Skip to content

Commit 55dd8cd

Browse files
committed
Add cirosec posts
1 parent f51eef6 commit 55dd8cd

File tree

2 files changed

+45
-0
lines changed

2 files changed

+45
-0
lines changed

content/blog/google_doc2.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
author: "frereit"
3+
title: "Using Google Docs as a C2 proxy with a headless browser"
4+
date: "2024-11-07"
5+
description: "In this article we show how to use any Chromium-based browser as a C2 agent and Google Docs as a C2 proxy."
6+
tags:
7+
- "red-teaming"
8+
- "tooling"
9+
toc: false
10+
---
11+
12+
## Abstract
13+
14+
> When building your C2 agent, you may want to avoid outbound traffic directly from your agent to the C2 server for a number of reasons. You may have strict firewall rules that block all non-browsers from accessing the Internet, or you may want to bypass a proxy that only allows access to certain trusted websites. By spawning a headless browser process and using the Chrome DevTools Protocol to interact with a website, you can use the browser’s network stack to send and receive data, effectively bypassing any firewall or web proxy. In this article we show how to use any Chromium-based browser as a C2 agent and Google Docs as a C2 proxy and how to detect this. We provide sample code in Rust and a basic agent and server that can be used to execute shell commands on the agent and receive the output of the commands.
15+
16+
## Full Article
17+
18+
This article by me was published at cirosec's blog:
19+
20+
**<https://cirosec.de/en/news/google-doc2>**
21+
22+
<!-- https://web.archive.org/web/20241108095351/https://cirosec.de/en/news/google-doc2/ -->

content/blog/warbird.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
author: "frereit & Jan-Luca Gruber"
3+
title: "Abusing Microsoft Warbird for Shellcode Execution"
4+
date: "2024-11-07"
5+
description: "In this blog post, we’ll be covering Microsoft Warbird and how we can abuse it to sneakily load shellcode without being detected by AV or EDR solutions."
6+
tags:
7+
- "red-teaming"
8+
- "tooling"
9+
toc: false
10+
---
11+
12+
## Abstract
13+
14+
> In this blog post, we’ll be covering Microsoft Warbird and how we can abuse it to sneakily load shellcode without being detected by AV or EDR solutions. We’ll show how we can encrypt our shellcode and let the Windows kernel decrypt and load it for us using the Warbird API. Using this technique, you can hide your shellcode from syscall-intercepting EDR solutions allowing you to allocate executable memory, decrypt the shellcode, and jump to the decrypted shellcode all in one syscall, without ever having decrypted shellcode at any writeable memory region at any point during the execution of your process.
15+
16+
17+
## Full Article
18+
19+
This article by a colleague and me was published at cirosec's blog:
20+
21+
**<https://cirosec.de/en/news/abusing-microsoft-warbird-for-shellcode-execution/>**
22+
23+
<!-- https://web.archive.org/web/20241114104038/https://cirosec.de/en/news/abusing-microsoft-warbird-for-shellcode-execution/ -->

0 commit comments

Comments
 (0)