November 6, 2024
November 6, 2024
Resources on Satellite hacking CTFs
— 0xor0ne (@0xor0ne) November 5, 2024
Satellite Hacking Demystified: https://t.co/hGDo9jKO7W
Hack-a-sat writeups: https://t.co/PIkGXuAKSN
Hack-a-sat players corner: https://t.co/aQwVw117nU#cybersecurity #ctf pic.twitter.com/Pr58RfDWFy
Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems.
— nyxgeek (@nyxgeek) November 5, 2024
On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around. pic.twitter.com/GpWN7MkPN8
This incident was identical to the behavior of a compromised account as described in this recent article https://t.co/VJtxKcxNjd
— mthcht (@mthcht) November 5, 2024
--- TimeLine (9 days session) ---
[Day 1]
Initial Compromise
- The victim received a phishing email with a subject line similar to "… shared …… https://t.co/t6I1noywz3 pic.twitter.com/N84AM06wVn
I recently co-authored a @Unit42_Intel blog about a unique IR case in which a threat actor’s custom EDR bypass (using #BYOVD) exposed their toolkit, methods, and even identity. Check out how we unmasked them through an opsec slip-up! #dfir https://t.co/TRvedMDQUL
— Renzon (@r3nzsec) November 4, 2024
When working on Magika (Google's AI-powered content-type detection), I checked other file formats KBs and detection engines to create filesets to train the model on.
— Ange (@angealbertini) November 5, 2024
I gave a talk at HackLu to share an overview of the existing engines.https://t.co/arOmJNOgh6
Suddenly I feel extremely old pic.twitter.com/hc80mDOuj8
— Jen Gentleman 🌺 (@JenMsft) November 5, 2024
Google fixes two Android zero-days used in targeted attacks - @billtoulashttps://t.co/xnKaxrGUwvhttps://t.co/xnKaxrGUwv
— BleepingComputer (@BleepinComputer) November 5, 2024
📌Active Directory Attacks
— Harshleen Chawla (@harshleenchawl2) November 5, 2024
Complete Guide📝
🔗https://t.co/pOKwLAyHJW pic.twitter.com/fz07EQ0CYC
Happy to announce the first release of @northpolesec Santa version 2024.10 https://t.co/LWtk144DfF
— Pete Markowsky (@PeteMarkowsky) November 5, 2024
Highlights:
1. Streamlined UI with silencing options and copy to data to clipboard features pic.twitter.com/JEo5w3sEjb
Useful built-in macOS command-line utilities
https://weiyen.net/articles/useful-macos-cmd-line-utilitiesHappy to announce the fourth release of 'Scripting with Ghidra'! In this episode, we dive into using Ghidra's API to create control flow graphs. check it out: https://t.co/enNqMOMsuw
— Simaei (@ArastehCma) November 5, 2024
Exploiting the Lexmark PostScript Stack by @FidgetingBits https://t.co/5kHhXEIIIa pic.twitter.com/iYLIOO3nwc
— Alex Plaskett (@alexjplaskett) November 5, 2024