Ivan Kwiatkowski Profile Banner
Ivan Kwiatkowski Profile
Ivan Kwiatkowski

@JusticeRage

9,484
Followers
73
Following
248
Media
2,666
Statuses

Lead cyber threat researcher @HarfangLab . Maintainer of Manalyze, Gepetto, and writer. Trolling on a purely personal capacity.

France
Joined April 2014
Don't wanna be here? Send us removal request.
Pinned Tweet
@JusticeRage
Ivan Kwiatkowski
3 years
I've been working on this for 5 years, and it's finally out! I wrote a dark fantasy book (no computers involved), and it's the hardest thing I have ever done. I'm extremely proud of the final result. (But it's in French, for now.)
Tweet media one
27
35
166
@JusticeRage
Ivan Kwiatkowski
1 year
Step 1: open a binary in IDA and press F5 Step 2: paste the decompiled code into OpenAI's chatbot Someone's job just got way easier.
Tweet media one
Tweet media two
66
888
5K
@JusticeRage
Ivan Kwiatkowski
1 year
I wrote an IDA plugin that queries #ChatGPT and explains decompiled functions. It's still very bleeding edge, but you can find the code here and try it out: (Yes, the video was performed on a very basic case for simplicity's sake.)
22
383
1K
@JusticeRage
Ivan Kwiatkowski
3 years
As a reverse engineer, the most difficult part of my job remains to figure out how to format tables in Microsoft Word when I'm writing reports.
32
97
1K
@JusticeRage
Ivan Kwiatkowski
1 year
Kaspersky released a new blogpost today, documenting an iOS 0day + zero-click exploit used to target cybersecurity researchers. The scope and full victimology are still unknown.
10
240
673
@JusticeRage
Ivan Kwiatkowski
4 years
I'll just leave this here.
Tweet media one
18
218
568
@JusticeRage
Ivan Kwiatkowski
7 years
Nobody wants to use GPG. Not even Nigerian scammers who have a victim on the hook ☹️
Tweet media one
15
236
491
@JusticeRage
Ivan Kwiatkowski
3 years
We released two videos for free from our online reverse engineering course. They focus on Go malware (Sunshuttle). Almost 2 hours of premium IDA Pro entertainment!
5
182
501
@JusticeRage
Ivan Kwiatkowski
3 years
We created cheat sheets for IDA Pro and x64dbg for our online course recently, and were authorized to share them with everyone! The aim was to list all hotkeys that we use on a daily basis, i.e. only those we feel are worth learning. I hope you find them useful!
Tweet media one
Tweet media two
5
192
484
@JusticeRage
Ivan Kwiatkowski
1 year
@RemyBuisine J'ai mis en place hier soir au cas où cela se produirait, à afficher avec un téléphone portable !
19
170
433
@JusticeRage
Ivan Kwiatkowski
1 month
Interesting trick used by scammers over DMs. They invite you to click on a link which appears to lead to the calendly website, but if you check the resulting URL, you will end up somewhere else (i.e., hxxps://calindaly[.]com/). How does this work?
Tweet media one
11
100
447
@JusticeRage
Ivan Kwiatkowski
6 years
Malware writing #ProTip : do not compile samples on your home machine.
Tweet media one
16
196
409
@JusticeRage
Ivan Kwiatkowski
1 month
This fools Twitter's card generation into displaying a false URL. Long story short, you can't trust Twitter's previews, don't click on links sent by strangers and if you can't help yourself, double check where you land.
6
64
392
@JusticeRage
Ivan Kwiatkowski
3 years
The CRAZIEST thing just happened to me! (cc @signalapp )
15
44
379
@JusticeRage
Ivan Kwiatkowski
2 years
I have written a personal statement about the war in Ukraine, recent criticism about Kaspersky and its founder. Those words were written from the heart. I humbly hope they give you pause. I am staying in GReAT, and here is why. (FR version coming soon.)
55
98
381
@JusticeRage
Ivan Kwiatkowski
3 years
Our online reverse-engineering / malware analysis course (intermediate level) is finally launching! @legezo and I have been working on it almost exclusively for 6 months now. 50+h of video, 100h of virtual lab time, 10 real-life APT malware cases.
8
111
333
@JusticeRage
Ivan Kwiatkowski
5 months
Problem: deep enough home server racks are super expensive and difficult to source. Solution: introducing the IKEA GhettoRåck™️, made out of: - 2x BESTÅ cabinets - 2x MÖRTVIKEN doors A 10-ish U rack for under 300€, coming to your garages everywhere.
Tweet media one
Tweet media two
Tweet media three
16
25
321
@JusticeRage
Ivan Kwiatkowski
1 year
A lot of the value I bring to any company comes in the form of entertainment, specifically through an endless stream of salty emails. AI just made me obsolete. All hail our new robot overlords.
Tweet media one
7
50
311
@JusticeRage
Ivan Kwiatkowski
3 years
"Hi, I see you're into reverse-engineering too!"
Tweet media one
10
26
302
@JusticeRage
Ivan Kwiatkowski
5 years
Webcam defense in depth.
9
53
261
@JusticeRage
Ivan Kwiatkowski
3 years
@signalapp Unbelievable indeed.
Tweet media one
6
13
258
@JusticeRage
Ivan Kwiatkowski
1 month
A normal request to the website returns HTML content as you would expect (1st screenshot). But if you change your user-agent to TwitterBot (the one used when generating cards), watch what happens (second screenshot). The server sends a second redirect to the legitimate site.
Tweet media one
Tweet media two
4
18
264
@JusticeRage
Ivan Kwiatkowski
3 years
An update to my 0day handling ethics mind-map for cybersecurity researchers. Version 1.0 did not account for the possibility of becoming accessory to murder. What a silly oversight on my part.
Tweet media one
5
77
242
@JusticeRage
Ivan Kwiatkowski
10 months
Personal news: I have resigned from my position in @Kaspersky 's GReAT team. I'm very grateful for my time there and everything the team accomplished. I don't have any reason to believe anything I wrote about the company was untrue at the time I wrote it. I will now take a…
26
12
228
@JusticeRage
Ivan Kwiatkowski
6 years
Hey Twitter. Did anyone ever find out why TrueCrypt shut down operations back in 2014? We never got answers, but I need closure.
11
56
204
@JusticeRage
Ivan Kwiatkowski
6 years
Curl is being introduced as a standard windows command line tool! Malware authors all over the world must be extatic; stage 1s are going to get smaller.
4
132
197
@JusticeRage
Ivan Kwiatkowski
7 years
New blog post: a full Process Hollowing / Manalyze tutorial.
Tweet media one
0
131
191
@JusticeRage
Ivan Kwiatkowski
4 months
RCE in Redis < 7.2.4 (CVE-2023-41056) I haven't seen a lot of noise about this one. Redis is everywhere (NextCloud, Mastodon, GitLab...) – if you're using it, patch now, but I also expect to see a lot of second-degree exploitation with this one.
2
73
194
@JusticeRage
Ivan Kwiatkowski
5 years
New release: a Python script to catch careless intruders on your machines by "booby-trapping" binaries.
Tweet media one
1
68
177
@JusticeRage
Ivan Kwiatkowski
4 years
Our research on the new(?) mercenary APT DeathStalker is finally out! Please take a look if you're interested in Evilnum or Janicab! (cc @securechicken )
2
104
172
@JusticeRage
Ivan Kwiatkowski
7 years
New script: a multi-threaded site mapper in Python. #crawling #pentest
Tweet media one
1
91
163
@JusticeRage
Ivan Kwiatkowski
6 months
I have the pleasure to announce I'm joining @HarfangLab as Lead Cyber Threat Researcher starting tomorrow! I'll be working on APTs from everywhere, reversing malware, writing FOSS tools and blog posts!
Tweet media one
20
5
164
@JusticeRage
Ivan Kwiatkowski
3 years
Not to bash on a single individual, which accomplishes nothing - but this is exactly why there is a need for more discussion about ethics in infosec. Take a minute to think about how your actions have impacted "human and women rights" and "free speech" in 2021.
Tweet media one
15
28
162
@JusticeRage
Ivan Kwiatkowski
4 years
We're very happy that this research is released: In it, @felixaime , @securechicken and I discuss the connection between the VHD ransomware and the Lazarus group. This work was made possible with huge help from Kaspersky's GERT (IR) team.
1
81
152
@JusticeRage
Ivan Kwiatkowski
28 days
On March 25, the FBI released an indictment of APT31 hackers. We read it carefully to find new intel, and managed to connect a few dots (including about the RAWDOOR malware family). Full article and IOCs:
2
75
155
@JusticeRage
Ivan Kwiatkowski
7 years
This #MrRobot episode is the gift that keeps on giving! leads to and also:
Tweet media one
Tweet media two
1
52
142
@JusticeRage
Ivan Kwiatkowski
1 year
Hahaha, gotcha #ChatGPT ! They've been patching loads of jailbreaks as they are found, but the possibilities are endless.
Tweet media one
6
29
146
@JusticeRage
Ivan Kwiatkowski
11 months
Okay Twitter 😶 Sorry non-French speakers, I can't translate this tweet considering how heinous it is. Imagine a hatred bingo combining the N-word, call for violence and nazism.
Tweet media one
16
60
144
@JusticeRage
Ivan Kwiatkowski
3 years
A few days ago, I contributed an IDA Pro script which extracts type information from Go binaries to @juanandres_gs ' AlphaGolang repository. We just released an article that gives background on how this works: Code:
0
60
141
@JusticeRage
Ivan Kwiatkowski
4 years
I've added a script to Manalyze which plots the compilation timestamps of a PE collection: Credit goes to @x0rz for the pretty charts.
Tweet media one
2
38
134
@JusticeRage
Ivan Kwiatkowski
2 months
We're silently moving from a "everyone is vulnerable" world to a "everyone is backdoored" world.
5
14
131
@JusticeRage
Ivan Kwiatkowski
2 years
I feel like there's a need to clarify what is going on here, it's an interesting anti-sandbox trick. The SeShutdownPrivilege string is constructed on the stack dynamically, in particular the program uses the first letter of its filename as an index in the string.
@Lexsek_
Lexsek
2 years
If you analyze HermeticWiper ( 61b25d11392172e587d8da3045812a66c3385451) and you are a beginner to malware RE, be careful to your sample name. Sometimes, it breaks or modifies the behavior of the malware. #HermeticWiper #malware
Tweet media one
2
34
134
1
39
125
@JusticeRage
Ivan Kwiatkowski
6 years
Me discovering the Threat Intelligence world.
Tweet media one
2
32
121
@JusticeRage
Ivan Kwiatkowski
6 years
Ping to all hash crackers: @trustedsec has just released a great set of scripts at . - Wordlist deduplication - Analysis of already cracked hashes - Launches all the run-of-the-mill attacks from a single command And a lot of other goodies.
0
51
118
@JusticeRage
Ivan Kwiatkowski
7 years
Interesting points on where to host a cybercrime discussion by Fadli Sidek #HITBGSEC17
Tweet media one
4
46
113
@JusticeRage
Ivan Kwiatkowski
4 months
Hidden gem in @DonnchaC 's #37C3 talk on Predator spyware: state actors could generate @letsencrypt certificates for any website by using their MitM capabilities at ISP level to complete verification challenges (both HTTP and DNS I expect). CT may be the only way to detect this.
2
39
115
@JusticeRage
Ivan Kwiatkowski
6 years
Spotted: a French website impersonates @KeePass at , bundles it with adware () and worst of all (apologies to non-French speaking readers):
Tweet media one
12
136
112
@JusticeRage
Ivan Kwiatkowski
3 years
In the interest of supporting the discussion on the ethics of releasing PoCs for critical vulnerabilities, I created the following mind map. It is merely meant as a listing of the available options and associated consequences. No judgement intended.
Tweet media one
5
37
110
@JusticeRage
Ivan Kwiatkowski
7 years
Well hello Iranian internet,, nice to meet you too.
Tweet media one
4
67
102
@JusticeRage
Ivan Kwiatkowski
6 years
What have we done?
Tweet media one
9
44
108
@JusticeRage
Ivan Kwiatkowski
5 years
I have stumbled onto something interesting while working on PE resource timestamps. It seems that a build chain, somewhere, is using local (non-UTC+0) timestamps for resources, which can help determine where the binary is compiled. Is this something known?
Tweet media one
2
43
106
@JusticeRage
Ivan Kwiatkowski
4 months
New blog post: "So you want to work in cybersecurity". Every time I post research here, I get DMs asking how to get into cybersecurity. Instead of repeating myself ad nauseam, I wrote down all my thoughts on the subject here: Personal opinion obviously.
5
39
108
@JusticeRage
Ivan Kwiatkowski
2 years
A few minutes ago at BotConf, I shared a script to import and export Twitter blocklists. I use it to block advertisers on the platform! Find my code and current list here:
5
26
105
@JusticeRage
Ivan Kwiatkowski
3 months
The #ISoon leak confirms beyond the shadow of a doubt USG's attribution of APT41 activities to Chengdu 404! ISoon is quite amused by it too!
Tweet media one
0
26
105
@JusticeRage
Ivan Kwiatkowski
3 months
We're working on a huge report. It's coming #isoon .
3
5
102
@JusticeRage
Ivan Kwiatkowski
3 years
For the record, this is a clear misrepresentation of my teammates' research. 1) We did *not* attribute these samples to any organization. 2) Lambert is *not* an internal name for the CIA. If you're going to attribute attacks, do it in your own name.
0
45
100
@JusticeRage
Ivan Kwiatkowski
5 years
New release: a python script that uses SMART data to detect evil maid attacks.
0
66
91
@JusticeRage
Ivan Kwiatkowski
7 years
#SSTIC Deauthenticating the railgun to prevent @x0rz from being shot on stage.
Tweet media one
7
29
93
@JusticeRage
Ivan Kwiatkowski
2 years
Our reverse-engineering course has been out for a few months now, and the feedback is amazing :) If you haven't checked it out, there's IDA scripting, mock C2 development, hardcore deobfuscation and even Go. Feel free to DM me with any question!
@Farenain
Farenain
2 years
So after finishing another video from @kaspersky malware training, I've implemented the commands from Lazarus sample in the C2 emulator, it was pretty interesting learning about this topic, thanks to @JusticeRage for the extra exercise.
Tweet media one
2
8
48
3
23
96
@JusticeRage
Ivan Kwiatkowski
3 years
I hear a lot of people are looking for Pegasus samples. Dear @ANSSI_FR , please buy the product, get all 0days patched, leak the tools and infra. Burn them to the ground and I swear I will never ever complain again about how my tax money is spent.
3
14
95
@JusticeRage
Ivan Kwiatkowski
2 years
To be fair, anti-cheat usually only has a single process to protect, which its developers fully own. EDR and endpoint solutions have to defend whole systems that they have zero control over, which is a much more difficult task. We welcome constructive feedback from game hackers!
@GuidedHacking
GuidedHacking
2 years
bypassing anticheat is harder than bypassing EDR infosec is cucked by cheat engine users your entire industry is a joke
0
59
386
2
11
95
@JusticeRage
Ivan Kwiatkowski
5 years
Our team has been investigating #LockerGoga and we can assess with medium confidence that it is linked to GrimSpider. We believe a Cobalt Strike / meterpreter combination is used during the post-exploitation phase. C2s use the default SSL certificate on port 443 ;)
5
57
92
@JusticeRage
Ivan Kwiatkowski
6 years
This has to be the dumbest "forgotten password" form that was ever written. There aren't enough facepalm gifs in the whole Internet to convey how I feel.
Tweet media one
6
28
93
@JusticeRage
Ivan Kwiatkowski
7 years
I just realized that XORing a string with 32 (0x20) toggles capitalization. I feel both amazed and stupid.
9
35
90
@JusticeRage
Ivan Kwiatkowski
4 months
#100DaysofYARA I created a web service that allows you to verify on which yara versions your rule compiles. In the past, shipping rules to customers, I wondered if there were limitations but couldn't find out easily. Now I can.
Tweet media one
2
35
88
@JusticeRage
Ivan Kwiatkowski
5 years
It just seems easier to get a WPA handshake and bruteforce the password, now that you know it's 10 digits.
2
21
85
@JusticeRage
Ivan Kwiatkowski
4 months
List of Ivanti / PulseSecure C2s we discovered (h/t @securechicken ): 146.0.228[.]66:1080/assets/js/xml.php 146.0.228[.]66:1080/css/chat.jsp 146.0.228[.]66:8111/css/chat.jsp 152.32.128[.]64 154.223.17[.]218 159.65.130[.]146:80 159.65.130[.]146:80/index 35.201.216[.]249:80/index…
1
17
82
@JusticeRage
Ivan Kwiatkowski
6 years
I just stumbled on to this very interesting Linux post-exploitation talk by @_ta0 : It's full of hidden gems, I'll be watching it again so I can take notes.
0
44
80
@JusticeRage
Ivan Kwiatkowski
1 year
Alright. Is it maybe time to talk about using *local* password managers instead of cloud-based ones? Yes, they're better than no password manager, but come on. Don't trust anyone with such sensitive data as your passwords.
7
31
82
@JusticeRage
Ivan Kwiatkowski
7 years
I added a script which automatically shelljacks (log term) into users who SSH into a box to my repo! cc @emptymonkey
2
35
78
@JusticeRage
Ivan Kwiatkowski
4 years
This has got to be the best caption I've ever seen in an malware analysis post.
Tweet media one
2
21
75
@JusticeRage
Ivan Kwiatkowski
1 year
Dear @HexRaysSA , considering that you won't allow me to renew my licence, I'd appreciate it if you either: a) Granted me an OSS dev license, considering the value I bring to your customers for free b) Refrained from using my work for PR purposes Cheers
@HexRaysSA
Hex-Rays SA
1 year
#Gepetto keeps the first position for the second month in a row! Good job @JusticeRage 👏 Got a plugin that could be on the top of the chart? Publish it, and let’s see 🌐 #IDAPlugin #PluginRoundup #IDAPro #IDAPython
Tweet media one
1
3
18
5
11
76
@JusticeRage
Ivan Kwiatkowski
2 years
Very unhappy and disappointed by this move from @HexRaysSA . During trainings, how can I justify the investment for newcomers if now they can't use the software after a year?
7
15
74
@JusticeRage
Ivan Kwiatkowski
3 years
@x0rz *Looks at bio* "Human & Women's Rights - Free Speech Activist" selling 0days to Zerodium Yup, that seems about right.
Tweet media one
3
8
73
@JusticeRage
Ivan Kwiatkowski
3 months
New research: our team at @harfanglab just published an investigation into possible Arid Viper (but definitely Hamas-related) activity against 🇮🇱 targets, based on a tip from @NicoleFishi19 . We analyzed the malware (including 2 wipers) & IW aspect:
2
31
74
@JusticeRage
Ivan Kwiatkowski
1 year
New feature added moments ago: @OpenAI 's #ChatGPT now automatically renames variables in the pseudocode view. (Video slightly edited to cut loading times.) Keep in mind that this is only the work of a single week-end! This thing is only getting started.
2
9
72
@JusticeRage
Ivan Kwiatkowski
3 years
I showed this tip to a friend today, and thought maybe it could be useful to other people. Problem: how to write Yara rules that match a given ASM snippet? Answer in three steps. 1) Open a random program with x64dbg. Break anywhere, entry point is fine.
Tweet media one
7
29
71
@JusticeRage
Ivan Kwiatkowski
4 years
Here's an interesting paper on APT campaign modeling: I like that it focuses on the attacker's lifecycle inside the victim's network.
0
28
67
@JusticeRage
Ivan Kwiatkowski
7 years
I had a Raspberry sitting in a drawer. Just installed Pi-Hole and it looks great!
4
33
65
@JusticeRage
Ivan Kwiatkowski
3 years
This tweet was deleted in silent shame, but I feel that it should be recorded somewhere for future generations.
Tweet media one
3
34
66
@JusticeRage
Ivan Kwiatkowski
2 years
Pro reverse-engineering tip: don't spend too much time looking at code located in kernel32.dll as this can lead to significant lost time and ridicule on Twitter.
4
5
66
@JusticeRage
Ivan Kwiatkowski
3 years
When debugging DLLs, I often need to go back and forth between @x64dbg and IDA. So far, here is the quickest way I have found to convert addresses. Is there a better one?
Tweet media one
7
25
67
@JusticeRage
Ivan Kwiatkowski
2 years
I'm very happy to share a project I've been working on for a long time now. A 🔥 scathing 🔥 three-part series on cryptocurrencies & NFTs. Part I: blockchains and crypto Part II: NFTs Part III: the politics of cryptocurrencies Part I was just released:
3
27
65
@JusticeRage
Ivan Kwiatkowski
8 months
In brain-damaged bug bounty hunter news today, this report that the website of my *open-source program* leaks source code.
Tweet media one
6
8
65
@JusticeRage
Ivan Kwiatkowski
5 years
Next week, I'll be speaking @virusbtn about ethics in infosec. Please come, I promise I'll try to make it entertaining.
Tweet media one
2
20
64
@JusticeRage
Ivan Kwiatkowski
5 years
The video of my @virusbtn talk on ethics in infosec is now online! Of all the talks I've given, it's the one I find the most important. Thanks again to the organizers for accepting it!
2
23
66
@JusticeRage
Ivan Kwiatkowski
3 months
Manalyze is 10 years old today! 🎂 Over time, it has processed over 100 GB of files (that I know of) with no meaningful security issues. I still use it to this day, I know others do too. There's still much I want to do, hopefully in the next 10 years!
0
19
63
@JusticeRage
Ivan Kwiatkowski
3 years
Very happy to share the results of a new investigation with @_marklech_ and @securechicken ! In this case, we talk more about the things we don't know than the things we do, which is a huge part of threat intelligence. I hope you enjoy the read!
1
38
63
@JusticeRage
Ivan Kwiatkowski
2 months
You might have heard about a "massive" ongoing attack on FR government websites. Here's some context. 1) Anonymous Sudan claimed the attack. It's a hacktivist group which has consistently aligned with 🇷🇺 interests – to the point of being suspected of being a front for RU psyops
Tweet media one
1
24
61
@JusticeRage
Ivan Kwiatkowski
6 years
Well well well. Seems like actors are trying to split the #NetNeutrality hashtag to prevent it from trending. Background on this technique:
Tweet media one
3
47
56
@JusticeRage
Ivan Kwiatkowski
7 years
I just added new Yara rules to Manalyze based on an idea by @cyb3rops . Idea: detect xor'd function names.
Tweet media one
2
24
58
@JusticeRage
Ivan Kwiatkowski
2 years
Oh wow, @Qualys disclosed an LPE affecting polkit, preinstalled on every major Linux distribution. Patch your systems!
Tweet media one
0
31
57
@JusticeRage
Ivan Kwiatkowski
3 years
There's currently a summer sale on our online reverse-engineering training! The price dropped by over 25% for this month: please check it out if you were considering it before! DMs are open if you have any questions about the course.
1
21
56
@JusticeRage
Ivan Kwiatkowski
1 year
Big update to #Gepetto today, with support for GPT-4! This will only work if you have access to the corresponding API (via a waiting list AFAIK). Lots of refactoring in preparation for more features, so it might be a little bleeding edge!
Tweet media one
1
16
55
@JusticeRage
Ivan Kwiatkowski
1 year
Takeaways of the war in Ukraine for the cybersecurity community: I contributed to this article along with @craiu and @securechicken . As with any analysis piece, there's some deal of personal opinion in there, so I'm very interested in other assessments.
0
21
49