Justin Bui Profile
Justin Bui

@slyd0g

Followers
4K
Following
5K
Media
92
Statuses
2K

I break computers and skateboards | red/blue/whatever let's make security better | Offensive Security @Snowflake | Prev @Zoom @SpecterOps

Joined March 2012
Don't wanna be here? Send us removal request.
@slyd0g
Justin Bui
3 years
Took some time recently to dive into in-memory Mach-O execution on macOS. I dig into the API calls necessary to perform reflective code loading, present my Swift implementation, cover nuances on Big Sur vs Monterey, and how to detect it on Monterey!.
Tweet card summary image
slyd0g.medium.com
This blogpost will describe the concept of loading executables in-memory on macOS and how to detect it.
9
58
152
@slyd0g
Justin Bui
6 days
RT @jaredcatkinson: Data is gold and Snowflake is full of it. BloodHound now understands Snowflake’s access model. Map who can reach your….
0
27
0
@slyd0g
Justin Bui
8 days
RT @Frichette_n: ec2-instance-connect:SendSSHPublicKey might be my on of my favorite API calls. Have privilege at the control plane and wan….
0
2
0
@slyd0g
Justin Bui
17 days
Some Python code that leverages FFI to interface with macOS libraries to pull the unique hardware UUID. An alternative to the system_profiler binary that may be useful :).
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
0
2
16
@slyd0g
Justin Bui
1 month
This is so cool :). "Santa also supports file access authorization (FAA), restricting access to specific files and ensuring . approved applications . can interact with them. We’ve leveraged this to secure browser cookies on Figma laptops".
Tweet card summary image
figma.com
Here's how we scaled Santa, an open-source binary authorization tool, across all Figmates’ laptops to boost endpoint security while keeping workflows seamless.
1
2
9
@slyd0g
Justin Bui
2 months
RIP --load-extension, you were good to us red teamers
1
3
20
@slyd0g
Justin Bui
3 months
RT @wtsdev: It's a write-up a year in the. waiting. Enjoy everyone!.
Tweet card summary image
wts.dev
A security research blog.
0
13
0
@slyd0g
Justin Bui
5 months
My team is hiring a high-mid to senior engineer! You’ll be joining a brilliant team that delivers high-impact assessments with lots of visibility :). Please apply if interested and let me know if you have any questions!.
0
7
23
@slyd0g
Justin Bui
5 months
RT @d_tranman: Had a lot of fun digging into COM stuff with @bohops recently! We ended up finding a way to laterally move without dropping….
Tweet card summary image
ibm.com
New research from IBM X-Force Red has led to the development of a proof-of-concept fileless lateral movement technique by abusing trapped Component Object Model (COM) objects. Get the details.
0
179
0
@slyd0g
Justin Bui
6 months
RT @GrahamHelton3: I see we're doing the quarterly open source tools/research debate again. I'll just say this:. Phishing got much harder w….
0
52
0
@slyd0g
Justin Bui
8 months
RT @patrickwardle: . and a big mahalo to the (many) brilliant researchers whose work laid the foundation for this! 🙏🏽 .
0
3
0
@slyd0g
Justin Bui
8 months
Really awesome work by @patrickwardle, simple and elegant :).
@patrickwardle
Patrick Wardle
8 months
A side effect of 🍎's privacy mindset: in-memory payloads remain largely invisible/inaccessible to macOS security/3rd-party tools. Apple nuked their reflective code loading APIs - but was that enough? 🫣. From #OBTS v7:."Restoring Reflective Code Loading".
0
0
4
@slyd0g
Justin Bui
8 months
RT @_MG_: Well now that it’s out there… Everyone on the Red Team was amazing. We pulled off some great operations. I personally have my ha….
0
17
0
@slyd0g
Justin Bui
9 months
Opening on our Blue Team, please apply if it sounds interesting :). It's a great team that my team partners with often (obviously).
0
0
6
@slyd0g
Justin Bui
10 months
RT @DefSecSentinel: #MacOS defense products that rely solely on reactive measures like YARA or a "magic" Machine Learning Model, that relie….
0
19
0
@slyd0g
Justin Bui
11 months
RT @BillDemirkapi: Just Published 👉 Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale! Impacted orgs include Cr….
Tweet card summary image
billdemirkapi.me
Modern technologies like the cloud have made rapidly developing scalable software more accessible than ever. What risks has cloud computing introduced for the sake of convenience?
0
19
0
@slyd0g
Justin Bui
11 months
Tweet media one
0
3
0
@slyd0g
Justin Bui
1 year
RT @_ColeMurray: I recently read through Meta's Llama 3 paper. Their approach to synthetic data for code generation is interesting. I dug i….
0
4
0
@slyd0g
Justin Bui
1 year
Really cool approach to mapping out nested permissions in @SnowflakeDB check this post out! :).
@jaredcatkinson
Jared Atkinson
1 year
There's been lots of reporting on the campaign against.Snowflake DB, so I thought it'd be useful to look at it from an Attack Path PoV. This post shows how you can create an graph for your SNOW deployment & what that tells us about the campaign.
0
1
6
@slyd0g
Justin Bui
1 year
RT @SnowflakeDB: There has been a lot of attention on a cybersecurity incident involving Snowflake. We want everyone to have the latest and….
0
21
0
@slyd0g
Justin Bui
1 year
RT @0xMatt: PSA for Cybersecurity folk: Our co-workers are tired of being "tricked" by phishing exercises y'all, and it is making them hate….
Tweet card summary image
security.googleblog.com
Matt Linton, Chaos Specialist In the late 19th and early 20th century, a series of catastrophic fires in short succession led an outraged pu...
0
165
0