0SKR (@saab_sec) 's Twitter Profile
0SKR

@saab_sec

Research @Mdseclabs

ID: 1241850161678016512

linkhttps://sabotagesec.com calendar_today22-03-2020 22:13:28

86 Tweet

618 Followers

217 Following

0SKR (@saab_sec) 's Twitter Profile Photo

Blog Post Alert: Tale of Code Integrity & Driver Loads 🔸Reversing sc.exe and MS-SCMR 🔸Some RPC internals 🔸Debugging PPL process 🔸Tracing functions during a driver load event. sabotagesec.com/tale-of-code-i…

0SKR (@saab_sec) 's Twitter Profile Photo

Saw Chetan Nayak (Brute Ratel C4 Author) post today on identifying C2 payloads based on stack telemetry. I have been working on private project myself ..something similar, a stack scanner. May be Chetan Nayak (Brute Ratel C4 Author) can share some insights .. sample detection of Havoc with sleepmask and stack dup enabled

Saw <a href="/NinjaParanoid/">Chetan Nayak (Brute Ratel C4 Author)</a> post today on identifying C2 payloads based on stack telemetry. I have been working on private project myself ..something similar, a stack scanner. May be <a href="/NinjaParanoid/">Chetan Nayak (Brute Ratel C4 Author)</a> can share some insights ..
sample detection of Havoc with sleepmask and stack dup enabled
0SKR (@saab_sec) 's Twitter Profile Photo

Detection opportunity: Stack base Fluctuation. Tracing state of stack base address of threads provides a detecting opportunity to identify sleeping beacons whose stacks are spoofed. Havoc Stack dup feature in timer based obfuscation can be detected this way.

Detection opportunity: Stack base Fluctuation.

Tracing state of stack base address of threads provides a detecting opportunity to identify sleeping beacons whose stacks are spoofed. Havoc Stack dup feature in timer based obfuscation can be detected this way.
0SKR (@saab_sec) 's Twitter Profile Photo

Gotta Catch ‘Em all! Catching Your Favorite C2s In Memory Using Stack & Thread Telemetry. Learning about abnormalities in commercial and (open source)C2s. Check blog down below: sabotagesec.com/gotta-catch-em…

Tavis Ormandy (@taviso) 's Twitter Profile Photo

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

This strange tweet got &gt;25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n
0SKR (@saab_sec) 's Twitter Profile Photo

#crashstrike CrowdStrike incident brought attention to the mysterious "Channel files", since then I have been trying to make sense of their beast of a sensor kernel module. Here is my progress, there is a lot interesting things in the code... Channel file processing in action!

#crashstrike <a href="/CrowdStrike/">CrowdStrike</a>  incident brought attention to the mysterious "Channel files", since then I have been trying to make sense of their beast of a sensor kernel module. Here is my progress, there is a lot interesting things in the code...
Channel file processing in action!
Josh (@passthehashbrwn) 's Twitter Profile Photo

New blog from me on manually manipulating Vectored Exception Handlers to evade some EDRs and perform threadless process injection. securityintelligence.com/x-force/using-… Accompanying code: github.com/xforcered/Vect…

0SKR (@saab_sec) 's Twitter Profile Photo

New blog! I hate you COM – Pitfalls of COM object activation! Addressing few issues in .NET unmanaged apis when used in offensive coding sabotagesec.com/i-hate-you-com…

0SKR (@saab_sec) 's Twitter Profile Photo

A fun side project - Stack customizer payload generator. I will share more details in my next blog post Stay tuned :)

A fun side project - Stack customizer payload generator.
I will share more details in my next blog post 
Stay tuned :)
0SKR (@saab_sec) 's Twitter Profile Photo

❗ Blog Alert ❗ 🔴 Introducing a thread hijacking ttp variant called Phantom call. 🔴Discussion on effect of stack alignment on SIM instructions/registers. 🔴In depth analysis of Win32 api RtlRemoteCall(). 🔴Weaponizing RtlRemoteCall sabotagesec.com/thread-hijacki…

Dominic Chell 👻 (@domchell) 's Twitter Profile Photo

Kept this one under wraps for a while, but happy to finally say 0SKR and Luci are joining Peter Winter-Smith, @modexpblog, dylan and S4ntiagoP in the MDSec R&D team next week... big things are coming 🥳

diversenok (@diversenok_zero) 's Twitter Profile Photo

My new blog post 🥳 Improving AFD Socket Visibility for Windows Forensics & Troubleshooting It discusses the low-level API under Winsock (IOCTLs on \Device\Afd handles) and explores the workings of the new socket inspection feature in System Informer 🔥 huntandhackett.com/blog/improving…