Scriptmonkey_
@scriptmonkey_
Followers
1K
Following
9K
Media
653
Statuses
7K
Tester of Pens, Ex-Teamer of Red things, now with a more purpley shade. Biker and Recovering Eve-Online Addict. o7 [email protected] & https://t.co/QvMpQ3IQwQ
United Kingdom
Joined June 2010
Bang on Iain! As much as the example in the blog post works, getting c2 over any form of filesystem, is the real gem here. Even locally for privesc, get a system shell without worrying about proxies for example. Looking forward to see what folk come up with use case wise.
This is such a cool C2 channel technique. Use network file share, RDP mapped drives and anywhere else more than one host sees the same filesystem as a C2 channel which really doesn't get logged. Simple but effective!
0
0
5
"OpSec is hard" if you think this and you've only worked on an external team. Just wait until you work for an internal one. đ
0
0
0
Just released a blog exploring python package management: https://t.co/bbiCqImuv1
dtm.uk
Blog post on how to use alternative package indexes with pip and introducing a proof-of-concept Python package index/mirror proxy tool
0
25
53
Really great training sesh with @SinSinology brill workshop. Definitely recommend it and the 4 day training with @watchtowrcyber
0
0
4
Croeso BSides Aberystwyth, bydded i ni fod y cyntaf i'ch croesawu a phob lwc ym mis Tachwedd! https://t.co/LDXdv958mU
#Security #BSides #Aberystwyth #BSidesAberystwyth
2
10
16
This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. https://t.co/GY37MMfCGl
trickster0.github.io
It has been a while, this is my research on trying to change the IOCs of a common remote process injection flow and the end result. I presented this in RedTreat in 2024 and I thought it was about...
6
93
265
When your team is reading TI reports for an upcoming exercise and goes "No way, There is no way a proper APT would ever do something as basic as this..." introducing APT herptyderp
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. https://t.co/mGWU5Hdwi6 And yet... they got caught doing this!
0
0
1
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. https://t.co/mGWU5Hdwi6 And yet... they got caught doing this!
21
103
628
Just made an account over on BSky. Come find me :) https://t.co/zsZdHXjbkf Gives off real classic twitter vibes.
0
0
0
Great article with lots of details about attacks that happen irl. We should remember that many orgs don't require MFA from on-prem. Also, service accounts (i.e. entra sync account) won't have MFA. Threat Actors can also use PRTs and Access tokens to access M365/Azure.
The financially motivated cybercriminal group that Microsoft tracks as Storm-0501 has been observed exfiltrating data and deploying Embargo ransomware after moving laterally from on-premises to the cloud environment. https://t.co/U7uQseDxE8
2
12
77
Understanding EVERY Token in Entra ID đ Not all tokens are equal. There are many different types with different uses and benefits. In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain. Full blog
17
228
725
The typical right-wing nutter... In response to JSO: "Protesting shouldn't inconvenience the public! This is illegal! People should run them over! They hurt our emergency services!" In response to #UKRiots: "i'm gonna nick some crocs, punch a copper and set fire to a shop"
0
0
0
Teaching the Old .NET Remoting New Exploitation Tricks â read how @mwulftange developed novel techniques to exploit Apache log4net's hardened .NET Remoting service:
code-white.com
This blog post provides insights into three exploitation techniques that can still be used in cases of a hardened .NET Remoting server with `TypeFilterLevel.Low` and Code Access Security (CAS)...
5
62
150
đĸ New blog post out! đĄ I've been working on this blog for quite some time and I am honored and very happy I was given the opportunity from @alexverboon and @castello_johnny to present this in today's @KqlCafe. âĄī¸ Windows Linux Subsystem (WSL) by itself is a blind spot within
0
15
19
Another year, another @Steel_Con. Once again proving why its one of my favourite cons to go to. Great time seeing old friends, meeting new ones and catching great talks including one on norse mythology and threat modelling đ also my arm now belongs to a sponsor đ
2
2
12
CTF details. Link below for our awesome Ctf brought to you by our partners @hackrocks_ and @hacktoria. 6 awesome challenges that give you the APIs for our arena, wanna fire our flipper ??? Get registered and crack our awesome challenges @BSidesBSK
infosecbattlebots.hackrocks.com
Cyber Security challenge
0
4
6
I've made some long awaited updates to SQLRecon! Here's a couple of videos highlighting some of the big additions. Tool: https://t.co/lACpTXx94o Check out this thread âŦī¸
github.com
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation. - GitHub - xforcered/SQLRecon: A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
2
70
201
Teams needs a "don't notify on @everyone or @<channel name>" like discord. Stat. This is worse than "reply all".
0
0
0