- Dec 2, 2024 Write, debug and execute BOFs using bof-launcher (part 1)
Our bof-launcher project allows you to write, build, debug and execute BOFs using
Zig, C and/or assembly language on Windows (x86/x64) and Linux (x86/x64/ARM/AARCH64).
Tags: toolbox, adversarial-attack-simulation, bof-launcher, BOF
- Jul 8, 2024 [PL] TIBER-EU i DORA szansą na budowanie realnej cyberodporności w sektorze finansowym
Prawodawstwo unijne w ostatnich latach jest coraz bardziej aktywne w kwestiach związanych z szeroko pojętym cyberbezpieczeństwem. Komisja Europejska bez wątpienia dostrzega problematykę braku odpowiedniego ogólnego poziomu cyberbezpieczeństwa w państwach członkowskich i aktywnie działa na rzecz poprawy sytuacji. Wystarczy wspomnieć tu o The EU Cybersecurity Act, czy od dawna już obowiązującą dyrektywę NIS (ang. Directive on Security of Network and Information Systems), która weszła w życie w 2016 roku, a na grunt krajowego porządku prawnego została wprowadzona jako Krajowy System Cyberbezpieczeństwa (KSC) w 2018 roku. W tym roku czeka nas również aktualizacja KSC o unijną dyrektywę NIS 2. Odpowiedni projekt ustawy trafił ostatnio do konsultacji publicznych.
Tags: TIBER-EU, DORA, adversarial-attack-simulation
- May 13, 2024 [PL] TIBER-EU i DORA szansą na budowanie realnej cyberodporności w sektorze finansowym
Prawodawstwo unijne w ostatnich latach jest coraz bardziej aktywne w kwestiach związanych z szeroko pojętym cyberbezpieczeństwem. Komisja Europejska bez wątpienia dostrzega problematykę braku odpowiedniego ogólnego poziomu cyberbezpieczeństwa w państwach członkowskich i aktywnie działa na rzecz poprawy sytuacji. Wystarczy wspomnieć tu o The EU Cybersecurity Act, czy od dawna już obowiązującą dyrektywę NIS (ang. Directive on Security of Network and Information Systems), która weszła w życie w 2016 roku, a na grunt krajowego porządku prawnego została wprowadzona jako Krajowy System Cyberbezpieczeństwa (KSC) w 2018 roku. W tym roku czeka nas również aktualizacja KSC o unijną dyrektywę NIS 2. Odpowiedni projekt ustawy trafił ostatnio do konsultacji publicznych.
Tags: TIBER-EU, adversarial-attack-simulation
- May 10, 2024 Executing Cobalt Strike's BOFs on ARM-based Linux devices
We designed and implemented bof-launcher with a portability in mind so running BOFs on Linux ARM-based devices is a snap. Below, we’re running our uname
BOF on Raspberry Pi device. For convenience we use our cli4bofs tool to execute BOF directly from command line. So let’s jump to our device:
Tags: toolbox, adversarial-attack-simulation, bof-launcher, BOF
- Feb 8, 2024 Running BOFs with our 'bof-launcher' library
During last months we were busy working on our bof-launcher project. In essence it is an open-source library for loading, relocating and launching Cobalt Strike’s BOFs on Windows and UNIX/Linux systems. But it also contains other very interesting features and capabilities that are worth discussing.
Tags: toolbox, adversarial-attack-simulation, bof-launcher, BOF
- Sep 8, 2023 Burp Suite Pro real-life tips & tricks: Other useful resources
Additional references to materials about the Burp Suite Pro tool and its usage:
Tags: toolbox, web-security-testing
- Aug 25, 2022 Endpoint defense evasion with custom built binaries
It’s already a common knowledge that merely rebuilding binaries could be a good way to attempt to bypass many AV solutions. Here’s a good illustration of exactly that case from our recent penetration testing engagement. Here’s the scenario:
Tags: toolbox, adversarial-attack-simulation
- Jan 12, 2022 Burp Suite Pro real-life tips & tricks: Authentication engine for command-line tools
Below is a nice Burp trickery I’ve learnt from Ryan and extended it also for apps that are using token-based session handling.
Tags: toolbox, burp, web-security-testing
- Oct 8, 2021 Broken UDP scanning in Nmap v7.91
As in most penetration testing/red teaming companies we at Z-Labs use Nmap security scanner tool quite extensively. During one of our network penetration testing engagements we have noticed that UDP scanning (-sU
) functionality misbehaves and does not correctly detect opened UDP ports. Soon after that we identified in Nmap (versions: 7.91
and 7.90
) subtle implementation issue that resulted in corrupted UDP packets sent during a scan.
Tags: toolbox, network-security
- Mar 29, 2020 Mobile apps penetration testing 2020
There are already great resources about mobile app security testing out there. So here I’m mostly just keep track of resources/approaches that worked for me (with additional comments), to have it in one place for the sake of future reference.
Tags: notes, mobile-security
- Sep 12, 2019 Burp Suite Pro real-life tips & tricks: Looking for hidden attack surface and leaked secrets
Burp has some nice export features which (combined with some 3rd party tools) can greatly aid in the process of looking for additional/hidden endpoints and/or hardcoded secrets.
Tags: toolbox, web-security
- Sep 9, 2019 Burp Suite Pro real-life tips & tricks: Persistent Access to Collaborator
It was already discussed here. Putting here for quick reference.
Tags: toolbox, web-security
- Jul 21, 2019 Burp Suite Pro real-life tips & tricks: Authorization testing
In the past, I found (already quite old - presented in 2013) slide deck Burp Suite Pro real-life tips & tricks authored by Nicolas Grégoire very useful which gave me motivation to constantly look for effciencies in my day to day Burp Suite Pro usage. Since that time Burp has significantly evolved (major milestone - version 2.x was released) and lots of interesting 3rd party extensions were developed.
Tags: toolbox, web-security
- May 10, 2019 LES: Linux privilege escalation auditing tool
LES security tool, developed and maintained by Z-Labs is the next generation version of the tool designed to assist the security tester/analyst in looking for critically vulnerable (i.e. locally exploitable) Linux machines during manual red tem/pentest engagement. In this post I will describe how the tool works and how to use it effectively.
Tags: privilege-escalation
- Nov 18, 2013 Autumn hiking in Owl Mountains
We climbed three additional peaks from Crown of Polish Mountains during recent hiking in Owl Mountains and near areas.
Tags: off-topic
- Sep 12, 2013 Hiking in Dolomites
Some photos from this year’s hiking in Dolomites:
Tags: off-topic