0x00sec 2019 Year End Review - Year 0x04
I hope you all have had a very happy holiday! Today, I want take a quick look back at the year of 2019 for 0x00sec, laugh about some of the good times and review some of the amazing content and achievements of this year by the community.
A core feature of the 0x00sec philosophy is to openly exchange information between members - the forums being an excellent medium for sharing.
This year there have been some incredible articles released, and here are some of the highlights we’ve picked out If you think we missed one, let us know on the #projects channel on the 0x00sec Discord.
- Explaining Server Side Template Injections
- Taking SQL Injections further (Blind Second Order SQL Injection + TMHC CTF Shitter Writeup)
- A Curious Case of Malwarebytes
- Defeating Userland Hooks (ft. Bitdefender)
- Anti-virus Exploitation: Local Privilege Escalation in K7 Security (CVE-2019-16897)
- Point of no C3 | Linux Kernel Exploitation - Part 0
- Kernel Exploitation | Dereferencing a NULL pointer!
- Random Thoughts After Nearly 9 years Pentesting/Red Teaming: 2019
- My Personal OSINT Techniques, Part 1 of 2: Key & Layer, Contingency Seeding
PresComm (HackTheBox Write-Ups)
- My HackTheBox CTF Methodology - From fresh box to root!
- Tricks of the Trade from 5+ years in Offensive Cyber Security
- 0x00sec Helped Me Graduate College and Become a Professional Red Teamer!
- autoBOF: a Journey into Automation, Exploit Development, and Buffer Overflows
- Securing Docker Containers
Malware Python Writing Series
- Malware writing - Python malware, part 1
- Malware writing - Python malware, part 2: Keylogging with ctypes and SetWindowsHookExA
- Malware writing - Python Malware, part 3: Stealing credentials and cookies
Other Awesome Articles
- Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell
- A Blue Team guide to Azure & Office 365 monitoring
- A Blue Team guide to AWS Cloudtrail monitoring
- Malicious DLL execution using Apple’s APSDaemon.exe signed binary
So an interesting part of the infosec community at large is drama. Some of it is terrible, some of it is funny, and some of it is just downright stupid.
In a research paper put together by Trend Micro, 0x00sec was portrayed next to other “English Criminal Underground Hacking Groups” and labeled as such.
Luckily, a good friend and member of 0x00sec, @ReyBango, reached out to the CEO of Trend Micro and it was quickly remedied
Projects in 2019
A nice idea born out of a passion to learn about buffer overflows and an OSCP journey.
From our very own @Rain!
TL;DR I wrote a program to automate buffer overflows. I talk about what buffer overflows are, why I made this program, and show all the code I used.
An in-development PowerShell tool by @PresComm. Intended more for blue teams (as it requires administrative rights on target systems), Coerchck scans targets (single machines, subnets, ranges, or a mix of each) to search for local administrator accounts on Windows machines. The first in a series of PowerShell scanning tools intended for blue team enumeration.
I (@pry0cc) have been developing a chatbot I call Karen. Karen lives in the 0x00sec Discord and can do many things like deploy DigitalOcean droplets, execute SSH commands, store history, and generate reverse shell payloads on the fly.
A very cool project developed by @hostile.node is a public web camera streaming tool. Live images from publicly exposed cameras!
Changes to 0x00sec
This year was the first year that the 0x00sec Discord was made public! After moving away from a fully public IRC in 2018. There was a lot of uncertainty as to how the quality of the chat medium would be maintained in a public manner, however, it has been a really positive and active environment and has continued to be a treasured part of the community.
Introduction of VIP
This year we also introduced the VIP status. The VIP status is a way to both reward active and heavy contributors but also to recognize users as model community members and their position as a leader in the community. This has been invaluable in creating a curated list of good content automatically (more to come soon ;))
2019 has been an incredible year for 0x00sec! We want to extend a huge thank you to our frequent visitors, lurkers, friends and members that make this community what it is.
I can’t wait to see what we can do in 2020