Scriptmonkey_ Profile
Scriptmonkey_

@scriptmonkey_

Followers
1K
Following
9K
Media
653
Statuses
7K

Tester of Pens, Ex-Teamer of Red things, now with a more purpley shade. Biker and Recovering Eve-Online Addict. o7 [email protected] & https://t.co/QvMpQ3IQwQ

United Kingdom
Joined June 2010
Don't wanna be here? Send us removal request.
@scriptmonkey_
Scriptmonkey_
5 years
Bang on Iain! As much as the example in the blog post works, getting c2 over any form of filesystem, is the real gem here. Even locally for privesc, get a system shell without worrying about proxies for example. Looking forward to see what folk come up with use case wise.
This is such a cool C2 channel technique. Use network file share, RDP mapped drives and anywhere else more than one host sees the same filesystem as a C2 channel which really doesn't get logged. Simple but effective!
0
0
5
@scriptmonkey_
Scriptmonkey_
1 month
"OpSec is hard" if you think this and you've only worked on an external team. Just wait until you work for an internal one. 😅
0
0
0
@scriptmonkey_
Scriptmonkey_
5 months
Really great training sesh with @SinSinology brill workshop. Definitely recommend it and the 4 day training with @watchtowrcyber
0
0
4
@BSidesLondon
BSides London
6 months
Croeso BSides Aberystwyth, bydded i ni fod y cyntaf i'ch croesawu a phob lwc ym mis Tachwedd! https://t.co/LDXdv958mU #Security #BSides #Aberystwyth #BSidesAberystwyth
2
10
16
@mrd0x
mr.d0x
6 months
FileFix - A ClickFix Alternative https://t.co/OMU7UADf9J
19
188
756
@trickster012
trickster0
6 months
This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. https://t.co/GY37MMfCGl
trickster0.github.io
It has been a while, this is my research on trying to change the IOCs of a common remote process injection flow and the end result. I presented this in RedTreat in 2024 and I thought it was about...
6
93
265
@scriptmonkey_
Scriptmonkey_
1 year
When your team is reading TI reports for an upcoming exercise and goes "No way, There is no way a proper APT would ever do something as basic as this..." introducing APT herptyderp
@_xpn_
Adam Chester đŸ´â€â˜ ī¸
1 year
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. https://t.co/mGWU5Hdwi6 And yet... they got caught doing this!
0
0
1
@_xpn_
Adam Chester đŸ´â€â˜ ī¸
1 year
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. https://t.co/mGWU5Hdwi6 And yet... they got caught doing this!
21
103
628
@scriptmonkey_
Scriptmonkey_
1 year
Just made an account over on BSky. Come find me :) https://t.co/zsZdHXjbkf Gives off real classic twitter vibes.
0
0
0
@EricaZelic
IAM!ERICA
1 year
Great article with lots of details about attacks that happen irl. We should remember that many orgs don't require MFA from on-prem. Also, service accounts (i.e. entra sync account) won't have MFA. Threat Actors can also use PRTs and Access tokens to access M365/Azure.
@MsftSecIntel
Microsoft Threat Intelligence
1 year
The financially motivated cybercriminal group that Microsoft tracks as Storm-0501 has been observed exfiltrating data and deploying Embargo ransomware after moving laterally from on-premises to the cloud environment. https://t.co/U7uQseDxE8
2
12
77
@inversecos
inversecos
1 year
Understanding EVERY Token in Entra ID 🔎 Not all tokens are equal. There are many different types with different uses and benefits. In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain. Full blog
17
228
725
@scriptmonkey_
Scriptmonkey_
1 year
The typical right-wing nutter... In response to JSO: "Protesting shouldn't inconvenience the public! This is illegal! People should run them over! They hurt our emergency services!" In response to #UKRiots: "i'm gonna nick some crocs, punch a copper and set fire to a shop"
0
0
0
@codewhitesec
CODE WHITE GmbH
1 year
Teaching the Old .NET Remoting New Exploitation Tricks – read how @mwulftange developed novel techniques to exploit Apache log4net's hardened .NET Remoting service:
Tweet card summary image
code-white.com
This blog post provides insights into three exploitation techniques that can still be used in cases of a hardened .NET Remoting server with `TypeFilterLevel.Low` and Code Access Security (CAS)...
5
62
150
@Cyb3rMik3
ᴍÉĒᴄʜᴀʟÉĒs ᴍÉĒᴄʜᴀʟᴏs
1 year
đŸ“ĸ New blog post out! 💡 I've been working on this blog for quite some time and I am honored and very happy I was given the opportunity from @alexverboon and @castello_johnny to present this in today's @KqlCafe. âžĄī¸ Windows Linux Subsystem (WSL) by itself is a blind spot within
0
15
19
@scriptmonkey_
Scriptmonkey_
1 year
Another year, another @Steel_Con. Once again proving why its one of my favourite cons to go to. Great time seeing old friends, meeting new ones and catching great talks including one on norse mythology and threat modelling 😁 also my arm now belongs to a sponsor 😅
2
2
12
@InfosecBots
Infosec Battle Bots
1 year
CTF details. Link below for our awesome Ctf brought to you by our partners @hackrocks_ and @hacktoria. 6 awesome challenges that give you the APIs for our arena, wanna fire our flipper ??? Get registered and crack our awesome challenges @BSidesBSK
infosecbattlebots.hackrocks.com
Cyber Security challenge
0
4
6
@sanjivkawa
Sanjiv Kawa
1 year
I've made some long awaited updates to SQLRecon! Here's a couple of videos highlighting some of the big additions. Tool: https://t.co/lACpTXx94o Check out this thread âŦ‡ī¸
github.com
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation. - GitHub - xforcered/SQLRecon: A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
2
70
201
@scriptmonkey_
Scriptmonkey_
2 years
Teams needs a "don't notify on @everyone or @<channel name>" like discord. Stat. This is worse than "reply all".
0
0
0
@PyroTek3
Sean Metcalf
2 years
Domain Admin credentials delivered across the network to workstations and servers
@brysonbort
Bryson đŸĻ„
2 years
What is the definition of agentless?
6
14
110
@alexbloor
Bloor (Mastodon: @[email protected])
2 years
Laughs in ham radio.
8
1
39