Want to master Windows internals for offensive security?!
Read ...
'Windows Internals, Part 1 & 2'
by Solomon & Ionescu.
It discusses processes, memory management & kernel mechanisms.
Essential for red teamers.
#RedTeam #Malware #cyberseurity #Infosec #windows
03.04.2025 07:20 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Abusing DbgPrint for stealthy data exfiltration?
Kernel-mode logging APIs let malware smuggle data via debug output, bypassing traditional network monitoring.
Works well in driver-based implants.
#Malware #RedTeam #Data #Network #Kernel #API #infosec #CyberSecurity
17.03.2025 08:49 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
On Code Trick:
Need stealthy C2 communication?
Use ICMP echo requests to encode commands & TTL values to exfiltrate data.
Many firewalls ignore ICMP, making it a covert channel.
#RedTeam #C2Evasion #ICMP #infosec #CyberSecurity #TTL
17.03.2025 08:42 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Abusing Windows Error Reporting (WER) for stealthy execution?
Drop payloads in
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\,
then trigger 'WerFault.exe' to load them.
Low detection, high persistence.
#RedTeam #EDR #infosec #CyberSecurity #WER #Payload
15.03.2025 09:36 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
The 2014 Heartbleed bug exposed a brutal reality:
even widely trusted cryptographic libraries (OpenSSL) can harbor catastrophic flaws.
The lesson?
Continuous auditing > blind trust.
#CyberSecurity #History #SSL #Cryptography #Bug #Infosec
14.03.2025 06:35 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Abusing Windows COM objects for stealthy execution?
Use 'MMC20.Application' to execute commands outside direct process lineage tracking.
Works well against naive EDR correlation.
#RedTeam #DefenseEvasion #infosec #Cybersecurity #EDR
14.03.2025 06:33 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Goodbye Skype: Microsoft Pulls the Plug
Introduction
๐ End of an era: Microsoft is officially pulling the plug on Skype.
Once the king of VoIP, now a relic in the age of Teams & Zoom.
๐กA reminder .. in tech, innovation outruns nostalgia
adapt or fade away.
Topic: areenzor.medium.com/goodbye-skyp...
#Tech #Microsoft #Goodbye #Skype #VoIP
09.03.2025 04:59 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
90s Computer Viruses vs. Modern Malware
Introduction
90s viruses were chaotic, flashy & kinda fun.
Todayโs malware? Silent, sophisticated, and terrifying. ๐ฆ ๐ป
Dive into the evolution of digital threatsโfrom prank pop-ups to billion-dollar cybercrime:
๐ areenzor.medium.com/90s-computer...
#CyberSecurity #Malware #Hacking #Infosec
03.03.2025 04:51 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
For low-level malware analysis, 'Practical Malware Analysis' by Sikorski & Honig is essential.
But if you want to go deeper, complement it with 'The Art of Memory Forensics' for in-depth DFIR insights.
#MalwareAnalysis #DFIR #infosec #DigitalForensics #cybersecurity
03.03.2025 04:45 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Want to execute shellcode without API calls?
Abuse indirect syscalls via HAL dispatch tables.
Hook NtAllocateVirtualMemory and redirect execution stealthily. EDR visibility?
Nearly zero.
#MalDev #RedTeam #Infosec #cybersecurity #powershell
03.03.2025 04:44 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Duo Wins $50K Bug Bounty for Supply Chain Flaw in Newly Acquired Firm
Follow us on Bluesky, Twitter (X) and Facebook at @Hackread
How a critical software supply chain vulnerability led to a $50,500 bug bounty at a newly a newly acquired company. ๐๐
Read: hackread.com/duo-bug-boun...
#CyberSecurity #Vulnerability #BugBounty #SupplyChain
17.02.2025 23:33 โ ๐ 4 ๐ 2 ๐ฌ 0 ๐ 0
Public Wi-Fi isnโt your friend. ๐
Even with HTTPS, evil twin APs, SSL stripping & MITM attacks are still a thing.
Use a trusted VPN, or better yet .. just donโt connect.
Your data isnโt worth the risk.
#CyberSecurity #Privacy #SSL #MITM #VPN #Wifi #HTTPs
21.02.2025 05:37 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
2017:
WannaCry spreads like wildfire, exploiting SMBv1 with EternalBlue.
Lesson?
Patching isn't optional.
If your infra still has unpatched, exposed SMB services in 2025, youโre just waiting for the next worm.
#CyberSecurity #Infosec #WannaCry #SMB #Patch
21.02.2025 05:29 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
When we go back to 2010, Stuxnet attack redefined cyber-physical warfare.
It proved that targeting PLCs can cripple infrastructure without a single bullet fired.
ICS/SCADA security is still playing catch-up.
#CyberSecurity #History #Stuxnet #PLC #SCADA #ICS #warfare
13.02.2025 07:39 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Kerberos ticket delegation attacks are still underutilized.
Combine constrained delegation with 'S4U2Proxy' to impersonate high-privilege accounts without dumping creds.
Abuse the trust chain.
#RedTeam #ActiveDirectory #Kerberos #Proxy #Infosec #DFIR
13.02.2025 07:37 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Hacking the Hacker
Introduction
๐จ Ever wondered how hackers get hacked?
This article discusses how a cybersecurity expert turned the tables on a hacker, exposing their tricks.
Cyber warfare is real
stay sharp! ๐๐
#CyberSecurity #Hacking #Infosec #Malware #Tech #BugBounty
๐ medium.com/@areenzor/hacking-the-hacker-2f12e3ba0340
09.02.2025 12:39 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
ChatGPT & DeepSeek Usersโ Data Privacy Concerns
Introduction
A good reading ๐โ๏ธ
DeepSeek's AI prowess is impressive, but its data privacy practices raise significant concerns.
Storing user data on Chinese servers poses risks to your data.
Stay informed & protect your data.
Article: areenzor.medium.com/chatgpt-deep...
#Deepseek #OpenAI #ChatGPT
05.02.2025 08:02 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
If youโre analyzing Windows malware, Sysmon + Sigma rules are indispensable.
Sysmon logs deep process activity, while Sigma translates TTPs into actionable detections.
Master both.
#ThreatHunting #DFIR #malware #TTp #EDR #SIEM #infosec
02.02.2025 11:48 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Injecting shellcode?
Avoid VirtualAlloc/WriteProcessMemory detection..
Use (NtMapViewOfSection) with a shared memory section between processes.
It bypasses common EDR hooks.
Subtle persistence wins.
#RedTeam #Malware #Infosec #Cybersecurity #EDR #Shellcode
02.02.2025 11:47 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Cyber Tip of the Day:
Ensure that all software & plugins are regularly updated.
Unpatched software is a major vulnerability that attackers exploit.
At AREENZOR, we help businesses identify such risks through thorough penetration testing.
What's your top tip ?!
#cybersecurity
31.01.2025 05:16 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
๐That โPDF invoiceโ you just downloaded?
Could be packing JavaScript-based malware or embedded exploits.
Always inspect with pdfid.py & pdf-parser.py before opening.
Trust but verify or just donโt trust at all.
#Malware #Infosec #CyberSecurity #PDF
30.01.2025 05:32 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
๐ก๏ธ Your password manager vault is only as strong as your master password.
If it's weak,
you've just created a single point of failure for all your credentials.
Go long, go random & enable MFA on the vault itself.
#CyberSecurity #Infosec #MFA #Password #AccessControl
30.01.2025 05:31 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
๐ก๏ธ A List of Top 10 Penetration Testing Tools on GitHub (2024 Edition)
โค Discover the highly-rated tools on GitHub in 2024.
โค Strengthen you arsenal with tools that are redefining the Pentesting Art.
๐ Bookmark for later!
(Thread ๐งต๐)
26.01.2025 13:32 โ ๐ 2 ๐ 2 ๐ฌ 1 ๐ 0
DNS tunneling remains a powerful covert channel for exfiltration.
Split your payload into TXT record chunks, encode in #Base32 & send via recursive queries.
Always test against DNS inspection solutions.
#RedTeam #DNS #ComputerNetworks #Infosec
28.01.2025 05:32 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
The 2017 Shadow Brokers leak (NSA's toolkit) was a turning point for cyber warfare.
It not only exposed nation-state tools but also democratized advanced exploits, forever altering the threat landscape.
#CyberSecurity #History #NASA #infosec #Leak #exploitation #bug
27.01.2025 06:50 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
If youโre serious about reverse engineering,
IDA Pro is non-negotiable, but pair it with Ghidra for decompiler cross-validation.
Their combined insights make static analysis unparalleled.
#ReverseEngineering #AdvancedTools #RedTeam #Infosec #Cybersecurity #IDE #Ghidra
27.01.2025 06:49 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
The rise of ransomware attacks continues to be a pressing concern.
This image below highlights the rate of ransomware attacks over organizations by countires in 2024.
#CyberSecurity #Ransomware #DataSecurity #PenetrationTesting #Infosec #CyberThreats #Business #Security #Risk
22.01.2025 10:47 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
๐ Cyber Tip of the Day:
Ensure that all software and plugins are regularly updated.
Unpatched software is a major vulnerability that attackers exploit.
At AREENZOR, we help businesses identify such risks through thorough penetration testing.
Let us know your top tip! ๐
22.01.2025 10:32 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Cybersecurity Made Simple: A Friendly Guide to Securing the Cloud
Introduction
This article on securing cloud infrastructure is a good-read for businesses moving to the cloud.
-> Whatโs your top strategy for cloud security?
Article Link: areenzor.medium.com/cybersecurit...
#CloudComputing #cybersecurity #encryption #MFA #infosec
20.01.2025 09:19 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Also on infosec.exchange and counter.social
data supply auditor | privacy & ad tech expert | internet threats
Personal @ victorymedium.com
Sr Threat Analyst @ SilentPush.com
uiuc cs | security geek | @whitehoodhacker
Infosec in the Energy Sector - I will like you pet pictures
knuck if you buck
https://n0.lol
malware detection and analysis, hunting and gathering, threat research
Manager @Mandiant @Google Public Sector, Mission Control @ Google Space, Defcon Goon, #ThruntCon Board Member
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
voicecoding latency and throughput hacker. How did I get here and what am I doing in this hand basket? he/him
Walkin' tall machine gun man
They spit on me in my homeland. .
SIGINT. APT. Hacker. Blue Teamer. American. Be excellent to each other. ๐ค
Urban supremacist, Traffic Taliban, Predatory pedestrian, PhD in NIMBY studies.
Anything in life worth doing is worth overdoing. Prywatne oblicze korporacyjnego Ja
@Sethai on twitter
Honest-but-Curious Researcher. Prof. at INSA-Lyon CITI / Inria, France. Privacy, Security, Computer Networks, Wireless, Mobile, IoT.
site reliability engineer, sociologist, traffic nerd, Deutschlandkritiker, tabs > spaces
dad, screaming at computers and climbing rocks
Physical Security and Red Team Specialist. Trying to be kinder
Engineer, classical liberal, almost divorced. Social media is entertainment, not life. Twitter sucks. Opinions and stupidity are my own. Foolishness is too. He/that one guy
Overland Park, KS
Cyber Security | Staff Security Engineer @Ripple (fintech/crypto) | Specialised in Detection & Response ๐ฆ Ex @PwC
OTM (LL.M.), lupajuristi (attorney at law). Founder @yhdenvertaisuusapu.fi
#yhdenvertaisuus #neuromoninaisuus #ihmisoikeudet #equality #neurodivergence #humanrights
Mastodon: @JyrkiKuoppala@vivaldi.net https://social.vivaldi.net/@JyrkiKuoppala
Geek, curious hacker, 3D print, CNC, IT security, nerd, malware analyser, maker, electronics, coder, Hobbyist machinist, DIY, Forensics, Blue team, Red team.
Twitter handle was @ToomsDK