rastamouse.me
Open in
urlscan Pro
2a06:98c1:3120::3
Public Scan
URL:
http://rastamouse.me/
Submission: On March 08 via api from US — Scanned from NL
Submission: On March 08 via api from US — Scanned from NL
Form analysis
3 forms found in the DOMGET http://rastamouse.me/
<form method="get" class="searchform" action="http://rastamouse.me/">
<fieldset>
<button type="submit" class="search-button" name="searchsubmit" value="Search"><i class="icon-search"></i></button><input type="text" value="" name="s" placeholder="Search">
</fieldset>
</form>
GET http://rastamouse.me/
<form method="get" class="searchform" action="http://rastamouse.me/">
<fieldset>
<button type="submit" class="search-button" name="searchsubmit" value="Search"><i class="icon-search"></i></button><input type="text" value="" name="s" placeholder="Search">
</fieldset>
</form>
GET http://rastamouse.me/
<form method="get" class="searchform" action="http://rastamouse.me/">
<fieldset>
<button type="submit" class="search-button" name="searchsubmit" value="Search"><i class="icon-search"></i></button><input type="text" value="" name="s" placeholder="Search">
</fieldset>
</form>
Text Content
Skip to content Rasta Mouse Cheesy Rumbles Rasta Mouse Cheesy Rumbles * Home * ANYSIZE_ARRAY IN C# Blog / January 29, 2024 / Rasta Mouse There are multiple structures in Windows that contain fixed sized arrays. The instance I came across recently was the KERB_QUERY_TKT_CACHE_RESPONSE struct, which looks like this: ANYSIZE_ARRAY is defined as 1 in winnt.h, but the reality is that the array will be of size CountOfTickets. This value obviously cannot be known at compile time. Translating these Read more SAFEHANDLE VS INTPTR Blog / January 6, 2024 / Rasta Mouse C# is a popular language in both the commercial space (think ASP.NET Core, MVC, Blazor, WPF, MAUI, etc) and the infosec space. The most well known offensive C# tools are probably those in GhostPack (Rubeus, Seatbelt, Certify, SharpUp, etc). A lot of offensive tools that target Windows use interop (P/Invoke) quite heavily to call WinAPIs Read more COBALT STRIKE AGGRESSOR CALLBACKS Blog / October 3, 2023 / Rasta Mouse The Cobalt Strike 4.9 release introduced support for registering Aggressor callbacks for several functions including bexecute_assembly, bpowerpick, and binline_execute. Prior to this feature, there was no practical way of tasking Beacon and then performing further actions based on the output (other than reading it on the console and then manually issuing more commands). To demonstrate Read more BUILDING A (SLIGHTLY) BETTER MELKOR Blog / September 6, 2023 / Rasta Mouse Melkor is a C# POC written by FuzzySec to simulate a TTP employed by InvisiMole. The concept is that post-ex assemblies are loaded into a payload/implant and kept encrypted using DPAPI whilst at rest. They are decrypted on demand and executed in a separate AppDomain. The AppDomain is unloaded once execution completes and only the Read more C# SOURCE GENERATORS Blog / July 2, 2023 / Rasta Mouse Introduction C# Source Generators made their first appearance around the release of .NET 5 and now ship as part of the .NET Compiler Platform (“Roslyn”) SDK. They allow developers to inspect user code as it is being compiled and even create new C# source files on the fly and add them to the compilation. A Read more SHARPC2: HTTPS WITH REDIRECTOR Blog / April 4, 2023 / Rasta Mouse This post will demonstrate how to use the HTTPS handler in SharpC2 with an Apache redirector. I’ll be running SharpC2 inside WSL on my physical host and an EC2 instance as my redirector. The traffic will be proxied from Apache to SharpC2 over a reverse SSH tunnel. Redirector First, install Apache and enable the relevant Read more .NET STARTUP HOOKS Blog / January 2, 2023 / Rasta Mouse tl;dr Since .NET Core 3, the dotnet runtime has provided a low-level hook that allows injecting managed code that will run before an application’s entry point. This hook makes it possible to effectively backdoor any .NET application on a host (Windows, Linux, and macOS). You may ask why such a feature exists. It’s used in Read more TOKEN IMPERSONATION IN C# Blog / December 16, 2022 / Rasta Mouse This post was inspired by a question posted by kevin in my Discord server, about how token impersonation can be applied to threads in C#. Before delving into that particular facet, let’s do a quick recap of token impersonation as a whole. What is Token Impersonation? This is a practice by which a calling thread Read more GETDOMAIN VS GETCOMPUTERDOMAIN VS GETCURRENTDOMAIN Blog / October 27, 2022 / Rasta Mouse Many Active Directory enumeration and post-exploitation tools need to figure out which domain they’re in or which domain they need to target. For convenience, PowerShell and C# tools can use the .NET Domain class from the System.DirectoryService.ActiveDirectory namespace. This class has several methods that can return a relevant Domain object, including GetComputerDomain() and GetCurrentDomain(). This Read more EVILGINX, MEET BITB Blog / July 27, 2022 / Rasta Mouse Obligatory disclaimer that I did not come up with any of these techniques – I’m just combining two awesome ideas by other people. If you’re not familiar with Evilginx or BITB, here’s a quick recap. Evilginx, created by Kuba Gretzky, is a man-in-the-middle framework designed to facilitate the capture of credentials and session cookies. It Read more 1 2 3 RECENT POSTS * ANYSIZE_ARRAY in C# * SafeHandle vs IntPtr * Cobalt Strike Aggressor Callbacks * Building a (slightly) better Melkor * C# Source Generators Read More Copyright © 2024 Rasta Mouse | Powered by DiagnoSEO WordPress Theme SEARCH