Zeroedtech Profile Banner
Zeroed Profile
Zeroed

@Zeroedtech

Followers
302
Following
32
Media
10
Statuses
50

Just a guy that talks at conferences sometimes

Joined July 2019
Don't wanna be here? Send us removal request.
@Zeroedtech
Zeroed
14 days
I've recently been experimenting with using .NET profilers to hook .NET functions under IIS and decided to write up a blog post while it was fresh in my mind
zeroed.tech
How can we use .NET's profiling interface to gain improved visibility of functions commonly used by web shells?
1
31
105
@Zeroedtech
Zeroed
25 days
12 months ago I presented a 3 hour course on attacking and defending Microsoft IIS servers to a packed room at BSides Canberra, today the 30+ hour version went live on @XintraOrg !
@inversecos
inversecos
25 days
New XINTRA course‼️ Advanced IIS Post Exploitation, Detection & Evasion Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads. If your detection and response capabilities lag exposure, this course
0
3
13
@Zeroedtech
Zeroed
4 months
Not a bad read, I think they may be overanalysing a compiled webshell and its a shame they didn't get a memory dump but its great to see more companies talking about this stuff https://t.co/0EkBjcdAjn
Tweet card summary image
github.com
Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95) - RedDrip7/NightEagle_Disclose
0
0
3
@Zeroedtech
Zeroed
6 months
After a bit more digging it look like its referenced in Microsoft.JScript, Version=8.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a but not Microsoft.JScript, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a The later of which is used by my IIS
0
0
1
@Zeroedtech
Zeroed
6 months
For years I've seen adversaries using the "unsafe" keyword in their JScript eval shells and assumed it was required to eval complex statements (i.e code), but after trying to work out what it actually does for some training I'm working on I found it does nothing! Its unreferenced
1
0
1
@Zeroedtech
Zeroed
1 year
It put my life on hold for a month and I'm very sleep deprived but thanks for the great CTF @HuntressLabs @_JohnHammond @HuskyHacksMK @_BensonBoy23 @sudo_Rem @IzzyBoopFPV @Kaspertame #HuntressCTF
1
2
9
@Zeroedtech
Zeroed
1 year
Thank you to everyone who attended my training session and a massive thanks to @BSidesCbr for providing me the opportunity to run it. The slides and any code we used can be found here https://t.co/TtNZX8sBzC I'd love any feedback on the session
zeroed.tech
0
5
16
@Zeroedtech
Zeroed
1 year
For those planing to attend my "Attacking and Defending Microsoft IIS" training session at @BSidesCbr next week, checkout the following post for the list of recommended software to have reaady to go https://t.co/XbIgYy1Lxr See you all Friday
zeroed.tech
Setup instructions for Attacking and Defending Microsoft IIS - BSides Canberra 2024 Training.
2
12
46
@Zeroedtech
Zeroed
1 year
Defender seems interested in my upcoming BSides Canberra training on Attacking and Defending Microsoft IIS Training
1
0
7
@Zeroedtech
Zeroed
1 year
I'll be running a free 3 hour training session at @BSidesCbr teaching people how to defend IIS servers by learning how to attack them. I'll be posting recommended host setups closer to the event so be sure to give me a follow. https://t.co/ljEpNTX3BK
0
4
7
@Zeroedtech
Zeroed
1 year
How much do you know about IIS Machine Keys and View State? Are you confident you could not only identify an exploited host but also remediate it? If not, check out my new blog post which covers exploitation, detection and remediation https://t.co/TjZ8Qgjz7q
Tweet card summary image
zeroed.tech
Compromised IIS machine keys can lead to permanent access to IIS hosts via view state exploitation. In this post, we'll learn how to exploit view state via compromised IIS machine keys, how to detect...
0
41
113
@Zeroedtech
Zeroed
1 year
If you've ever wondered what those weird "App_Web_das2318.dll" files on IIS servers are, I've written a blog post detailing where their names come from, what they do and the forensic benefits they can provide https://t.co/pqgJaByuSo This is the first in a series of IIS posts
zeroed.tech
Exploring the mysteries of IIS' App_Web files.
0
21
77
@Zeroedtech
Zeroed
2 years
We're people really ignoring virus alerts on Server 2019 enough that we needed a danger dog added to them?
0
0
0
@BSidesCbr
BSidesCanberra
2 years
"Bringing Harmony to IIS: Using game mods to protect (or nuke) your web server", Adrian Justice
0
2
4
@Zeroedtech
Zeroed
2 years
Is it hackback if you tamper with what an adversaries code sends back to their C2? Defensive part of my #bsidescbr presentation is done, onto the offensive side.
0
1
5
@Zeroedtech
Zeroed
2 years
And one for the red teams 😁
0
0
1
@Zeroedtech
Zeroed
2 years
The IIS mods for #bsidescbr are coming together. These screenshots show the interception of a directory listing payload being run via a chinachopper shell
0
1
5
@Zeroedtech
Zeroed
2 years
If you're going to make mods for IIS, why not make a mod loader that injects into IIS and bootstraps the whole process?
0
0
0
@BSidesCbr
BSidesCanberra
2 years
"Bringing Harmony to IIS: Using game mods to protect (or nuke) your web server" by Adrian
1
3
3