
Bobby Cooke
@0xboku
Adversary Services @ IBM X-Force Red
ID: 1236693035632623617
https://0xBoku.com 08-03-2020 16:39:47
3,3K Tweet
10,10K Followers
1,1K Following






I jumped heavily into learning about SCCM tradecraft and wrote a detailed write-up with custom examples, covering the most interesting vulnerabilities that combine commonality and impact from low-privilege contexts, and what you can do to prevent them :) logan-goins.com/2025-04-25-sccโฆ


Dennis Kniep This is a very neat trick! In my opinion clearly a vulnerability though, it shouldn't be possible to skip the first step this way. I imagine Microsoft will want to fix this, or was this reported and deemed as not a vuln?



Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure. Check out Atsika's article on how it came to exist after an assumed breach mission โคต๏ธ ๐ blog.quarkslab.com/proxyblobing-iโฆ



Bobby Cooke I can confirm, it is using REST API over HTTPS under the hood for Blob operations๐งโโ๏ธ




BOF execution coming soon to Loki C2! Just got TrustedSec's COFFLoader working inside of a Node.js node module, callable from JavaScript! COFFLoader Project: github.com/trustedsec/COFโฆ Loki C2 Project: github.com/boku7/Loki
