Posts for: #Security

Weaponizing VSCode

Are you tired of having to spend hours developing FUD RATs, only for Sentinel One to flag it positive after a couple hours?
Are you into fancy GUIs and want to go back to the early ’90s where RATs actually had decent GUIs?

Fear no more! VSCode is here for you!

Note: Everything here IS a feature, but a feature can still be used maliciously.
Note2: This is for information purposes only, should be only used in self-owned systems or client machines during regular pentests.

[Read more]

The easiest way(s) to pwn OSx [EN]

Don’t get too excited, the following bugs are actually shitty bugs, nothing glorious like a Linux x86 Memory Sinkhole Privilege Escalation but still, they are a privilege escalation exploit and an SSH auth bypass exploit (working as of now 11/08/2015 in OSx 10.10.4).

(Due to the ‘weight’ of this topic I’m gonna write this blog entry in English for the first time in the history of Aitch) (yay! international! \o/)
[Read more]

I SEE WHAT YOU SEE. Unconventional tracking technique

Quindi… Eccoci nel 2015!
Macchine volanti, viaggi nel tempo etc etc! ESATTO! Nulla di tutto cio’.
La cosa bella e’ che con il passare del tempo a quanto pare nulla cambia.
Il 90% dei siti/forum che trovo in giro usano il classico protocollo HTTP e perche’ sbattersi per una S in piu’?
A chi gliene frega?

La sicurezza data dal protocollo HTTPS e’ decisamente piu’ elevata rispetto all’HTTP e oggi aggiungero’ un nuovo motivo alla risposta classica:
“Devo usare HTTPS?”
CAZZO SI.

Cioe’ non e’ indispensabile ma cribbio, l’hanno creato per un po’ di motivi.
[Read more]