SEKTOR7 Institute Profile Banner
SEKTOR7 Institute Profile
SEKTOR7 Institute

@SEKTOR7net

Followers
12,667
Following
338
Media
261
Statuses
1,070

Homo Aptus. Vincit qui se vincit - Publilius Syrus. Consulting, Training, Technology, Cyber domain, and more... @x33fcon supporter.

SEKTOR7.net
Joined April 2019
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@SEKTOR7net
SEKTOR7 Institute
1 year
Big news! RTO: Evasion course has been updated with text supplements giving extra context and information Also each video has English subtitles with short table of contents and time markers to discussed content Understanding and navigation should be easier! Enjoy! #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@SEKTOR7net
SEKTOR7 Institute
3 years
The RED TEAM Operator: Windows Evasion course is back online! Enjoy! #RTO #redteam #onlinelearning
Tweet media one
5
66
242
6
48
193
@SEKTOR7net
SEKTOR7 Institute
10 months
Bypassing Crowdstrike Falcon EDR hooks with targeted algo, decomposing agent's hooking logic. Although extremely Falcon-specific, nevertheless good exercise for any maldev. Great work, @inbits_sec ! #redteam
3
200
517
@SEKTOR7net
SEKTOR7 Institute
4 months
Wondering what telemetry an EDR collects? Wonder no more! @Kostastsale and @ateixei run an EDR Telemetry Project, covering all major EDRs: "The main goal of the EDR Telemetry project is to encourage EDR vendors to be more transparent about the telemetry they provide". Blog:
Tweet media one
7
221
517
@SEKTOR7net
SEKTOR7 Institute
2 years
Here we go! Pre-sale of RTO: MalDev Advanced (Vol.1) is now open Pre-sale end: Sep 27th Course release date: Sep 28th Userland rootkit tech, building MSVC COFFs, custom "RPC" instrumentation and more... You can't miss it! #RTO #redteam #onlinelearning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
15
124
447
@SEKTOR7net
SEKTOR7 Institute
2 years
A primer to EDR evasion for Red Teamers, by Jorge Gimenez & Karsten Nohl. Main takeaway: "EDRs are mostly Cobalt Strike detecting tools [these days]" 😆
5
105
382
@SEKTOR7net
SEKTOR7 Institute
3 years
Helpful cheat sheet when designing your offensive code. (source: ) #redteam
Tweet media one
0
150
376
@SEKTOR7net
SEKTOR7 Institute
4 years
Credentials Guard enabled preventing access to clear text passwords? N4kedTurtle: "Hold my beer!" Patch 2 global vars and enjoy your clear text creds again! Btw. Microsoft sees no issue here ;) Good post with a contribution from @_xpn_ : #redteam #RTO
Tweet media one
Tweet media two
6
153
364
@SEKTOR7net
SEKTOR7 Institute
2 years
Ukraine needs support! SEKTOR7 has already donated to Polish Red Cross, but there's something we can do more. Thus we give out a 50% discount on all our courses and donate all the income to the Polish Red Cross Please share/retweet #StandWithUkraine 🌻
18
192
311
@SEKTOR7net
SEKTOR7 Institute
3 years
"Antivirus evasion by user mode unhooking on Windows 10" paper by Tom Broumels and Sander Ubink /CC @Cneelis @slaeryan
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
138
309
@SEKTOR7net
SEKTOR7 Institute
2 years
New RTO course released. Enjoy! #RTO #redteam #onlinelearning
Tweet media one
6
89
307
@SEKTOR7net
SEKTOR7 Institute
1 year
RPC is (still) an integral part of Windows. Understanding how it works is crucial to finding new and unexpected paths throughout the system. Great post by Aaron LeMasters of @trailofbits
0
102
286
@SEKTOR7net
SEKTOR7 Institute
10 months
ShellGhost - VEH-based shellcode execution, by lem0nSec. #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
97
268
@SEKTOR7net
SEKTOR7 Institute
1 year
Flying through Windows domain with stolen tokens via Windows API, by Aurelien Chalot. #redteam
Tweet media one
3
74
262
@SEKTOR7net
SEKTOR7 Institute
2 years
No ReadProcessMemory / WriteProcessMemory due to monitoring? Do not despair. You still can get/set data in the remote process. @x86matthew has one of the answers. Great work!
Tweet media one
3
72
261
@SEKTOR7net
SEKTOR7 Institute
1 year
A few methods to play with Windows Defender, by FO-Sec #redteam https[:]//www.fo-sec.com/articles/10-defender-bypass-methods
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
81
258
@SEKTOR7net
SEKTOR7 Institute
3 years
Rule #8 . "Be invisible by being common"
1
82
244
@SEKTOR7net
SEKTOR7 Institute
3 years
The RED TEAM Operator: Windows Evasion course is back online! Enjoy! #RTO #redteam #onlinelearning
Tweet media one
5
66
242
@SEKTOR7net
SEKTOR7 Institute
4 years
Excellent piece of "offensive" research by @FSecureLabs That's exactly what every #redteam should research. Your edge, as an attacker, doesn't come from a new shiny tool. It comes from knowing something the other side doesn't know that you know, ya'know?
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
100
239
@SEKTOR7net
SEKTOR7 Institute
4 years
Announcement! New course incoming: RED TEAM Operator: Windows Persistence. Release date: May 27th, 2020; 12:00 UTC (Zulu time) #RTO #redteam #Pentesting #onlinelearning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
58
240
@SEKTOR7net
SEKTOR7 Institute
3 years
Perun's Fart - yet "another" unhooking method. Just load a clean NTDLL from a newly spawned process, copy bytes and enjoy life.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
92
235
@SEKTOR7net
SEKTOR7 Institute
4 years
RED TEAM Operator: MalDev Intermediate course is finally out! Over 6h of fun with debuggers, assembly/C code and troubleshooting all the moving parts on Windows 10. And testing new skills with assigned tasks. Good stuff! Enjoy! #redteam #onlinelearning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
75
232
@SEKTOR7net
SEKTOR7 Institute
5 years
No netcat/telnet/bash/python/ruby/php on board when rev|bind shell is needed? Some good old and updated gawk remote shellz with #Phrack , and @thegrugq in the context.
Tweet media one
0
104
219
@SEKTOR7net
SEKTOR7 Institute
1 year
Modifying reflective loader with Mockingjay technique. A post by Riccardo Ancarani ( @dottor_morte ) #redteam
Tweet media one
Tweet media two
3
70
212
@SEKTOR7net
SEKTOR7 Institute
1 year
A story of a passing time in a sandbox, by Jordan Jay ( @0xLegacyy ) #redteam
7
53
207
@SEKTOR7net
SEKTOR7 Institute
1 year
Detecting bread crumbs of lateral movement, by Nicolas Biscos @Synacktiv #redteam
2
68
200
@SEKTOR7net
SEKTOR7 Institute
8 months
Are you ready?! #redteam
Tweet media one
7
21
194
@SEKTOR7net
SEKTOR7 Institute
3 years
Halo's Gate - bypassing hooks with Hell's Gate twin. Shout out to @smelly__vx and @am0nsec for their HG project. Great work guys!
Tweet media one
Tweet media two
1
82
193
@SEKTOR7net
SEKTOR7 Institute
3 years
Ten OPSEC Principles of Offensive Operator
Tweet media one
2
60
188
@SEKTOR7net
SEKTOR7 Institute
3 years
If you ever need to find a specific Win API function delivering a wanted feature and don't know where to start, go to this MSDN resource: It has everything you need. API reference by feature, header files, COM, RPC, even API Sets.
2
66
182
@SEKTOR7net
SEKTOR7 Institute
4 years
Modern post-exploitation execution and PSP evasion starts to look more like a recent multi-level exploit chains 😀 A good example by @BlackArrowSec - bypassing EDR and C2 restrictions, with a small reference to @hasherezade work. Source: Good read!
Tweet media one
2
84
189
@SEKTOR7net
SEKTOR7 Institute
4 years
Reversing C++ executables with OOAnalyzer Ghidra Plugin
Tweet media one
2
58
182
@SEKTOR7net
SEKTOR7 Institute
3 years
Few evasion tips & tricks against modern detection tech, with Falcon as an example EDR (which can be a PITA sometimes :) And, as a bonus, 2 offensive tools for Cobalt Strike - ScareCrow and SourcePoint. Nice work, @Tyl0us ! #redteam
0
70
182
@SEKTOR7net
SEKTOR7 Institute
4 years
"RED TEAM Operator: Windows Persistence" released! Includes methods used in #Stuxnet , Flame and by #EquationGroup , Turla or ProjectSauron. 25% discount, valid till June 10th, 2020 Link with discount: Enjoy and please RT! #redteam #RTO #onlinelearning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
68
180
@SEKTOR7net
SEKTOR7 Institute
1 year
Hooks without custom exception-handler or changing memory protection? @x86matthew : hold my beer! Introducing StealthHook - controlling the execution flow of the target function by intercepting return addresses in the nested function call stack.
Tweet media one
1
66
176
@SEKTOR7net
SEKTOR7 Institute
1 year
Compromising an endpoint under a nose of Windows Defender ATP, by FO-Sec #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
53
170
@SEKTOR7net
SEKTOR7 Institute
1 year
Making your CS beacon undetectable from both on-disk and in-memory YARA scanning, by William Burgess ( @joehowwolf ) #redteam
0
57
174
@SEKTOR7net
SEKTOR7 Institute
2 years
Very intriguing report from Pangu Lab about advanced, allegedly NSA's, top-tier backdoor - Bvp47. Features are indeed impressive. The last screenshot is very telling. source: #ShadowBrokers #EquationGroup
Tweet media one
Tweet media two
Tweet media three
3
64
169
@SEKTOR7net
SEKTOR7 Institute
6 months
It was well described by @Jackson_T - basically there are 4 distinct areas when it comes to EDR evasion: - blending in - sensor avoidance - abusing blind spots - tampering sensors (including traffic manipulation) Sensor avoidance is something a lot of peeps miss. More on this:
@matterpreter
Matt Hand
6 months
When do you consider an EDR evasion to be successful? If it's something else, please let me know in the comments.
25
11
38
0
41
173
@SEKTOR7net
SEKTOR7 Institute
10 months
Detecting fileless malware with memory controller, by @MarcusBotacin #redteam
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
56
166
@SEKTOR7net
SEKTOR7 Institute
4 years
"RED TEAM Operator: Privilege Escalation in Windows" is OUT! 20 different LPE techniques 30% discount, valid till May 3rd, 2020 Access to content: lifetime Link with discount: Enjoy and please RT! #redteam #Pentesting #RTO #Malware #onlinelearning
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
66
171
@SEKTOR7net
SEKTOR7 Institute
9 months
Digging deeper to blind EDR again, by @vikingfr #redteam
0
48
162
@SEKTOR7net
SEKTOR7 Institute
2 years
Let the Black Friday begin! 25% off from the regular price. To get the discount use the code: BEFICOM-22 Cyber Monday is a deadline, so don't wait too long! #RTO #redteam #onlinelearning
Tweet media one
4
51
157
@SEKTOR7net
SEKTOR7 Institute
1 month
Windows Processes, Nefarious Anomalies, and You: Memory Regions, by Brandon McGrath of @TrustedSec #redteam #maldev
1
50
150
@SEKTOR7net
SEKTOR7 Institute
10 months
A tale of tampering with EDR's Anti-tempering feature, by @dottor_morte #redteam
0
51
147
@SEKTOR7net
SEKTOR7 Institute
4 years
Excellent course notes from one of the students of RTO: Malware Development course. Enjoy! #RTO #redteam #onlinetraining
1
48
151
@SEKTOR7net
SEKTOR7 Institute
2 years
New tool released! CaFeBiBa - COFF object parser for binaries compiled with MSVC. Enjoy! #redteam #rto
3
43
150
@SEKTOR7net
SEKTOR7 Institute
3 years
Black Week has started @ SEKTOR7 Institute! For the next 7 days you can purchase any course with $30 off the regular price. Cyber Monday is a deadline, so don't wait too long! #RTO #redteam #onlinelearning
Tweet media one
7
57
146
@SEKTOR7net
SEKTOR7 Institute
2 months
Interesting dark corners of C #redteam #maldev
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
33
142
@SEKTOR7net
SEKTOR7 Institute
3 years
"Be invisible by being common".
0
55
142
@SEKTOR7net
SEKTOR7 Institute
1 year
Hunting maliciousness with sequencing Windows system calls, by Marco Ramilli #redteam
1
37
137
@SEKTOR7net
SEKTOR7 Institute
2 years
Detecting already in-memory loaded artifacts from kernel in real time, by @alonsocandado
2
59
137
@SEKTOR7net
SEKTOR7 Institute
5 years
Hooking ZwOpenProcess(), GetExtendedTcpTable() and GetRTTAndHopCount() in unnamed AV process to hide malicious payloads. Userland rootkits are alive and kicking :)
Tweet media one
Tweet media two
Tweet media three
2
78
137
@SEKTOR7net
SEKTOR7 Institute
9 months
Exploiting weak spots with EDR telemetry, by Julian Horoszkiewicz of @Atos #redteam
0
48
133
@SEKTOR7net
SEKTOR7 Institute
1 year
Sailing Windows waters with @ElephantSe4l and @DaniLJ94 as your navigators.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
48
135
@SEKTOR7net
SEKTOR7 Institute
2 months
Using undocumented data structures for keylogging in kernel space, by @eversinc33 #redteam #maldev
Tweet media one
Tweet media two
1
35
134
@SEKTOR7net
SEKTOR7 Institute
4 years
New RTO series course is coming! Pre-sales of Malware Development Intermediate is open! Official launch day: October 24th, 2020 Current price: $199 net You can't miss this one! #redteam #onlinelearning
Tweet media one
3
49
132
@SEKTOR7net
SEKTOR7 Institute
3 years
A story of /proc/self/mem writing to its own non-writable memory: That's why injecting meterpreter into 'dd' process without touching disk is possible:
Tweet media one
0
42
117
@SEKTOR7net
SEKTOR7 Institute
2 years
RED TEAM Operator: Malware Intermediate course discount is up! Valid for the next 2 weeks! Click the link below to get a reduced price. #redteam #onlinelearning #RTO
Tweet media one
Tweet media two
4
40
129
@SEKTOR7net
SEKTOR7 Institute
9 months
Another callback... That's it. That's the tweet. 😎 #redteam
Tweet media one
2
31
126
@SEKTOR7net
SEKTOR7 Institute
2 years
Our campaign is over. Results are just mind blowing! We've collected almost $81k and all goes to Polish Red Cross ( @PolskiCK ) to support Ukrainian refugees fleeing the war zone. I'd like to personally thank all of you who supported the cause! reenz0h #HelpforUkraine 🌻🌻🌻
@SEKTOR7net
SEKTOR7 Institute
2 years
Ukraine needs support! SEKTOR7 has already donated to Polish Red Cross, but there's something we can do more. Thus we give out a 50% discount on all our courses and donate all the income to the Polish Red Cross Please share/retweet #StandWithUkraine 🌻
18
192
311
8
19
126
@SEKTOR7net
SEKTOR7 Institute
1 year
3-day Late Spring Sale! 25% off on ALL courses. Use the following link to apply the discount code: Promo ends this Wednesday (EoD Zulu)! #redteam #elearning
Tweet media one
4
40
119
@SEKTOR7net
SEKTOR7 Institute
4 years
Offensive use of Detours hooks to steal NT hashes. All students of RTO: MalDev Intermediate course should pretty quickly digest information from the post: Enjoy the reading! #redteam #RTO
Tweet media one
Tweet media two
2
62
123