Advertisement · 728 × 90

Posts by vx-underground (automated mirror)

Video

Jjaemu will never get mad ever again.

3 days ago 12 1 0 0

> popular browser game in japan
> brush kitty cat
> wtf i love it
> play game
> lose
> get mad
> look inside
> html iframe
> loads index.pck
> gdpc header
> realize im reverse engineering html game
> html game for brushing kitty cat

im a loser dawg fr lmfao

3 days ago 29 1 1 0
Post image
3 days ago 25 1 2 2

exhausted, crawl into bed, put on weird esoteric youtube videos like elder scrolls lore, dark souls lore, history of religion, or 8 hour long youtube essay
04:00am: wake up randomly from nightmare or panic attack (no idea why), have cigarette to calm nerves

4 days ago 4 0 0 0

resume working (coding, reversing, reading documentation)
10:00pm: shower? (depends on mood tbh)
11:00pm: extremely hungry, eat random food in house. sometimes have ramen noodles mixed with random canned foods, sometimes order food, sometimes just eat more animal crackers
12:00am:

4 days ago 4 0 1 0

drinks
04:00pm: brain exhausted, need food, eat giant bag of animal crackers next to desk
04:30pm: frustrated about code, resume working (coding, reversing, reading documentation)
08:30pm: heart palpitations from excessive caffeine, take anti-depressants and sleep medication
09:00pm:

4 days ago 2 0 1 0

What's it like being a malware researcher? Here is my day.

09:30am: wake up (depends on how bad sleep is)
10:00am: drink energy drink, check news
10:30am: check MISP, see world imploding
11:30am: read random papers from MISP
12:30pm: continue malware research project, chug energy

4 days ago 16 0 1 0
Post image

Hello,

One of my colleagues is looking for a job.

She is a smart lady.

She is searching for a job doing one of the following:
- SecOps Leadership
- IR Leadership
- SOC Leadership
- Security Awareness Leadership
- CTI

Please let me know if you anyone is hiring.

Thanks.

4 days ago 20 8 0 0
Advertisement

Conversely, my resume is unironically like "lol i like malware and cats and stuff" and it's barely one page.

4 days ago 6 0 0 0

these fancy job titles mean? I have no idea.

She has a large and comprehensive resume with lots of big words and a Bachelors degree from a large university in the United States (no idea why).

Her resume is large, has lots of words, lots of experience, and jammed in two pages.

4 days ago 5 0 1 0
Post image

Hello,

One of my colleagues is looking for a job.

She is a smart lady.

Unfortunately, she does not do malware stuff (no idea why), she is searching for a job doing one of the following:
- SecOps Leadership
- IR Leadership
- SOC Leadership
- Security Awareness Leadership
- CTI

What do

4 days ago 10 1 1 0

give yourself unlimited verifications.

4 days ago 2 0 0 0

these conditions are true, you have far greater issues than someone modifying the PIN on your age verification app or... verify they're an adult using your stuff.

If you want to do this, for whatever reason, using this you can now reset the PIN on your age verification app arbitrarily or

4 days ago 5 0 1 0

The fundamental problem with this "hack" is it requires three things being true.

1. An attacker must possess the device
2. An attacker must be able to unlock the cell phone
3. The cell phone must be "rooted", all additional cell phone security already bypassed

In the event all three of

4 days ago 7 0 1 0

software design choice?

Why is it limited how times you can perform an age verification? But why is that also stored locally in the .xml file?

I don't understand

4 days ago 9 0 0 0

Big drama in the EU today.

I'm not a mobile device security nerd, so I can't comment too much. However, it seems extremely odd all configurations (including the "encrypted pin") are stored in a .xml file.

Mobile nerds, ... is this standard practice? Or did the EU make an incredibly poor

4 days ago 10 3 1 0

Another zero day exploit released by some nerd (can't remember name right now) because they're annoyed with Microsoft. It's been confirmed by other nerds. It is yet another legit zero day. Whew.

5 days ago 12 0 1 1

the general layout done... it's just typing out the code and debugging. It's tiring.

I also planned on stripping the headers and making the binary as lightweight as possible. Why? I have no idea. It is totally unnecessary and ass backward logic.

5 days ago 4 0 0 0
Advertisement

Notification callbacks. When "Update" is clicked my binary is notified and appropriate action is taken.

Again, this is all totally normal functionality, but it's being used for social engineering. The only caveat here is I am trying to do it as painful and convoluted as possible. I have

5 days ago 3 0 1 0

extremely easy. You literally can just specify "button go to website ooga booga" and that's it.

Because I couldn't find a URI to execute a binary my only option left is using INotificationActivationCallback. Basically, I have to register my malicious code in the registry to receive Toast

5 days ago 2 0 1 0

prevents FILE://, and I can't find a URI to abuse to deliver file execution (I tried).

I assume the inability to find a Windows URI to abuse for file execution is why the original authors ended up doing ToastNotification -> ClickFix. Making the Toast Notification go to a web domain is

5 days ago 2 0 1 0

RoInitialize (technically CoInitializeEx).

In the attached image I've successfully impersonated Windows Security. However, "update" doesn't work the way I'd like to. The easiest thing to do in this scenario is trying to abuse a Windows Scheme URI. Unfortunately, WinRT sandboxes and

5 days ago 2 0 1 0

the way Windows wants you to. I said, "well, I've done WinRT in C before, why not do this in C?" Why not make something mildly annoying 200% more difficult?

It has been a challenge. I decided to do EVERYTHING with the WinRT / COM. I didn't want to make ANY WinAPI invocations omit

5 days ago 2 0 1 0

to do registry entries so Windows knows where to send Toast stuff to. In C# or Powershell this is still relatively simple, just kind of annoying. In C, it still isn't too bad.

Unfortunately, I am a person who knows only pain. I didn't want to do C#, or .NET, or do anything with WindowsRT

5 days ago 3 0 1 0

well documented for something like C#. Making a simple notification on Windows which impersonates Windows Defender and runs a .exe (or whatever) is pretty shrimple. But.... there is a massive asterisk next to shrimple because it requires some* pain and suffering.

In extreme summary, need

5 days ago 2 0 1 0
Advertisement

their paper and code was in C# and Powershell. Their technique displayed a fake update and directed the user to a website which then did ClickFix

So it's like, WindowsClickFix -> ClickFix

I said, "wtf? why not just run program there?"

It turns out you can, it's totally possible and

5 days ago 3 0 1 0
Post image

Yeah, so basically I'm trying to make my own "ClickFix" but for Windows binaries by abusing the Windows Runtime, Component Object Model, and whatever Windows grants me from a limited user profile (see attached image)

I saw some research on Windows Toast Notifications by @ipurple, but

5 days ago 10 0 1 0

addicted to Phencyclidine a/k/a Angel Dust?

Find out on the next action packed episode of Dragon Ball Z

5 days ago 2 0 0 0

Is it the result of a different malware campaign? Did they actually steal internet projects and "secrets" from S&P Global? How bad is the Guesty compromise? Will these companies succumb to the ransom demands? What the fuck does PCP stand for in this context? Is TeamPCP suggesting they're

5 days ago 4 0 2 0
Post image

Say what you want about TeamPCP, but they have certainly made attribution much easier.

I can't recall a time a Threat Group specified the malware campaign and malware delivery mechanism that resulted in a compromise.

Is TeamPCP lying about how how they compromised these organizations?

5 days ago 8 0 2 0