VirtualAllocEx Profile Banner
Daniel Profile
Daniel

@VirtualAllocEx

Followers
7K
Following
14K
Media
93
Statuses
4K

Founder of RedOps GmbH

Austria
Joined March 2020
Don't wanna be here? Send us removal request.
@VirtualAllocEx
Daniel
5 months
Finally, the first printed copy of the script for my 4-day in-person workshop "Endpoint Security Insights: Shellcode Loaders & Evasion Fundamentals". In about 1000 pages, students learn step-by-step and in a very practical way how to build and debug various types of evasive
Tweet media one
11
28
220
@VirtualAllocEx
Daniel
7 months
Iโ€™m currently transferring the learning material for Chapter 13, "Mapped Memory," into the handout script for my upcoming in-person workshop, "๐„๐ง๐๐ฉ๐จ๐ข๐ง๐ญ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ˆ๐ง๐ฌ๐ข๐ ๐ก๐ญ๐ฌ: ๐’๐ก๐ž๐ฅ๐ฅ๐œ๐จ๐๐ž ๐‹๐จ๐š๐๐ž๐ซ๐ฌ & ๐„๐ฏ๐š๐ฌ๐ข๐จ๐ง ๐…๐ฎ๐ง๐๐š๐ฆ๐ž๐ง๐ญ๐š๐ฅ๐ฌ," taking.
0
4
34
@VirtualAllocEx
Daniel
7 months
In-person workshop announcement: "Endpoint Security Insights: Shellcode Loaders & Evasion Fundamentals". See the link below for full details. Course details in german. Course details in english . #redteam #itsec #infosec
Tweet media one
3
5
43
@VirtualAllocEx
Daniel
10 months
I believe I've recently made progress in reverse engineering within the context of a specific EDR. Using IDA, I identified an exclusion rule that prevents an entire detection chain, which relies on specific EDR DLLs, from being triggered. By assigning the "correct" name to a
Tweet media one
7
61
285
@VirtualAllocEx
Daniel
11 months
Not 100% sure yet, but it looks like "bad EDR" is preparing or doing some string manipulation on ntdll.dll, maybe to give ntdll.dll a new special "HaCk1nG" name, who knows? ๐Ÿ˜‰
Tweet media one
1
2
23
@VirtualAllocEx
Daniel
11 months
It has been a while since I set up a DNS Listener in Cobalt Strike. So I have documented it step by step in this blog post. Available in English and German, just switch from EN to DE on the website. If there is anything wrong or not explained correctly, please let me know.
Tweet media one
0
43
160
@VirtualAllocEx
Daniel
11 months
I was interested in better understanding a specific detection mechanism of an EDR, focusing on fake DLLs, page guard hooking, PEB manipulation, and vectored exception handling - techniques inspired by the game hacking community. I'm not a reverse engineer, but in this blog post
Tweet media one
3
122
384
@VirtualAllocEx
Daniel
11 months
If there are any mistakes or if something is not described correctly, please let me know.
1
0
4
@VirtualAllocEx
Daniel
11 months
I wanted to learn more about using content delivery networks (CDNs) in Azure in conjunction with an Nginx reverse proxy in the context of using Cobalt Strike as a C2 framework. As a result, I've written the following blog post. #redteam.
Tweet card summary image
redops.at
4
82
259
@VirtualAllocEx
Daniel
11 months
RT @7etsuo: ๐Ÿงต1/n Jerry Cain from Stanford University explains pointers and structs in C, showing a clever way to access struct fields. Thisโ€ฆ.
0
376
0
@VirtualAllocEx
Daniel
1 year
RT @zodiacon: Creating a Kernel Object type part 2:.
Tweet media one
0
48
0
@VirtualAllocEx
Daniel
1 year
RT @TJ_Null: Ever wanted to spin up a GOAD environment in VMware ESXi? . Well I decided to dig into it and I wrote a step-by-step guide toโ€ฆ.
netsecfocus.com
Setting Up and Installing GOAD or GOAD-Light on VMware ESXi
0
58
0
@VirtualAllocEx
Daniel
1 year
If you are interested in learning more about EDRs, malware research, detection engineering, call stack analysis, etc. I highly recommend checking out the blog from @saab_sec blog, which is full of great detailed posts on these topics. #redteam.
1
72
256
@VirtualAllocEx
Daniel
1 year
RT @TrainSec: CrowdStrike and the Formidable BSOD โ€“ Pavel Yosifovich (.
Tweet card summary image
scorpiosoftware.net
Adventures in Coding, Internals and Learning
0
28
0
@VirtualAllocEx
Daniel
1 year
RT @sh4dy_0011: Hereโ€™s the second part of my blog series on Compiler and LLVM internals, where Iโ€™ve explained the following concepts:. 1. Bโ€ฆ.
Tweet card summary image
sh4dy.com
IntroductionIn the first part of my blog series on compilers and LLVM, I provided a brief introduction to compiler fundamentals and LLVM. We also wrote a simple LLVM analysis pass to print function na
0
207
0
@VirtualAllocEx
Daniel
1 year
RT @BalthasarMartin: Today at #Troopers24 we released Certiception โ€“ the ADCS honeypot we always wanted to have. Blog: .
Tweet card summary image
github.com
An ADCS honeypot to catch attackers in your internal network. - srlabs/Certiception
0
163
0
@VirtualAllocEx
Daniel
1 year
In the context of a red team engagement and the preparation of your loader to gain initial access, file aging could play a crucial role in successful evasion (evasion in this context being defined as avoiding prevention and detection without triggering an active alert).
2
0
5
@VirtualAllocEx
Daniel
1 year
Microsoft Defender's use of a specific Attack Surface Reduction (ASR) rule to block executables such as .exe, .dll or .scr based on prevalence or trusted list criteria is quite interesting. #redteam
Tweet media one
5
20
63
@VirtualAllocEx
Daniel
1 year
Compared to other conferences this is not a given, I appreciate it and it may help me to improve my submission next year. In any case, congratulations to all the other speakers who made it and I wish you a super cool time at Troopers 2024.
0
1
2