Ferdinand Fuchs · @ferdinandfuchs
1 followers · 10 posts · Server social.tchncs.de

Red Canary Mac Monitor is a newly available tool for collection and dynamic system analysis on macOS endpoints >> 9to5mac.com/2023/06/17/red-can

#macos #endpointsecurityapi #forensic #analysis #securityresearcher #security

Last updated 1 year ago

Two C# Methods and test on Win 11 [v22H2] with last updates.

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies say "COME-ON", like Kaspersky ;D

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

article => lnkd.in/e4PPJe7R
source code => lnkd.in/eZEEhfDY

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher #bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive

Last updated 2 years ago

Two C# Methods vs "Kaspersky cloud security v21.3"
now testing Kaspersky with last update 22/1/2023 and bypassed very well

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX by "NativePayload_PE1.cs" or changing RWX to X only by "NativePayload_PE2.cs"
and
some anti-virus companies says "COME-ON", like Kaspersky ;D

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

article => lnkd.in/e4PPJe7R
source code => lnkd.in/eZEEhfDY

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher #bypass #bypassav #redteaming #pentesting #blueteaming #csharp #offensivesecurity #offensive #kaspersky

Last updated 2 years ago

Simple to Load Assembly/Bytes into local process () via C# + and Anti-viruses ;), some part of code changed via [D]elegate Techniques which i called [Technique ;D] to change some of code (also change source code) and ...

note: as you really need to change your own codes sometimes very fast , these codes changed and again worked very well and as this is really fun to find out new method/codes to bypass AVs always ;D

Method is not really new but C# code a little bit is ;D [since 2022 i used this], changing RWX to X and after 2 min to RX ;D
and
some anti-viruses companies says "COME-ON" ;p

#technique #inmemory #delegation #native #apis #Bypassing #behavior #pentester #securityresearcher

Last updated 2 years ago

ok , i want to share something for about " " or "" websites how much is good/helpful for you and how you can use them to make your own tools (very fast) but always as you will have your own so you need work hard on these things , i will create article about this but in this post i will show you with very basic steps you can make your own C# or C++ tools for [Remote thread injection Detection] as you can see in "you.com", my search for monitoring event-log [ ] via c# for two EID 8,25 (but you need process creation/network connection event ids too) and our search result have two codes which both have same result, so now with you can detect these event (king of real-time) also you need Memory scanner which my simple search result was something like this pic but i did not test that (for sure, is working or not) i had my own tools and C# codes ;D , ...

note : sometimes these codes in these AI platforms which made by others is better than your own old codes so you can replace them (for example for memory scanner i will test this simple code which seems is better and faster than some of part of my own codes ;D but should test in my LAB for sure..)

and finally you can see my own Blue-teaming "SysPM2Mon2.7.exe" tools (which background of code was something like these steps in these pictures but my memory scanner is "Pe-sieve.exe" + my own C# code for Memory scanner, i had 2 memory scanners in this tool ;D)
so as you can see As and i made my own Blue-teaming tools ( which is available in my github) so you can do same things with your own IDEA , but now with these "Chatgpt" , "YOU.COM" , ... websites you can make them faster and much better...
i will create an article about this but i am working on my things and research about my new ebook also some codes for ebook, so i am very busy to make article now but i will create that ;)

#blueteamers #chatgpt #youdotcom #ai #defensive #developer #bugs #sysmon #realtime #csharp #memoryscanner #pentester #securityresearcher #opensource #blueteam #redteam #pentesting #securityresearch

Last updated 2 years ago

Federico Maggi :verified: · @phretor
329 followers · 66 posts · Server infosec.exchange

RT @nullcon
🎄Last Day to Apply Santa's Holiday Special Code for !

😎Speakers are being announced, ☃️go grab your tickets soon 'DESANTA2023'👉bit.ly/3Tq3Em2

#nullconberlin #nullconde2023 #infosec #cybersecurity #conference #securityresearcher #hackers

Last updated 2 years ago

those Cyber Security guys which called itself or or "just because" they are in university (learning something As [basics ;D more often] or academic things or out-of-date things ;D) and they "did not have any Experience" in Cyber Security Fields (even 1 year) and some of them even did not have any good/unique/new Cyber Security Research or tools/codes (which shared before to public).
and yeah we call them beginner "geniuses" in cyber security lol

Vs

those Cyber Security Guys which they have at least 3-5 years experience of learning real/new/unique things in these fields like or or .

believe me your academic things are "Bullshit" and your instructors did not have updated content , they even don't have good viewpoint for cyber security fields like Penetration test or ... ,more often they don't have any experience of working with Offensive tools like Modern C2 servers, they don't know how you can write Offensive Codes like Writing server/agent (and why should do that) or they don't know how you can writing Offensive codes for bypassing or or other things ... you don't know about these things or a lot other things which you should learn them outside of university "by yourself".

you can learn these things from (with read Articles or Learn Courses which shared Publicly or Privately by and or or ) and you need at least 2-3 years experiences for learn these new things.

Some guys think if you know all tools in Kali linux then you can call yourself or Red-teamer, which is not true "geniuses".
Penetration testing is not about Tools , its about background "concepts" of tools omfg "remember this". (its about logic behind tools)

#pentester #redteamer #securityresearcher #penetrationtesting #redteaming #securityresearch #c2 #avs #edrs #Bypassing #infosec #communities #securityresearchers #pentesters #redteamers #blueteamers

Last updated 2 years ago


since 2020 i decided to write my Second but for some reasons this started since 2021 and now 50% of eBook is ready so setp-by-step CHM file will create ;D but still i have problem with this MS word hahaha for making simple html file, i am fan of Frontpage which we cant have in win10 ;( so...

Video : first steps to make Second eBook "How can be a ,"

#pentesting #redteam #blueteam #video #infosec #ebook #pentester #securityresearcher

Last updated 2 years ago

Simple Useful Method for and Security Researchers to learn new things
One simple way [] to learn new things is create Document for each thing you learn [step-by-step] with details and pictures with your “native language” etc. this will help you to rethink/rewrite those things which you want to learn, believe me this will help you a lot and sometimes you need to go back to these to read something so these will help you to read very fast old things which you learned years ago also making Video [step-by-step] will help too but if you have both THEN this will be very good for you also if you are (or want to be) or these things will help you to teach these things to students also will help to students to learn new things very fast and much better.
As you should make something like this chm file (help/documentation file [step-by-step]) for each things you want learn as “new thing” but remember this you should make this documents with very details also you need to make video about that too and your documents should have pictures of result (success/fail results) also pictures of bugs and pictures of your test on different OS targets like windows 7/10/11 and Servers too and …
Note: "These documentations should be part of your job always".

As you can see in this documentation (chm file) which I made years ago, I talked about basic of DNS service and Configuration via Server-side tools by example and pictures with my “Native Language”. So, after years I still can read that very fast again and learn some things which I learned so many years ago. But if you are or you should put your results of research/tests in this documentations (with details) too so as Pentester you will have lots of Documents and CHM/HTML files like this for each research or for each new hacking things or even new Pentest Projects in your own virtual LAB or ...
this is very little part of new chapter in my New eBook: "how can be a and " (this is my story about how i tried to work on these fields of ).

#pentesters #trick #documents #documentation #instructor #teacher #pentester #securityresearcher #penetrationtester #cyber #security

Last updated 2 years ago

this is my New which i am working on this
"how can be a and (this is my story about how i tried to work on these fields of Security)".

half of eBook is ready but still need to rewrite some parts of them, this is my story about Penetration Test and Security Research , in this ebook my goal is talking about my experience in 7-8 years ago and how i worked in these field of cyber security with Example and talking about story of each /Research Projects, my second goal is explaining these things step-by-step to Beginner or Security Researchers for learn how they can start their own things.
also i want to suggest to you all guys make something like this as eBook or Documentation for itself also share that for others in community and let them to learn from your Success and fails Pentest/Research projects and explain to them why you had/have successful/fail experience for each project and what things helped you or what things was necessary but you did not have that object or ... these things in your own free ebook or free documentation will helpful to others when read your experience by ebook or something like that especially when you talk about every thing step by step with pictures of success and fail things (with details) ;D, why not just do it for your friends and for your own infosec .
i am working on this New very hard and i will share this but still this ebook needs new chapters which i am thinking about them ;D

Note: "Cyber Security or Pentest or Teachers and Teachers should do this [without doubt] , i had very good Teaching experience with this method".

finally i want to say these are my experiences & this does not mean you should have experience like this exactly to work in these fields of cyber security, you will find your own style in and "Don't worry."

#ebook #penetrationtester #securityresearcher #cyber #pentest #pentesters #infosec #community #free #instructor #redteam #blueteam #penetrationtesting #securityresearch

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online