<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hello, Friend on 🕵 1dnu11</title><link>https://1dnu11.github.io/</link><description>Recent content in Hello, Friend on 🕵 1dnu11</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright © 2024, 1dnu11.</copyright><lastBuildDate>Sat, 23 Mar 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://1dnu11.github.io/index.xml" rel="self" type="application/rss+xml"/><item><title>File System Vulnerability - Alternate Data Streams</title><link>https://1dnu11.github.io/zet/file-system-vulnerability-alternate-data-streams/</link><pubDate>Sat, 23 Mar 2024 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/zet/file-system-vulnerability-alternate-data-streams/</guid><description>Alternate Data Streams (ADS) NTFS (New Technology File System) is the default file system for Windows. Alternate Data Streams (ADS) is an NTFS file attribute designed to provide compatibility with MacOS HFS (Hierarchical File System).
Whenever we work with a file on an NTFS formatted drive, there will be two different forks/streams:
Data stream: Default stream that contains the actual data of the file Resource stream: Contains the metadata of the file ADS can then be abused to hide malicious code or executables in legitimate files, thus avoiding detection.</description></item><item><title>Windows Credential Dumping</title><link>https://1dnu11.github.io/windows-credential-dumping/</link><pubDate>Sat, 23 Mar 2024 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/windows-credential-dumping/</guid><description>Windows Password Hashes Windows stores hashes user account passwords locally in the SAM (Security Accounts Manager) database. Authentication and verification of user credentials is facilitated by the LSA (Local Security Authority).
SAM Database SAM is a database file that manages user accounts and passwords. All passwords stored in SAM are hashed. This database cannot be copied while the operating system is running. Windows NT keeps the SAM db file locked. Attackrs tipically use in-memory techniques to dump SAM hashes from the LSASS process.</description></item><item><title>PrivEsc - Bypassing UAC with UACMe</title><link>https://1dnu11.github.io/zet/privesc-bypassing-uac-with-uacme/</link><pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/zet/privesc-bypassing-uac-with-uacme/</guid><description>UAC (User Account Control) UAC is a security feature introduced in Windows Vista. It is used to prevent changes to the operating system without the proper adminitrative approval. A non-privileged user attempting to execute a program with elevated privileges will be prompted with the UAC credential prompt, where a privileged user will just be prompted with a consent prompt.
It&amp;rsquo;s possible to bypass UAC in order to execute malicious executables with elevated privileges.</description></item><item><title>PrivEsc - Windows - Access Token Impersonation</title><link>https://1dnu11.github.io/zet/privesc-access-token-impersonation/</link><pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/zet/privesc-access-token-impersonation/</guid><description>Windows Access Tokens Created and managed by the *LSASS, access tokens are the core element of the authentication process on Windows. They are responsible for identifying and describing the security context of a process or thread. They can be seen as a temporary key that provides users with the required access to a system, without having to provide credentials each time a process is started or resources is used.
They are generated by the winlogon.</description></item><item><title>Start Here</title><link>https://1dnu11.github.io/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/about/</guid><description>Welcome, friend Before you question why this blog exists, you can go and read this post here.
How to Navigate this Website To see an index of my entire Zettelkasten sorted in chronological order, visit Zet.
Longer articles can be viewed at the Blog page.
About This Website What you are seeing here is the public section of my personal Zettelkasten. I keep a large collection of notes which are stored as markdown files on my harddisk.</description></item></channel></rss>