0 Followers
0 Following
4 Posts
How I discovered and chained and RCE and an XSS on CHAOS RAT v5.01, allowing an attacker to takeover the RAT server. Taking inspiration from https://x.com/ACEResponder/status/1687214024247615488, I also added exploit functionality to rickroll RAT operators.
https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/
https://github.com/chebuya/CVE-20
ACE Responder (@ACEResponder) on X

Introducing RogueSliver. A tool to disrupt offensive campaigns that use the Sliver C2 framework. • Hijack beacons • Send memes to the attacker • Flood C2 servers #DFIR #RedTeam https://t.co/DeJq1P8byd

X (formerly Twitter)
I found a pre-auth path traversal vulnerability in the Jasmin Ransomware panel allowing an attacker to deanonymize panel operators and dump decryption keys. Jasmin ransomware was observed in a recent TeamCity exploitation campaign (https://twitter.com/brody_n77/status/1765145148227555826)
https://github.com/chebuya/CVE-20
Brody (@brody_n77) on X

Multiple cases of JetBrains TeamCity exploitation (CVE-2024-27198, CVE-2024-27199) being followed up by deployments of (suspected modified) Jasmin Ransomware. https://t.co/3zgKhY8fi1 https://t.co/IYP2Ls19WS https://t.co/SE8YvgjchR

X (formerly Twitter)