Pwnton Pack: An Unlicensed 802.11 Particle Accelerator

This past Christmas, I received a terrific gift from my in-laws: a replica Ghostbusters Proton Pack. I was thrilled. You see, growing up in the mid 80s, Ghostbusters was my jam. Fast forward 37 years and with the recent Ghostbusters: Afterlife film release, my nostalgia was hitting a fever pitch. Shortly after our Christmas dinner,…

The post Pwnton Pack: An Unlicensed 802.11 Particle Accelerator appeared first on TrustedSec.

Continue reading Pwnton Pack: An Unlicensed 802.11 Particle Accelerator

Splunk SPL Queries for Detecting gMSA Attacks

1    Introduction What is a group Managed Service Account (gMSA)? If your job is to break into networks, a gMSA can be a prime target for a path to escalate privileges, perform credential access, move laterally or even persist in a domain via a ‘golden’ opportunity. If you’re an enterprise defender, it’s something you need…

The post Splunk SPL Queries for Detecting gMSA Attacks appeared first on TrustedSec.

Continue reading Splunk SPL Queries for Detecting gMSA Attacks

Putting the team in red team

One of the more common questions we receive during a red team scoping call or RFP Q&A call is, how many dedicated consultants will be involved in the assessment? There is no “correct” answer to this question, and ultimately, the answer as to how red team engagements are staffed comes down to how the consultancy…

The post Putting the team in red team appeared first on TrustedSec.

Continue reading Putting the team in red team

Diving into pre-created computer accounts

I was on an engagement where I simply could not elevate privileges, so I had to become creative and look deep into my old bucket (bucket being my head) of knowledge, and this resulted in some fun stuff. I had found that the client had a vulnerable certificate template also known as ESC1 that allowed…

The post Diving into pre-created computer accounts appeared first on TrustedSec.

Continue reading Diving into pre-created computer accounts

Diving into pre-created computer accounts

I was on an engagement where I simply could not elevate privileges, so I had to become creative and look deep into my old bucket (bucket being my head) of knowledge, and this resulted in some fun stuff. I had found that the client had a vulnerable certificate template also known as ESC1 that allowed…

The post Diving into pre-created computer accounts appeared first on TrustedSec.

Continue reading Diving into pre-created computer accounts

ELFLoader: Another In Memory Loader Post

Intro Now that BOFs are commonplace for Windows agents, some people have talked about wanting a non-Windows only version. In this blog post, we’ve got something for you: the same thing but for Linux/Mac. The process of building in memory loaders are the same, no matter the file format type. In this case, we’ll just…

The post ELFLoader: Another In Memory Loader Post appeared first on TrustedSec.

Continue reading ELFLoader: Another In Memory Loader Post

g_CiOptions in a Virtualized World

With the leaking of code signing certificates and exploits for vulnerable drivers becoming common occurrences, adversaries are adopting the kernel as their new playground. And with Microsoft making technologies like Virtualization Based Security (VBS) and Hypervisor Code Integrity (HVCI) available, I wanted to take some time to understand just how vulnerable endpoints are when faced…

The post g_CiOptions in a Virtualized World appeared first on TrustedSec.

Continue reading g_CiOptions in a Virtualized World

Defending the Gates of Microsoft Azure With MFA

Since Russia’s invasion of Ukraine, companies based in the United States have been on alert for potential cyberattacks on IT infrastructure. Multi-Factor Authentication (MFA) has been one of the most recommended settings for organizations to turn on. Recently, the White House issued a FACT SHEET on how organizations can protect themselves against potential cyberattacks from…

The post Defending the Gates of Microsoft Azure With MFA appeared first on TrustedSec.

Continue reading Defending the Gates of Microsoft Azure With MFA

Persisting XSS With IFrame Traps

XSS Iframe Traps Longer Running XSS Payloads An issue with cross-site scripting (XSS) attacks is that our injected JavaScript might not run for an extended period of time. It may be a reflected XSS vulnerability where we’ve tricked our user into clicking a link, but when they land on the page where we were able…

The post Persisting XSS With IFrame Traps appeared first on TrustedSec.

Continue reading Persisting XSS With IFrame Traps

Making SMB Accessible with NTLMquic

This week, I dusted off my reading list and saw that I’d previously bookmarked an interesting article about the introduction of SMB over QUIC. The article from Microsoft showed that Windows was including support for SMB to be used over the QUIC protocol, which should immediately spark interest for anyone who includes SMB attacks as…

The post Making SMB Accessible with NTLMquic appeared first on TrustedSec.

Continue reading Making SMB Accessible with NTLMquic