Coerced Potato Reflective DLL – Unveiling Privilege Escalation From NT Service To SYSTEM
Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions. Heavily based Reflective Loader from Install Clone this repo and compile the project in VisualStudio then load dist/coercedpotato.cna into CobaltStrike. Usage You first need to spawn the RPC listener with beacon> CoercedPotato spawn ProcessToSpawn OptionalCmdArgument for example beacon> CoercedPotato spawn C:WindowsTempbeacon.exe beacon> CoercedPotato spawn C:WindowsTemploader.exe C:WindowsTempbeacon.bin then you can trigger a SYSTEM call beacon> CoercedPotato coerce
Exploiting CVE-2023-49103: A Python Script for Rapid phpinfo() Detection
PoC for the CVE-2023-49103 Overview This Python script is designed to efficiently process a large list of URLs to check for the presence of phpinfo() output. It uses multi-threading to handle a large number of URLs concurrently, significantly speeding up the process. The script also features a real-time progress bar to visually track the progress. Requirements Python 3.x requests urllib3 colorama alive-progress concurrent.futures (part of the standard library in Python 3) Installation Ensure...
InfoSec Black Friday Deals – “Friday Hack Fest” 2023 Edition
All the deals for InfoSec related software/tools this Black Friday / Cyber Monday. Researcher was a little late getting started with my wife pushing out a little 0-day baby as of today. Thank you CriimBow for kicking things off in the meantime! Just 2023 things Quality over quantity - this list goes through a level of vetting for dodginess, gated-deals, deals that...
eBPF Tools: Revolutionizing System Monitoring with Advanced PTY Sniffing Techniques
This piece talks about eBPF tools and shows how they can be used to improve system monitoring by keeping track of PTY sessions and sniffing private data like SSH, sudo, and su passwords. It shows users how to set up bpftrace, which is a necessary tool for using eBPF features, and presents ptysnoop, a more advanced tool for watching...
Dynmx Prototype: An Advanced API Call Trace Analysis Tool for Malware Detection
dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a simplified way, you can think of dynmx as a sort of YARA for API call traces (so called function logs) originating from malware sandboxes. Hence, the data basis for the detection approach are not the malware samples themselves which are analyzed statically but...
JSON Crack: Transform Your Data into Interactive Visualizations
An innovative, open source data visualization app. Brings data to life through captivating graphs. JSON Crack (jsoncrack.com) JSON Crack is a free, open-source data visualization app capable of visualizing data formats such as JSON, YAML, XML, CSV and more, into interactive graphs. With its intuitive and user-friendly interface, JSON Crack makes it easy to explore, analyze, and understand even the most...
Karton-Pcap-Miner: Streamlining Network Indicator Extraction from PCAPs
Karton-Pcap-Miner is a strong program that quickly pulls network indicators from analysis PCAP files." It works with MWDB without any problems to add these indicators as attributes, which makes cybersecurity research better. You can use it with complicated network data because it has tools for HTTP, TCP, SNI, and DNS built in. Professionals who want to speed up the...
Crawlector – Empowering Threat-Hunting With Advanced Web Scanning And Detection
Crawlector (the name Crawlector is a combination of Crawler & Detector) is a threat-hunting framework designed for scanning websites for malicious objects. Note-1: The framework was first presented at the No Hat conference in Bergamo, Italy on October 22nd, 2022 (Slides, YouTube Recording). Also, it was presented for the second time at the AVAR conference, in Singapore, on December 2nd, 2022. Note-2: The accompanying tool EKFiddle2Yara (is a tool that takes...
31 Tips from Inon Shkedy’s Challenge – Mastering API Security
This challenge is Inon Shkedy's 31 days API Security Tips -API TIP: 1/31- Older APIs versions tend to be more vulnerable and they lack security mechanisms. Leverage the predictable nature of REST APIs to find old versions. Saw a call to api/v3/login? Check if api/v1/login exists as well. It might be more vulnerable. -API TIP: 2/31- Never assume there’s only one way to authenticate to an...
InfoSec Black Friday Deals – “Friday Hack Fest” 2023 Edition
All the deals for InfoSec related software/tools this Black Friday / Cyber Monday. Just 2023 Things Quality over quantity - this list goes through a level of vetting for dodginess, gated-deals, deals that aren't infosec related and either can't be verified or break promises (e.g. states % off all courses, but has exclusions). There are also some vendors being stood up...