William Knowles (@william_knows) 's Twitter Profile
William Knowles

@william_knows

ID: 2293483110

linkhttp://williamknowles.io calendar_today15-01-2014 22:43:09

644 Tweet

1,1K Followers

3 Following

William Knowles (@william_knows) 's Twitter Profile Photo

I'll be speaking at Skytalks at DEF CON this Friday at 13.00 about conducting practical attack simulations in critical national infrastructure. defcon.outel.org/dc26-consolida… Skytalks

Luke Jennings (@jukelennings) 's Twitter Profile Photo

Finally got round to releasing part two. Thought I’d use the excellent GhostPack by SpecterOps/Will Schroeder as an example countercept.com/blog/detecting…

nmonkee (@nmonkee) 's Twitter Profile Photo

About to head to #BlueHatv18. If you’re around, do come along to hear myself & William Knowles from MWR Infosecurity mwrlabs talk about ā€œOvert C2: The Art of Blending Inā€ on Thursday at 16:10 PM. There will be demos of new shiny #RedTeam tooling C3 \0/

About to head to #BlueHatv18. If you’re around, do come along to hear myself &amp; <a href="/william_knows/">William Knowles</a> from <a href="/mwrinfosecurity/">MWR Infosecurity</a> <a href="/mwrlabs/">mwrlabs</a> talk about ā€œOvert C2: The Art of Blending Inā€ on Thursday at 16:10 PM. There will be demos of new shiny #RedTeam tooling C3 \0/
William Knowles (@william_knows) 's Twitter Profile Photo

Very happy to say I'll be presenting at TROOPERS Conference #TR19 along with my colleague James Coote this coming March. The topic will be practical attack simulations in industrial environments.

William Knowles (@william_knows) 's Twitter Profile Photo

Exploring code coverage for module stomping - injecting into unused code areas in legitimately loaded DLLs - williamknowles.io/living-dangero…

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

C3 now supports C2 over LDAP for all your egress and lateral movement needs. Looks like LDAP, quacks like LDAP, must be LDAP? labs.f-secure.com/blog/introduci…

C3 now supports C2 over LDAP for all your egress and lateral movement needs. Looks like LDAP, quacks like LDAP, must be LDAP? labs.f-secure.com/blog/introduci…
William Knowles (@william_knows) 's Twitter Profile Photo

Abusing Windows section object permissions for privilege escalation. An interesting case that permitted application-specific environment variables to be modified resulting in arbitrary DLL loads. Affects GE iFIX < 6.1 (industrial HMI product). applied-risk.com/resources/ge_i…

William Knowles (@william_knows) 's Twitter Profile Photo

Porting existing .NET projects for use with the fantastic BOFNET from CCobšŸ“ó §ó ¢ó ·ó ¬ó ³ó æ (in-process .NET assembly execution in Cobalt Strike for when you need to avoid fork and run). williamknowles.io/quickly-portin…

William Knowles (@william_knows) 's Twitter Profile Photo

bofnet_executeassembly - integrating in-process standard .NET assembly execution into BOF.NET. No modifications to executed assemblies required (unlike my last tweet). Thanks CCobšŸ“ó §ó ¢ó ·ó ¬ó ³ó æ for pointing me in the right direction! github.com/CCob/BOF.NET/p…

William Knowles (@william_knows) 's Twitter Profile Photo

Fetching SharpHound data entirely in-memory (no dropped ZIP or JSON files) using BOF.NET and Cobalt Strike. williamknowles.io/fetching-sharp…

William Knowles (@william_knows) 's Twitter Profile Photo

Re: SAM permissions, a possible cause: interestingly if you re-enable "RegBack" (auto-backup of these sensitive files, which was disabled by default in Windows 10 1803) it *corrects* the permissions after a reboot (removing "Read" for "Users"). Tested on 20H2 and 1909.

Re: SAM permissions, a possible cause: interestingly if you re-enable "RegBack" (auto-backup of these sensitive files, which was disabled by default in Windows 10 1803) it *corrects* the permissions after a reboot (removing "Read" for "Users").  Tested on 20H2 and 1909.
William Knowles (@william_knows) 's Twitter Profile Photo

Little OPSEC TIL. For dumping processes with MiniDumpWriteDump, it doesn't matter if your initial handle only has query and read memory permissions, it goes fully rogue, and opens a new handle with full access rights (inc. w/ duplicated handles - and from your current process).

Little OPSEC TIL. For dumping processes with MiniDumpWriteDump, it doesn't matter if your initial handle only has query and read memory permissions, it goes fully rogue, and opens a new handle with full access rights (inc. w/ duplicated handles - and from your current process).