Twitter | Search | |
Matt Graeber
These are the hashes you implicitly trust on a stock Win10 build: Here is the code I used to obtain the hashes:
Sample code used to extract catalog hashes from a mounted Windows image
GitHub GitHub @github
Reply Retweet Like More
Matt Graeber Dec 16
Replying to @mattifestation
Try to have some fun with this. For example, did you know that a file with a single null byte is "signed" by Microsoft? SHA256 Hash: 6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
Reply Retweet Like
Matt Graeber Dec 16
Replying to @mattifestation
How many of these hashes are present in VT that would return a pos AV hit count > 1 (excluding Cylance because they flag everything)? If you want to try this, note that hashes for PEs in that list will be Authenticode hashes, not file hashes. VT refers to this as "Authentihash".
Reply Retweet Like
Matt Graeber Dec 16
Replying to @mattifestation
Also, note that there's a bunch of SHA1 hashes in there...
Reply Retweet Like
secabstraction Dec 17
Replying to @mattifestation
I feel like you’re intentionally going against posh best practices to annoy... =P
Reply Retweet Like
Matt Graeber Dec 17
Replying to @secabstraction
Please point me to best practices for quick and dirty PoCs.
Reply Retweet Like
secabstraction Dec 17
Replying to @mattifestation @GIPHY
Reply Retweet Like
Hacker Hurricane Dec 18
Replying to @mattifestation
Do they ever change on updates, or always the same?
Reply Retweet Like
Matt Graeber Dec 18
Replying to @HackerHurricane
They change on updates.
Reply Retweet Like
Hacker Hurricane Dec 18
Replying to @mattifestation
Figured as much
Reply Retweet Like