www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-29T09:17:36+00:00 www.secnews.physaphae.fr AliceCliment-Pommeret - Chercher Cyber Trouver et exploiter les conducteurs de tueurs de processus avec LOL pour 3000 $<br>Finding and exploiting process killer drivers with LOL for 3000$ This article describes a quick way to find easy exploitable process killer drivers. There are many ways to identify and exploit process killer drivers. This article is not exhaustive and presents only one (easy) method. Lately, the use of the BYOVD technique to kill AV and EDR agents seems trending. The ZeroMemoryEx Blackout project, the Terminator tool sold (for 3000$) by spyboy are some recent examples. Using vulnerable drivers to kill AV and EDR is not brand new, it’s been used by APTs, Red Teamers, and ransomware gangs for quite some time.]]> 2023-06-09T15:42:46+00:00 https://alice.climent-pommeret.red/posts/process-killer-driver/ www.secnews.physaphae.fr/article.php?IdArticle=8383840 False Ransomware,Tool,Technical None 4.0000000000000000 AliceCliment-Pommeret - Chercher Cyber Bypass EDR: comment et pourquoi décrocher le tableau d'adresse d'importation<br>EDR Bypass : How and Why to Unhook the Import Address Table One day, I was trying to bypass an EDR and I noticed something interesting. The EDR I was trying to bypass wasn’t hooking the DLL in their code with jmp instruction like other EDRs in user-land. In this case, it was hooking directly the Import Address Table. This technique makes the usual move like live-patching, or erasing the loaded DLL with one freshly loaded from disk useless. I had to unhook the Import Address Table of my process.]]> 2022-05-27T11:33:26+00:00 https://alice.climent-pommeret.red/posts/how-and-why-to-unhook-the-import-address-table/ www.secnews.physaphae.fr/article.php?IdArticle=8383855 False Technical None 4.0000000000000000 AliceCliment-Pommeret - Chercher Cyber Un voyage syscall dans le noyau Windows<br>A Syscall Journey in the Windows Kernel The analysis on this post was made from a Windows 10 x64 bits. If you are trying to compare the content of this post on a lower Windows version you will be disappointed since changes were made in Windows 10. In my last post dedicated to the different ways to retrieve Syscall ID, I explained quickly how direct syscalls were performed in User Mode and remained vague about how it was processed in Kernel Mode.]]> 2022-03-24T12:12:24+00:00 https://alice.climent-pommeret.red/posts/a-syscall-journey-in-the-windows-kernel/ www.secnews.physaphae.fr/article.php?IdArticle=8383856 False Technical None 4.0000000000000000 AliceCliment-Pommeret - Chercher Cyber EDR Bypass: Récupération de Syscall ID avec Hell \\'s Gate, Halo \\'s Gate, Freshycalls and Syswhispers2<br>EDR Bypass : Retrieving Syscall ID with Hell\\'s Gate, Halo\\'s Gate, FreshyCalls and Syswhispers2 This post is not an extensive presentation of Hell’s Gate1, Halo’s Gate, FreshyCalls2 or Syswhispers23. You can find detailed explaination on these techniques on their Github repo, various articles and the amazing Sektor7 Windows Evasion Course4. So whats the point of this article then ? Well, I find the various techniques used to dynamically retrieve syscall identifiers very interesting and I wanted to present the difference between them. Soooo let’s begin shall we ?]]> 2022-01-29T20:13:54+00:00 https://alice.climent-pommeret.red/posts/direct-syscalls-hells-halos-syswhispers2/ www.secnews.physaphae.fr/article.php?IdArticle=8383857 False Technical None 3.0000000000000000 AliceCliment-Pommeret - Chercher Cyber Jouer avec Named Pipe et NotPetya<br>Playing With Named Pipe and NotPetya A long time ago, in a galaxy far far away, I was having fun reversing NotPetya. Files dropped by NotPetya During the dynamical analysis, I identified some files dropped on the disk by the sample. Files dropped in the disk An executed file using named pipe One of them caught my eye: it is executed by the sample with a named pipe argument. A binary executed with named pipe argument]]> 2021-12-05T19:50:59+00:00 https://alice.climent-pommeret.red/posts/playing-with-named-pipe-and-notpetya/ www.secnews.physaphae.fr/article.php?IdArticle=8383858 False Technical NotPetya 4.0000000000000000 AliceCliment-Pommeret - Chercher Cyber Contourner le chiffrement du disque Linux<br>Bypass Disk Encryption Linux We are going to learn how to steal the passphrase of a drive encrypted with default setup on a Debian distribution. How? Through physical intrusion! The general idea is simple. By default, disk encryption on Debian (and many other distributions) doesn’t encrypt the \boot directory. Even if full disk encyprtion is available via Grub2… To perform this attack, we are going to use a Live USB on the target machine. Using the live USB, we are going to modify the script asking the passphrase (located in /boot) to make it write, in a text file, the passphrase typed by the victim.]]> 2021-12-05T15:45:20+00:00 https://alice.climent-pommeret.red/posts/bypass-disk-encryption-linux/ www.secnews.physaphae.fr/article.php?IdArticle=8383859 False None None 3.0000000000000000