_RastaMouse
@rastamouse.me
750 followers 58 following 68 posts
Wannabe security guy. Director @ Zero-Point Security.
Posts Media Videos Starter Packs
Reposted by _RastaMouse
raphaelmudge.bsky.social
Why plant a Tradecraft Garden?

April 2025, I talked to my camera about how tradecraft may go the route we saw vuln research go years ago, red teaming's retreat to self-protective secrecy, and the opportunity I see for a public tradecraft ecosystem. This starts @ 1:16:00

vimeo.com/1074106659#t...
Post-ex Weaponization: An Oral History
This is "Post-ex Weaponization: An Oral History" by AFF-WG on Vimeo, the home for high quality videos and the people who love them.
vimeo.com
Reposted by _RastaMouse
calz0n3.bsky.social
The new Crystal Palace version is very cool.

Having DFR in your PIC code and just providing a resolver function is so much more ergonomic than having two different mechanisms for resolving APIs! I love it - already updated my HWB PICO to incorporate the new functionality.
rastamouse.me
I'm legit blown away. We can use DFR with Nt* APIs now!
rastamouse.me
Thanks. Discussions are open on the repo - I'm interested in hearing people's thoughts on this as an evasion strategy. I think it has a lot of potential.
rastamouse.me
My motivation behind this is to hook & spoof APIs that aren't supported by BeaconGate, such as CreateProcessA. Passing the PICO memory allocation data to Beacon via BUD also ensures that a custom Sleepmask can free it after ExitThread is called.
rastamouse.me
Working on a fun Crystal Palace loader that hooks APIs and pushes them through a call stack spoofing PICO.
rastamouse.me
And probably more that I'm missing right now. Just dismissing the issue entirely is pure folly.
rastamouse.me
What's the domain password policy (e.g. what's the theoretical worst-case crack time)? Does the svc account need to be that privileged? Is there a process for changing svc account passwords? Can the business detect/respond in the event the account is compromised?
rastamouse.me
Reporting it as informational just because they couldn't crack it would be an egregious error on their part, imo. Many factors would elevate the risk. Most testers only use shitty laptops, but what level of threat/resources is the business defending against?
rastamouse.me
Could MS do better in how they communicate issues with product security? Absolutely. But this isn't just a 'them' problem. I don't see how this letter to the FTC will foster a positive attitude within MS towards participation in good, open security conversations.
rastamouse.me
So why doesn't he also criticise businesses, including his own government, for not building in accordance with industry-recognised standards and for not carrying out security due diligence to ensure compliance against those standards?
rastamouse.me
The message he puts across is pretty much "everyone is too lazy or stupid to change the defaults, so let's blame MS". The first time I saw 'disable RC4 guidance' was in the CIS benchmark for 2012 R2 in 2018.
rastamouse.me
I cannot conceive of a scenario where a vulnerability this old goes unknown or unmitigated for this long, where the business is completely absolved of all responsibility. The Senator's letter willfully ignores the failures made by businesses.
rastamouse.me
A CISO doesn't need to understand the technical details of any vulnerability; they pay for security assessments that communicate issues to them in ways they do understand.
rastamouse.me
I can't really wrap my head around it tbh. I find it totally far-fetched that they didn't know this issue existed, and bitching that "MS didn't tell us about it" is deflecting their own negligence.
raphaelmudge.bsky.social
My case study tries to show: cybersecurity does NOT have systemic ground truth discussion. It's almost all unproductive blame with omission of details to keep some away from blame (e.g., failed compensating controls, facilitating ransomware payments) w/ strategic messaging that leads to offsec blame
rastamouse.me
I'm not victim-blaming, but I've been on that side of the conference door too many times. It's literally the reason why I quit.
rastamouse.me
I do think that Ascension and others that get roasted like this do need to take some accountability though. I'd be willing to bet Kerberoasting was raised in one if not multiple pentest reports prior to the breach, but they chose not to do anything about it.
raphaelmudge.bsky.social
Analysis of a Ransomware Breach

aff-wg.org/2025/09/26/a...

Breach analysis? Breach intelligence? Industry critique? Fee-only ransomware negotiator? 100% efficacy? The story of how Microsoft worked an old problem, fucked it up, we malign the guy who told us, they fixed it, and it wasn't fixed? PtH?
Reposted by _RastaMouse
raphaelmudge.bsky.social
Analysis of a Ransomware Breach

aff-wg.org/2025/09/26/a...

Breach analysis? Breach intelligence? Industry critique? Fee-only ransomware negotiator? 100% efficacy? The story of how Microsoft worked an old problem, fucked it up, we malign the guy who told us, they fixed it, and it wasn't fixed? PtH?