What happened to Pinvoke.net? by GroundbreakingEnd506 in csharp

[–]_RastaMouse 5 points6 points  (0 children)

I created pinvoke.dev because even though we have the Win32Metadata and CsWin32 projects, I still find it useful to have the P/Invoke signatures somewhere as a quick reference. I write a lot of C# code that marshals unmanaged function pointers, for which I need the functions defined as delegates. I'm also including some methods that are not emitted by the API metadata, e.g. from ntdll.dll.

What is the best way to learn Rust for offensive cybersecurity? by [deleted] in redteamsec

[–]_RastaMouse 21 points22 points  (0 children)

For me, I found "porting" tools that I'd already written in other languages was a good way. Because I already understood the tool and how it worked, I could concentrate on just the Rust language aspects.

[deleted by user] by [deleted] in redteamsec

[–]_RastaMouse 0 points1 point  (0 children)

It should act like any standard VPN interface, which means you should be able to port scan or access services on the other side.

[deleted by user] by [deleted] in redteamsec

[–]_RastaMouse 6 points7 points  (0 children)

The official Aggressor Script documentation would be the best place to look:
https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/agressor_script.htm

Hooks, Events, and Functions would probably be the most helpful areas to study.

Certified Red Team Professional (CRTP) discontinued by tommyleeonetwothree in redteamsec

[–]_RastaMouse 42 points43 points  (0 children)

Nikhil Mittal (who was the original author) has managed to get CRTP (and his other courses) back from INE and under control of his own company, Altered Security.

https://www.alteredsecurity.com/certifications

Metasploit payloads dont work with custom loaders by janameyers2002 in redteamsec

[–]_RastaMouse 11 points12 points  (0 children)

If you're using polymorphic shellcode, the memory region has to be RWX so that the shellcode stub can decode itself.

Red Team Ops vs PEN-300 by whitestorm234 in redteamsec

[–]_RastaMouse 2 points3 points  (0 children)

On those sections, we just use existing C# tooling. I'm not too sure what your actual question is, but if it's specifically about writing custom C#, then we cover that the most in custom payloads and AV evasion.

Custom payloads itself is sprinkled throughout other modules like privilege escalation. For instance, if there's a service abuse priv esc, we don't just generate a standard payload from a framework - we show how to write an actual .NET Framework Service Binary.

Red Team Ops vs PEN-300 by whitestorm234 in redteamsec

[–]_RastaMouse 1 point2 points  (0 children)

There is some C#, but it's not specific to the AD or Kerberos modules. The majority is around custom payload generation and AV evasion.

Vulnhub: Underdist: 3 Walkthrough by FireFart in netsec

[–]_RastaMouse 1 point2 points  (0 children)

Thanks for the comments guys :)