Open in app

Sign in

Write

Sign in

Angelystor
Angelystor

85 Followers

Home

About

Nov 12

Using SSL Certificates for Red Team Payloads

This idea came out when I was musing about giving the blue team something different to look at. In a stock or minimal Linux box, there usually aren’t many different ways to get your payload into it other than our good ole curl or wget. After some googling, I came…

Red Team

6 min read

Using SSL Certificates for Red Team Payloads
Using SSL Certificates for Red Team Payloads
Red Team

6 min read


Jul 11

Understanding TCC

TCC (Transparency, Consent and Control), is built into MacOS as a means to protect sensitive user data from access by applications. The idea is such that no application can access such user data without the user’s permission (but asked only once). TCC covers a wide spectrum of data within the…

Macos

12 min read

Understanding TCC
Understanding TCC
Macos

12 min read


Jul 10

Phishing with Evilginx2

Evilginx 2 is this super cool proxy framework that helps hardworking red teamers do phishing with ease. Gone are the days where you would have to painstakingly craft the website to look exactly like the target website manually. The diagram below is where Evilginx sits. It transparently proxies the connection…

Red Team

7 min read

Phishing with Evilginx2
Phishing with Evilginx2
Red Team

7 min read


Jun 24

Using RASP to look for evil in Java programs

Welcome to Part 2 of my previous post on loading a Java class in Tomcat. A possible way to stop this kind of attack would be to dynamically instrument the JVM to ensure that unknown classes are either prevented from loading or flagged to the SOC team. …

Java

4 min read

Using RASP to look for evil in Java programs
Using RASP to look for evil in Java programs
Java

4 min read


Jun 4

Dynamically loading Java implant from a remote source to Tomcat

I had a situation where I could do JNDI injection into a Tomcat server leading to RCE. While off the shelf solutions such as this Github repo could work and invoke system commands, I wanted to take advantage of this unique vulnerability and push harder to create a unique implant…

Cybersecurity

7 min read

Dynamically loading Java implant from a remote source to Tomcat
Dynamically loading Java implant from a remote source to Tomcat
Cybersecurity

7 min read


May 30

Reversing an enterprise Golang application

Recently I needed to reverse engineer an application as I needed to figure out its login mechanisms. The diagram below is a high level diagram of its layout and it shall henceforth be collectively referred to as The Application. The primary question I wanted to answer was: Could I clone…

Golang

12 min read

Reversing an enterprise Golang application
Reversing an enterprise Golang application
Golang

12 min read


Published in

CSG @ GovTech

·Jan 5, 2022

When You Have No Money and Want to Find Bugs in Routers: Emulating Embedded Devices for Vulnerability Research

Introduction A few months ago, the team decided to stretch our wings and conduct vulnerability research on embedded devices. Due to budgetary and time constraints, we decided to focus on two devices, a Synology NAS, and a Netgear router. This article will focus on the process of emulating a router, specifically…

Csg

11 min read

When You Have No Money and Want to Find Bugs in Routers
When You Have No Money and Want to Find Bugs in Routers
Csg

11 min read


Published in

CSG @ GovTech

·Jul 14, 2021

Why doesn’t my shellcode work anymore?

Introduction Most shellcode available on the internet comprises of two portions: a payload that is usually generated by msfvenom, and C boilerplate code to call it. The compilation process is also routine, with many articles recommending to specify “execstack” to the linker, which sets the GNU_STACK header to “executable”. However, if…

Cybersecurity

4 min read

Why doesn’t my shellcode work anymore?
Why doesn’t my shellcode work anymore?
Cybersecurity

4 min read


Mar 30, 2021

Troubleshooting Program Stability using DynamoRIO

Program stability is somewhat different with regards to fuzzing versus how we generally perceive it. Generally, we perceive program stability as — the program behaves in a consistent fashion and does not crash when we do an operation multiple times without restarting. A simple example for this would be opening…

Fuzzing

6 min read

Troubleshooting Program Stability using DynamoRIO
Troubleshooting Program Stability using DynamoRIO
Fuzzing

6 min read


Feb 11, 2021

How to Get Libraries to Load in Fixed Addresses

Problem I was using DynamoRIO to do instruction tracing to troubleshoot the runtime execution stability of my program and a DLL it was loading and realised that I could not easily diff the files as the addresses were always different. The output shown in Figure 1 illustrates a trace. My program…

Dynamorio

5 min read

How to Get Libraries to Load in Fixed Addresses
How to Get Libraries to Load in Fixed Addresses
Dynamorio

5 min read

Angelystor

Angelystor

85 Followers
Following
  • Medium

    Medium

  • Max chee

    Max chee

  • Google

    Google

  • Jay Freeman (saurik)

    Jay Freeman (saurik)

See all (7)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams