Advanced Search
Search Results
35 total results found
Articles
Red Team
Malware
Threat Intelligence
Notes
Japanese Language Notes
N5
[Backup] How did I design and build a complex AD set
Hi Folks, today I would like to share how did I design and build a vulnerable AD set. Before moving to this topic, let me introduce the motivation and some features of this AD set. MOTIVATION I know there are few scripts can automate the process of generatin...
[Backup] Walkthrough of My Vulnerable AD Set
Hi guys, in previous days I designed and built a difficult and complex vulnerable AD set, I planned to post the guide to reproduce it. However, maybe due to the length, I did not successfully post it on Medium, therefore I posted it on my personal website: htt...
[Backup] Domain Enumeration Methodology
Hey folks, today I start a new series of articles to discuss Active Directory Exploitation. This is the first article, we focus on domain enumeration. We assume you have already had an initial shell on a domain computer, no matter it is Windows domain computer...
[Backup] Kerberos
Hey friends, it is the second article in my Active Directory Theory and Exploitation series. Today, I would like to talk about Kerberos. Kerberos might be complex and daunting in many peoples’ opinion, but never mind, hopefully I can make it simple and easy to...
[Backup] Kerberos Delegation
Hey friends, it is the 3rd article in my Active Directory Theory and Exploitation series. Today, I would like to talk about 3 types of delegation. Kerberos delegation resolved Double Hop problem, however, an attacker can also abuse delegation to gain remote co...
Targeted and Efficien Phishing: Alteryx Workflow
Background Recently, my friend who works in the accounting industry has been working hard to learn how to use a tool called Alteryx. She occasionally shares her learning experience with me, even though I do not have any knowledge of the accounting industry. T...
Use Searching Engines to Hunt For Threat Actors
Background Hi folks, today, I’d like to discuss how to leverage search engines to identify vulnerable servers used by threat actors. These actors often employ multiple servers for various purposes, such as phishing infrastructure, command and control (C2) inf...
Bypass AMSI On Windows 11
Motivation In this article, I want to break down AMSI (Anti-Malware Scan Interface) and its bypass technique on Windows 11. AMSI bypass is not a new topic, and compared with bypassing EDR, AMSI bypass is much easier, but I found that one bypass approach taugh...
MutationGate
Background Motivation Considering inline hook is a major detection utilized by EDR products, bypassing them is an interesting topic to me. Regarding bypassing inline hook placed by EDR, there are already quite a few approaches available. Although some of t...
[Backup] OSEP and OSWE Review
Hello folks, recently I took OSWE exam. For more information about the course, you can check the official website https://www.offensive-security.com/awae-oswe/. Considering that I also passed OSEP (https://www.offensive-security.com/pen300-osep/) half a year a...
[Backup] How Did I Take Over CobaltStrike Servers
Hi folks, today I would like to share how I take over some Cobalt Strike TeamServerswith Quake and Password Spray Attack. From the perspective of a threat hunter, it isgood to track C2 servers on the Internet. From the perspective of a hacker, it is good tocom...
ReflectiveLoading And InflativeLoading
CobaltStrike's Beacon is essentially a DLL. The raw format payload is a patched DLL file. Through ingenious patching, the Beacon can achieve position independence similar to shellcode. We generate and compare payloads in both DLL and RAW formats: The Beacon i...
Pre Lesson
Lesson 1
语法 1: ~(名词) 是 ~(名词)です ~は~です 李さんは中国人です わたしはおう 2: ~(名词) 不是 ~(名词) ~は~ではありません ~は~じゃありません 森さんは学生ではありません わたしは日本人じゃありません わたしは田中ではありません 3:~(名词)是~(名词)吗? ~は~ですか あなたは小野さんですか。 金さんは中国人ですか。 4:应答 はい,~ いええ,~ いええ,ちがいます はい,学生です。 いええ,ちがいます。 ...
Lesson 2
语法 1: これ/それ/あれは~(名词)です これ:近 それ:距离听话人较近/双方较远 あれ:距离双方都比较远/更远 これは本です それはかばんです あれはテレビです 2: だれですか/何ですか 谁:だれ,どなた (更加礼貌) 什么:何 それは何ですか。 あの人はだれですか。 スミスさんはどなたですか。 3: ~(名词)の~(名词) の 连接名词和名词,表示所属 わたしのかぎ 田中さんの車 4: この/その/あの~(名词)は~(名词)です ...
Lesson 3
语法 1: ここ/そこ/あそこは~(名词)です ここ/そこ/あそこ所表达的位置关系与これ/それ/あれ相同 ここはデパ一トです。 そこは図書館です。 あそこ入口です。 2:~(名词)は~(名词)[场所]です "名词" 存在于"名词"场所 です不仅仅可以表示“是”,还有更为广泛的含义,如"在"。 食堂でば-ト七階です。 トイレはここです。 小野さんは事務所です。 3:~(名词)はどこですか 用于询问存在的场所 トイレはどこですか。 あちらです。 あなたのか...
Lesson 4
语法 1: あります与います あります 表示花,草,桌子等不具有意志的事物 います 表示人,动物,昆虫。 ~(场所)に~(物/人)があります/います 表示存在,相当于 ~ 有 ~ 部屋に机があります。 ここにほんがあります。 庭に何がありますか。 部屋に猫がいます。 公園に子供がいます。 あそこにだれがいます。 ~(物/人)は~(场所)にあります/います 表示位置,相当于 ~ 在 ~ いすは部屋にあります。 本はここにあります。 図書館はどこにありますか。...
Lesson 5
语法 1: 表达 汉字单词短语 中文 读音 日文