#postexploitation

2025-05-16

Skitnet is shaking up the cybercrime scene—this stealthy ransomware tool is now powering high-stakes attacks by notorious groups. Ever wonder how hackers pull off such seamless heists? Dive into the story behind the tool that's rewriting the rules.

thedefendopsdiaries.com/skitne

#skitnet
#ransomware
#cybersecurity
#postexploitation
#blackbasta

2025-05-16

Skitnet is shaking up the ransomware scene with stealthy tactics and jaw-dropping capabilities—already in use by notorious gangs. What does this mean for our digital defenses? Dive into the details.

thedefendopsdiaries.com/skitne

#skitnet
#ransomware
#cybersecurity
#postexploitation
#blackbasta

DeadSwitch @ T0m's 1T C4feTomsITCafe
2025-05-06

They don’t need malware. They weaponize what’s already trusted - PowerShell, WMI, CertUtil. This is Living Off the Land. Defend or be devoured.

tomsitcafe.com/2025/05/06/livi

:mastodon: deciodecio@infosec.exchange
2025-01-09

⚠️ Nouvelle vulnérabilité Zero-Day ciblant les VPN Ivanti Connect Secure (CVE-2025-0282)

#Mandiant a publié les premiers signes d'exploitation (avec une première attribution à UNC5337) :

🔍 Étapes courantes identifiées lors de l'exploitation :
1️⃣ Désactive SELinux
2️⃣ Bloque le transfert des journaux syslog
3️⃣ Re-monte le disque en lecture-écriture
4️⃣ Écrit un script malveillant
5️⃣ Exécuter ce script
6️⃣ Déploie un ou plusieurs web shells
7️⃣ Modifie les journaux pour cacher l'activité
8️⃣ Réactive SELinux
9️⃣ Re-monte le disque

🛑 Techniques de dissimulation post-exploitation :

  • Suppression des messages kernel avec dmesg et modification des journaux de débogage.
  • Effacement des dumps de l'état et des core dumps des crashs.
  • Suppression des entrées liées aux échecs syslog, erreurs ICT internes, traces de crash et erreurs de certificat.
  • Modification du journal d’audit SELinux pour masquer les commandes exécutées.

💡 Observations supplémentaires :

CVE-2025-0282 affecte plusieurs niveaux de patch d’ICS release 22.7R2.

Exploitation réussie dépendante de la version spécifique.

Des requêtes répétées au VPN sont observées avant exploitation, probablement pour identifier la version.

🗂️ Fichiers ciblés :
/dana-cached/hc/hc_launcher.22.7.2.2615.jar
/dana-cached/hc/hc_launcher.22.7.2.3191.jar
/dana-cached/hc/hc_launcher.22.7.2.3221.jar
/dana-cached/hc/hc_launcher.22.7.2.3431.jar

⚠️Mandiant informe avoir observé des signes d'exploitation active en nature depuis mi-décembre 2024.

"Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation"
👇
cloud.google.com/blog/topics/t

#CyberVeille #Ivanti #IoC #postexploitation
#attribution
#CVE_2025_0282 #CVE_2025_0283

2023-03-23

Now that you’ve seen #WhatTheVuln Episode 2 featuring Lindsay Von Tish and Allan Cecil, check out the corresponding technical write-up where you can take a deep dive into how to use #LoLBins to bypass #EDR protection and install a #C2 agent for advanced #postexploitation control.

And don’t fret if you missed the initial livestream – you can watch the recording on demand! bfx.social/3K4T1mS


P.S. Episode 3 is on the way!

2022-12-10

How common is it for a PHP install to support curl_* functions or at least not have them filtered?
#pentesting #postexploitation #php

2022-12-05

Check out this list of #postexploitation tools we enjoy using in our #pentesting work, such as:

- Mimikatz
- PowerHub
- Bashark
- And Metasploit of course!

See the full list: bishopfox.com/blog/post-exploi

2022-11-21

During post-exploitation, how do you prefer to name/identify the systems?
#postexploitation #pentesting

2022-11-19

Other than MITRE ATT&CK which is very broad and exhaustive, is there a attribute list for "capabilities" or "functionality" (or whatever you want to call them) that exploits or payloads grant the user? I'm looking for things like command-exec, file-read, file-write, etc.
#infosec #taxonomy #postexploitation #mitreattck

Cypherpunkcypherpunk
2019-08-31

Find out what passwords are stored and where on your PC with LaZagne:
github.com/AlessandroZ/LaZagne

WetzWetz' OnlyFriends 🥵🔞markuswet@toot.io
2018-12-12

"Ok, I just became domain admin..... so..... what now??"

#pentest #whitehathacking #postexploitation #activedirectory #domainadmin #postpostexploitstion

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst