- Видео 37
- Просмотров 72 547
Tom BH
Добавлен 10 мар 2019
Sandbox Evasion - Stage 2
About:
In this video we will see sandbox evasion (Sandboxie)
Help support the channel with a like, comment & subscribe!
Links:
sandboxie-plus.com
Disclaimer and Warning:
The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity.
Viewers are advised to comply with all applicable laws and regulations in their jurisdiction.
By watching this video, viewers agree to take full responsibility for any actions they may take as a result of the information presented.
Viewers are encouraged to conduct their own research and seek professional advice where appropriate as needs may vary based on individual circumstances.
I offer n...
In this video we will see sandbox evasion (Sandboxie)
Help support the channel with a like, comment & subscribe!
Links:
sandboxie-plus.com
Disclaimer and Warning:
The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity.
Viewers are advised to comply with all applicable laws and regulations in their jurisdiction.
By watching this video, viewers agree to take full responsibility for any actions they may take as a result of the information presented.
Viewers are encouraged to conduct their own research and seek professional advice where appropriate as needs may vary based on individual circumstances.
I offer n...
Просмотров: 89
Видео
Sandbox Evasion
Просмотров 1273 месяца назад
About: In this video we are going to talk about how hackers bypass sandboxes! Help support the channel with a like, comment & subscribe! Links: github.com/a0rtega/pafish Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and r...
WSC Takeover with No Defender
Просмотров 1253 месяца назад
About: In this video we will demonstrate WSC takeover! Help support the channel with a like, comment & subscribe! Links: github.com/es3n1n/no-defender Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their...
OpenEDR - Agent Deployment
Просмотров 1273 месяца назад
About: In this video we will deploy the first OpenEDR agent. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisd...
OpenEDR - Registration
Просмотров 203 месяца назад
About: In this video we will register a new account with OpenEDR. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their j...
OpenEDR - Overview
Просмотров 1873 месяца назад
About: In this video we will take an overview of OpenEDR. Help support the channel with a like, comment & subscribe! Links: www.openedr.com/ Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdict...
Proxmox Mail Gateway - Updates
Просмотров 5193 месяца назад
About: In this video we will configure Proxmox Mail Gateway (PMG) updates and upgrades. Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jur...
Proxmox Mail Gateway - Initial Setup
Просмотров 1,6 тыс.4 месяца назад
About: In this video we will perform the initial Proxmox Mail Gateway (PMG) setup. Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdic...
Proxmox Mail Gateway - Installation
Просмотров 8554 месяца назад
About: In this video we will install Proxmox Mail Gateway (PMG). Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction. By watching ...
Proxmox Mail Gateway - Overview
Просмотров 2 тыс.4 месяца назад
About: In this video we will take an overview of Proxmox Mail Gateway (PMG). Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction. ...
Snort - Initial Setup
Просмотров 714 месяца назад
About: In this video we are going to setup and configure Snort. Help support the channel with a like, comment & subscribe! Disclaimer and Warning: The content provided in this video is intended for educational purposes only and is not intended to encourage or promote any illegal activity. Viewers are advised to comply with all applicable laws and regulations in their jurisdiction. By watching t...
AntiVirus Basics - Signatures Based Detection
Просмотров 1,8 тыс.Год назад
AntiVirus Basics - Signatures Based Detection
UAC Bypass - Explanation and demonstration
Просмотров 6 тыс.2 года назад
UAC Bypass - Explanation and demonstration
"pretty high priviliges" with most features disabled. good vid tho!
Young Mary Thompson Sarah Lewis Anna
Kemmer Lake
Kamryn Ports
Thomas Shirley Garcia Charles Young Charles
Jarrett Dam
Shawna Forge
Luettgen Mount
Roel Tunnel
McLaughlin Skyway
Deborah Neck
Very well explained
"Transmission Control Protocol, together with Internet Protocol, forms the basis of the TCP/IP 4-layer model. These layers are conceptual frameworks that define how data should be transmitted over a network to ensure stable connections. Each layer in the model serves a different purpose. For instance, the **Network Access Layer** (the first layer) involves the physical aspects of network connections, such as the hardware responsible for data transmission. Please note, I am still under training, and the information in this comment may require further refinement or additional details."
awesome can you do some on wazuh? Its a great way to secure your network with industry standards and its FREE, or any alternative you like?
awesome playlist of videos, if you can do some on proxmox VE passing P4 PGU to containers not using the VGPU and the nvidia drivers as some have has success doing it but its not documented. I am having an issue at the moment that my VM's have started to run slow for some reason, I am using R730 SAS SSD (enterprise 1.8Gb) in HBA mode with ZFS so should be fine, I am getting another just for the Proxmox OS next month.. Doing a fresh install of proxmox to see if it clears up the slow VM's, the lastest Proxmox kernel doesnt like my Tesla p4 Gpu so have to use a previous version.. :(
yes, sandboxes
Thank you for your comment
What about resizing an encrypted system partition / volume? Do you have a procedure for that yet? I'm trying to work one out. What I know so far is that using Gparted to move it doesn't break the bootloader, but does bork the windows boot process, presumably because the offset to the EFI / boot directory has changed. This theory is reinforced by the fact that moving the partition back to the exact cylinder start stops where it was previously positioned on the disk restores the boot process with no additional repair steps. For that reason, I wouldn't expect a Header Restore to fix that particular problem. Perhaps a VeraCrypt Recovery Disk to repair the EFI entries? Still testing... Let me know if you have a solution to this.
Haven’t tried it yet
Crowdstrike need to watch this. :(
This is not related to the issue they had
Unfortunately now defender blocks the last command(
This vulnerability was fixed about a year ago
Big thx
My pleasure! More videos in this series are coming soon!
Big thx for the tutorial
My pleasure! More videos in this series are coming soon!
You can also check the loaded modules inside of your process instead of looking for a dir. simply checking -> tasklist /m /fi "imagename eq process.exe" and if it has SbieDll.dll then exit.
Nahh dude don't be teaching people that
For education purposes only! Use this to build better security for your organization.
thank you very much for this video!
Glad it was helpful!
Super + Enter
Thank you for your comment
Cool you showed us how to tell if its sandboxed not how to bypass.... Also the thing is fucking useless js.
If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing
So I only have to gain access to the mahcine, install this program, run it, let it identify it's a sandbox environment, and then I suddenly have gained access to their host mahcine? Genius!
If you check out the full video you can learn more about the technique itself. This was just an example to show the concept.
And I thought virtual machines were safe to test malware, thank you for showing me this.
You're welcome!
does it also detect if you run a sandbox in a sandbox?
Doubt
It should depending on the situation. You can check out the full video for a more technical explanation.
Hey real offensive security specialist here. This is fing useless
Yes, cap. That's the point.
If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing
i like the part where you tell us how they bypass after detecting a sandbox
If you want to learn more about this technique, check out the full video. The first step to bypass a security control is to understand which security control you’re facing
I hope you find the second part more insightful: Sandbox Evasion - Stage 2 ruclips.net/video/j4LhFmsXHFw/видео.html
Do it with more complex password. Using symbols, characters, uppercase, lowercase
Absolutely! Working on a separate video for that.
hello, very interessant and you explain things well. We are waiting the next video please
Thank you!
please can i have your email
Please speak to a service provider.
hello, I'm lucky to come across your video, first of all I thank you.Please I need your help, I am actually on a project in which I should deploy packetfence in my company network, my main difficulty is how to integrate RADIUS or a mechanism to identify all devices that connect to my network initially
Please speak to a service provider.
Please speak to a service provider.
I do actually want to know more about wire shark.
Hopefully, I will be able to create deeper dive videos soon
TBH that's a bomb video. Excellent video, right what I needed
Thank you for your support!
Please work on the volume levels on the videos, barely hear you at my normal levels, had to turn it all the way up
Will do! Thank you for the feedback!
Great content
Thank you for your support!
Oink oink
Thank you for your support!
mesmerizing content
Thank you for your support!
Hi thanks for video, i appreciate it and i hope you can explain how to use Isolation VLAN ID and create new security event for detect Anti-Virus.
Hi I will try to get to that later in the series
Keep 'em coming, captivating stuff
Will do!
Thank you, haven't known all that. Watched it twice, to make sure it all sank well
Glad it was helpful!
WhatsApp chat can be monitored?
You can potentially sniff any network traffic as long as you have access to that network and the permission to do so.
Simple and thorough. Thank you for enriching the community knowledge
Glad it was helpful!
Thank you so much
My pleasure!
Can u please show an example where you choose dual boot. I am trying to figure out how choosing dual boot modifies the veracrypt boot process. thx
I will try to get to it later in the series
what to do when getting error message "read-only file system" on Mac, after hitting the format button? can write as usual on the external hdd
Try to search the documentation: www.veracrypt.fr/en/Documentation.html
I had a good understanding about packet sniffing and i chose that as my project for tomorrows presentation so can you send me the source code for packet sniffer
I too select this as my project im confused asf can u help me?
i selected it as well, can you guys help me
Please check here: www.wireshark.org/docs/wsdg_html_chunked/ChSrcObtain