How a threat actor moves laterally through a network

This article delves into the techniques utilized by threat actors while navigating a company’s network laterally. Its objective is to assist network administrators in comprehending the risks tied to lateral movement, unraveling the process, and outlining preventive measures.
Read more →

Outsmarting Antivirus [Echo AC Edition]

This article explores the exploitation of the EchOh-No vulnerability regarding the kernel driver of an anticheat tool used for Minecraft, Rust, FiveM and Roblox. The primary objective of this exploit is to disable antivirus and/or endpoint detection and response (EDR) defenses present on computer systems. The feasibility of this objective is demonstrated through the use of a Proof-of-Concept (PoC).
Read more →

Masquerading Process Environment Block (PEB) using Rust

This article delves into the intricate technique of masquerading the process environment block within one’s own process, ingeniously making it indistinguishable from explorer.exe. The primary objective of this study is to present a comprehensive Proof-of-Concept (PoC) developed in the Rust programming language. Through this PoC, the article effectively demonstrates the seamless transformation of the process into an authentic explorer.exe instance when examined using a debugger.
Read more →

Obtaining the latest decrypted firmware version for DIR-842

In this article, we will explore the process of obtaining the latest decrypted firmware version, 3.13B05, developed by D-Link for the AC12000 Wireless Router model DIR-842. The knowledge required for reverse engineering the firmware has been gathered from reputable sources such as randorisec.fr, zerodayinitiative.com, and ucgjhe.github.io
Read more →