ARZ (@arz_101) 's Twitter Profile
ARZ

@arz_101

Smol Pentester | OSCP | gib AD | UwU

ID: 1115372891435077633

linkhttps://arz101.medium.com/ calendar_today08-04-2019 21:56:34

2,2K Tweet

967 Followers

305 Following

Print3M // SecTube.tv (@print3m_) 's Twitter Profile Photo

"The Renaissance of NTLM Relay Attacks: Everything You Need to Know" by Elad Shamir (SpecterOps) 🔥 One of the best overview of NTLM relay technique I've ever seen. (and the styling is is an art in itself!) #redteam #security #infosec #windows specterops.io/wp-content/upl…

"The Renaissance of NTLM Relay Attacks: Everything You Need to Know" by <a href="/elad_shamir/">Elad Shamir</a>  (<a href="/SpecterOps/">SpecterOps</a>) 🔥

One of the best overview of NTLM relay technique I've ever seen. (and the styling is is an art in itself!) 

#redteam #security #infosec #windows 

specterops.io/wp-content/upl…
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

🛠️ WSASS - a tool that uses the old WerfaultSecure.exe program to dump the memory of processes protected by PPL (Protected Process Light), such as LSASS.EXE. The output is in Windows MINIDUMP format. github.com/2x7EQ13/WSASS

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

A new module just got merged into NetExec: raisechild🔥 Made by azoxlpf to automatically abuse domain trust to pivot to other domains. It will: - Dump the krbtgt hash of the child domain - Enumerate trusted domains - Craft a TGT for trusted/parent domain

A new module just got merged into NetExec: raisechild🔥
Made by azoxlpf to automatically abuse domain trust to pivot to other domains.

It will:
- Dump the krbtgt hash of the child domain
- Enumerate trusted domains
- Craft a TGT for trusted/parent domain
Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

Dumping juicy secrets from SAM/LSA is always nice right? I've added an implementation for the --sam and --lsa flags to the MSSQL protocol of NetExec🚀 No need for manual registry hive extraction anymore!

Dumping juicy secrets from SAM/LSA is always nice right?
I've added an implementation for the --sam and --lsa flags to the MSSQL protocol of NetExec🚀

No need for manual registry hive extraction anymore!
Andrea Pierini (@decoder_it) 's Twitter Profile Photo

Just published a summary of "modern" Windows authentication reflection attacks. Turns out reflection never really died. 😅decoder.cloud/2025/11/24/ref…

Andrea Pierini (@decoder_it) 's Twitter Profile Photo

Gray Hats It’s not about a PoC. The article shown in the screenshot is taken from my blog post about the recent reflection attack techniques in general: decoder.cloud/2025/11/24/ref…

Ewan MacKenna (@ewanmackenna) 's Twitter Profile Photo

Cancel me. Israel is a barbaric and sick state populated by savages, and the world would be a better place if is never existed and ceased to exist.

n00py (@n00py1) 's Twitter Profile Photo

NTLM reflection attacks can be used to compromise Active Directory domains even with SMB signing if systems aren’t fully patched depthsecurity.com/blog/using-ntl…

Andrea Pierini (@decoder_it) 's Twitter Profile Photo

Lots of recent posts on NTLM reflection → AD compromise. To be clear: real fix is CVE-2025-54918, not CVE-2025-33073. Until Oct 2025, any user could own a 2025 domain if DCs ran Print Spooler. shorturl.at/4WpRh

TrustedSec (@trustedsec) 's Twitter Profile Photo

Want stronger #LDAP security without accidentally taking down production? Scott Blake walks through how LDAP Signing and Channel Binding work, what Windows Server 2025 changes by default, and why “audit before enforce” should be your new favorite phrase. hubs.la/Q040TCz20

RedTeam Pentesting (@redteampt) 's Twitter Profile Photo

🚀Our tool keycred for KeyCredentialLinks and Shadow Credential attacks now works with updated domain controllers again! It turns out, Microsoft violated their own specs. Try it out: github.com/RedTeamPentest…

🚀Our tool keycred for KeyCredentialLinks and Shadow Credential attacks now works with updated domain controllers again!

It turns out, Microsoft violated their own specs.

Try it out: github.com/RedTeamPentest…
Logan Goins (@_logangoins) 's Twitter Profile Photo

I ended up quickly modifying ntlmrelayx to support these changes so that relays to LDAP are possible again, thanks y'all for your hard work on figuring this out! You can find the changes here: github.com/logangoins/imp…

dbugs (@ptdbugs) 's Twitter Profile Photo

Changes in NTLM relay in Windows Server 2025 Research by Decoder reveals that Windows Server 2025 introduces hidden modifications to Microsoft’s authentication mechanisms that affect how "NTLM relay" attacks work. The study focuses on how new policies and updated "SMB", "LDAP",

Changes in NTLM relay in Windows Server 2025

Research by Decoder reveals that Windows Server 2025 introduces hidden modifications to Microsoft’s authentication mechanisms that affect how "NTLM relay" attacks work. The study focuses on how new policies and updated "SMB", "LDAP",