th3s1nn3r Security Researcher A guy with transverse infosec skills, with zero interest in web app pentesting.

Corelan's QuickZip write-up

This is my first write-up dealing with binary exploitation, covering a BOF SEH-based vulnerability that is about a decade old.

DoublePulsar Free Service

Why does this service matter ?

The Advanced Equation Group’s toolset leaked by Shadow Brokers is being more and more used by street-level cybercriminals, as was reported by this trendmicro blog post earlier this month. But, taking a close look at the rudimentary, unsophisticated way, they have used the toolset (see image below), it makes no… BLAH HERE

Plug-and-Play Usermode DoublePulsar Implant!

Not a while ago, while doing malware research for a company as an independent security researcher, I had to find an effective, and compact In-Memory DLL injection method, that will render the piece of code I was tasked to create, fully modular. Stealth, was another desired feature. I didn’t have time, nor the knowledge to make one as effective as I wanted it to be, from the ground up (lots of issues to deal with: different Windows OS versions, OS architecture, compactness at assembly level, …), so I had to search for an existing one. DoublePulsar implant, part of the ShadowBrokers’s leak was the newest of them all, made by NSA gurus, and had had success in the famous WannaCry attack.

Setting Up Security Onion

This post is going to be about setting up a complete installation and configuration of the Open-Source Security Onion Linux distribution. We’ll start with a simple lab containing SO, Kali virtual machines turning on VirtualBox, and our Host. So, let’s get started !!

Transport Layer Security (TLS/SSL)

[Warning : Unfinished post]

© 2016 - 2021 hehinfosec - Infosec Blog. Made with