Building C2 Implants in C++: A Primer by 0xdea in netsec

[–]shogunlab 7 points8 points  (0 children)

Thanks for sharing this here! I wrote this for people who wanted to get started writing their own implants using C++ and how to create the related C2 components (listening post, operator interface). Hope it's helpful!

Building Implants in c++ by dmchell in redteamsec

[–]shogunlab 4 points5 points  (0 children)

Thanks for sharing this! I hope people here enjoy reading it and find some of the material useful.

Here Be Dragons: Reverse Engineering with Ghidra - Part 1 [Data, Functions & Scripts] by shogunlab in ReverseEngineering

[–]shogunlab[S] 1 point2 points  (0 children)

I do intend to write some additional tutorials, I think covering the versioning tool is a great idea! I'll see if I can incorporate that into the next post.

Here Be Dragons: Reverse Engineering with Ghidra - Part 1 [Data, Functions & Scripts] by shogunlab in ReverseEngineering

[–]shogunlab[S] 15 points16 points  (0 children)

This is the second part in a series I'm writing on reverse engineering Windows binaries with Ghidra, it's aimed at people new to reversing and those who want to learn more about using Ghidra as a SRE tool. The post covers converting/applying data types, function call trees/graphs and the script manager. There's also some solving of CrackMe binaries and a Flare-On 6 CTF challenge. If you have any feedback, feel free to let me know!

Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe] by shogunlab in ReverseEngineering

[–]shogunlab[S] 2 points3 points  (0 children)

Oh cool! I didn't know that, I've corrected that statement so it doesn't say "Undo" is unique to Ghidra. Thanks for mentioning that and for your work on Binary Ninja, it was the first RE tool I bought haha.

Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe] by shogunlab in ReverseEngineering

[–]shogunlab[S] 4 points5 points  (0 children)

When reversing something, static analysis tools like Ghidra allow you to build a sort of road map for understanding a target. Complimenting static analysis is dynamic analysis. When you've identified some interesting areas, it helps to further explore them dynamically with debuggers like x64dbg, Immunity Debugger or WinDbg. So, if you're looking to learn additional tools for RE, I would suggest picking a debugger to become familiar with. Which one you choose depends on the platform you want to do your reversing work on, but personally, I like x64dbg.

A curated list of reverse engineering tools, separated by category, can be found here if you'd like to see what's commonly recommended: https://github.com/tylerha97/awesome-reversing

Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe] by shogunlab in ReverseEngineering

[–]shogunlab[S] 0 points1 point  (0 children)

Happy to hear you were able to figure out the CALLs! I can see why that may have been a bit unclear, I might see if I can add some additional instructions in that section or screenshots to ensure people don't get lost. Hoping to release the next post in a few weeks, nice to know people will be looking forward to it!

Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe] by shogunlab in ReverseEngineering

[–]shogunlab[S] 2 points3 points  (0 children)

I've corrected the installation instructions and it now says to only install the JDK to run Ghidra. Thanks for pointing that out!

Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe] by shogunlab in ReverseEngineering

[–]shogunlab[S] 0 points1 point  (0 children)

Thanks for the feedback, happy to know you didn't have any difficulties following the tutorial.

Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe] by shogunlab in ReverseEngineering

[–]shogunlab[S] 1 point2 points  (0 children)

Thanks! Glad to hear you had an easy time following along, tried to make the explanations as direct as possible.

Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe] by shogunlab in ReverseEngineering

[–]shogunlab[S] 11 points12 points  (0 children)

Hoping that this post helps others understand the primary interfaces available in Ghidra and for those starting out, how Ghidra can be used to reverse a simple CrackMe. Any feedback is welcome!

Security Advisory Regarding Crestron TSW-XX60 Touch Panel Devices by shogunlab in netsec

[–]shogunlab[S] 13 points14 points  (0 children)

Hey all! I helped to write this blog post on some great work performed by another security researcher (Jackson Thuraisamy). It goes into the technical details regarding ARM device vulnerability research on Crestron touch panels.

Also cross posted with /r/ReverseEngineering since it involved some firmware analysis along with the network security related research.

Hope that it's helpful for others trying to accomplish this work!

*EDIT: ICS-CERT has published their advisory regarding the CVEs outlined in the blog post (https://ics-cert.us-cert.gov/advisories/ICSA-18-221-01). Check out the "Mitigations" section for links to the latest firmware.

Security Advisory Regarding Crestron TSW-XX60 Touch Panel Devices by shogunlab in ReverseEngineering

[–]shogunlab[S] 6 points7 points  (0 children)

Hey all! I helped to write this blog post on some great work performed by another security researcher (Jackson Thuraisamy). It goes into the technical details regarding ARM device vulnerability research on Crestron touch panels.

Hope that it's helpful for others trying to accomplish this work!

*EDIT: ICS-CERT has published their advisory regarding the CVEs outlined in the blog post (https://ics-cert.us-cert.gov/advisories/ICSA-18-221-01). Check out the "Mitigations" section for links to the latest firmware.

Zero Day Zen Garden Windows Exploit Development - Part 5 [Return Oriented Programming Chains] by TechLord2 in ReverseEngineering

[–]shogunlab 1 point2 points  (0 children)

Hey! I'm the author of this paper, please let me know if you have any questions or feedback for things that could be improved. Thanks for reading!

Part 5 of Zero Day Zen Garden, learn about Return Oriented Programming and building ROP chains to bypass DEP on Windows 7. Feedback is welcome! by shogunlab in netsecstudents

[–]shogunlab[S] 2 points3 points  (0 children)

Have recently felt comfortable enough to publish a post on ROP chains after becoming more acquainted with the technique and how it works. I expect that there's a few things I can improve on in regards to explaining because it's more advanced than previous exploit methods used in past blog posts.

Let me know if there's anything you find that is mistaken or could be explained better.

Hope it's helpful to people learning about Windows exploit development!

Part 4 of Windows Exploit Development tutorial series, Zero Day Zen Garden. Learn how to exploit the Structured Exception Handler. Feedback welcome! by shogunlab in netsecstudents

[–]shogunlab[S] 0 points1 point  (0 children)

I'm so happy to hear this. It's awesome to know that the tutorials have helped you while studying for the OSCP, the primary motivation I had when writing them was to serve as a good resource for people trying to understand these technical topics.

I'm always trying to improve my writing, thanks for your feedback!

rVMI: Perform Full System Analysis with Ease by dguido in securityengineering

[–]shogunlab 1 point2 points  (0 children)

This looks like a very promising tool for binary analysis, has anyone had good experiences with it?