Last post I created some land tiles and aligned them in a grid/map of sorts. This post, I hope to get units to be able to move on those tiles when the player clicks on them.
All posts in tutorial
CardConquest GameDev Blog #3: Adding New Unit and Land Object
In this post, I plan to do the following:
1.) Add a new unit type: a tank
2.) Create land objects that the units will move on
CardConquest GameDev Blog Post 2: Highlighting Selected Object
In my first game dev blog post, I showed how to select an object when you clicked on it. In this post, I’ll make it so when you click on an object, that object is “highlighted” to show the player what objects they have selected.
CardConquest GameDev Blog: Selecting Object with Mouse Click
I wanted to also create this GameDev Blog to document my progress making this game in Unity to 1.) Reinforce what I was learning in Unity by making myself describe what I was doing, and 2.) Hopefully provide some useful information to any other would-be game makers out there on how I figured out how to do things.
Getting Rastamouse’s AmsiScanBufferBypass to Work Again
When I need to bypass AMSI, I tend to use RastaMouse‘s AmsiScanBufferBypass. Rastamouse has a few blog posts that cover how it works. The basics of it is this: Load amsi.dll, then patch the AmsiScanBuffer() function so that it always returns AMSI_RESULT_CLEAN. This allows for your nasty payloads to execute without AMSI ruining your day.…
Covenant C2 Infrastructure with Azure Domain Fronting
In a previous post I discussed to setup basic redirectors with Covenant C2. In this post, I hope to show you how to use domain fronting through an Azure CDN for your C2 traffic. A lot of this is based on another post I read from ar-infosec that you can find here. What is Domain…
Privilege Escalation with Canon MX490 Printer Drivers
As part of my “research” I created a tool called “Get-Writable” that will search for .exe and .dll files that are world writable. You pass Get-Writable a directory path, and it will recursively look through every directory to find files. I had Get-Writable start at the “C:\” root to try and find all writable .exe’s…
DLL Side-loading Appverif.exe
A couple of weeks ago, FireEye published a blog called “Abusing DLL Misconfigurations.” The gist of the blog post is that when an application is executed, it will try and load DLLs for whatever functionality it needs. If the Windows Side-by-side manifest for the application does not have the explicity full path of the DLL,…
Resource Based Constrained Delegation
Earlier this year on a internal penetration test for my employer, I was stuck on Active Directory (AD) escalation. I had gotten a foothold in the environment by cracking a user’s hashed credentials that I had captured through DHCPv6 spoofing. However, the user didn’t belong to any privileged groups and didn’t have local admin privileges…
Constrained Delegation
In previous posts, I have discussed how to setup an AD lab in AWS, attack AD using Kerberoast, and attacking AD with Unconstrained Delegation. In this post I am going to discuss another attack I built into my lab Constrained Delegation. This will all be done through Covenant C2, which I discussed how to setup…