQALQBwAHIAbwBjAGUA....) and LOLSpoof will ensure that the process creation telemetry appears legitimate and clear. Why Process command line is a very monitored telemetry, being thoroughly inspected by AV/EDRs, SOC analysts or threat...

FalconHound – Empowering Blue Teams With Automated BloodHound Integration

0

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log aggregation tool. One of the challenging aspects of BloodHound is that it is a snapshot in time. FalconHound includes functionality that can be...

Uscrapper 2.0 – Unleashing The Power Of OSINT Web Scraping For Data Extraction

0

Introducing Uscrapper 2.0, A powerfull OSINT webscrapper that allows users to extract various personal information from a website. It leverages web scraping techniques and regular expressions to extract email addresses, social media links, author names, geolocations, phone numbers, and usernames from both hyperlinked and non-hyperlinked sources on the webpage, supports multithreading to make this process faster, Uscrapper 2.0 is...

GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse

0

gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can be found here: A Broken Marriage: Abusing Mixed Vendor Kerberos Stacks The tool has two features. The first is the ability to enumerate non Windows hosts that are joined to Active Directory that offer GSSAPI authentication over SSH. The second feature is...