Paolo Caminati (@caminatipaolo) 's Twitter Profile
Paolo Caminati

@caminatipaolo

OSEP | OSWE | OSCP | CRTO | eCPPT | eWPT

ID: 1160894634563973121

calendar_today12-08-2019 12:43:44

128 Tweet

37 Followers

328 Following

Cas van Cooten (@chvancooten) 's Twitter Profile Photo

You know what time it is? ⏰It's Active Directory o'clock! I updated my AD Exploitation Cheat Sheet based on (among others) techniques discussed in the CRTO course. New: DPAPI & GPO Abuse Improved: LAPS, AppLocker/CLM, PowerView/Rubeus refs, many more 👇 casvancooten.com/posts/2020/11/…

Youstin (@iustinbb) 's Twitter Profile Photo

I just posted a short write-up on a 2FA bypass I found. This was caused by a misconfigured OpenID implementation. youst.in/posts/bypassin…

I just posted a short write-up on a 2FA bypass I found. This was caused by a misconfigured OpenID implementation.

youst.in/posts/bypassin…
Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

I recently published a blog on "Attacking Social Logins: Pre-Authentication Account Takeover" Blog Link: hbothra22.medium.com/attacking-soci… I hope you will find it useful. #appsec #infosec #webappsec #bugbountytips #Pentesting

Jean Marsault (@iansus) 's Twitter Profile Photo

▶ Microsoft #ADCS - Abusing #PKI in Active Directory environment ◀ I've been bragging about it for months, this is the result of many weeks of work on lesser known compromise paths for #pentest by using enterprise PKI. Feedback is highly appreciated! riskinsight-wavestone.com/en/2021/06/mic…

James Kettle (@albinowax) 's Twitter Profile Photo

When you find response header injection, you can probably do better than mere XSS or open-redir. Try injecting a short Content-Length header to cause a reverse desync and exploit random live users.

David das Neves (@david_das_neves) 's Twitter Profile Photo

[Guide] AzureHound Cypher Cheatsheet hausec.com/2020/11/23/azu… [Repo] AzureHound github.com/BloodHoundAD/A… Docu: bloodhound.readthedocs.io/en/latest/data… #PowerShell #MicrosoftAzure #BlueTeaming

[Guide] AzureHound Cypher Cheatsheet
hausec.com/2020/11/23/azu…

[Repo] AzureHound 
github.com/BloodHoundAD/A…

Docu:  bloodhound.readthedocs.io/en/latest/data…

#PowerShell #MicrosoftAzure #BlueTeaming
Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

A New Attack Surface on Microsoft Exchange! The series covers most of my Black Hat USA and DEFCON talks (with slides and video inside). More articles and vulnerabilities are coming soon! blog.orange.tw/2021/08/proxyl…

Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

NEW fully undetectable AMSI bypass script based on Matt Graeber Matt Graeber 'amsiInitFailed' script. After one year my "old" AMSI bypass script is now detected by 9 AV. So here is the new fully undetectable script: kmkz

NEW fully undetectable AMSI bypass script  based on Matt Graeber <a href="/mattifestation/">Matt Graeber</a> 'amsiInitFailed' script.
After one year my "old" AMSI bypass script is now detected by 9 AV. So here is the new fully undetectable script:

<a href="/kmkz_security/">kmkz</a>
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

When attackers use BitLocker to encrypt your drives (sic!), digging through the ntds.dit file and looking for recovery keys may be the best option. And it’s exactly why I created such script. ExtractFVEPasswordsFromNTDS.ps1 Enjoy :) github.com/gtworek/PSBits…

Bobby Cooke (@0xboku) 's Twitter Profile Photo

Zero to Hero guide for Azure Device Code Phishing for Red Team engagements! Covers everything from creating a malicious Azure phishing infrastructure to achieving Azure Account Take-Over! Secrets to open OWA via Substrate! Credits: Steve Borosh Dr. Nestori Syynimaa 0xboku.com/2021/07/12/Art…

Brute Logic (@brutelogic) 's Twitter Profile Photo

#SSRF Payloads for LFR/LFD file:/etc/passwd%3F/ file:/etc%252Fpasswd/ file:/etc%252Fpasswd%3F/ file:///etc/%3F/../passwd file:${br}/et${u}c%252Fpas${te}swd%3F/ file:$(br)/et$(u)c%252Fpas$(te)swd%3F/ SSRF POLYGLOT file:///etc/passwd?/../passwd rodoassis.medium.com/on-ssrf-server…

Emad Shanab - أبو عبد الله (@alra3ees) 's Twitter Profile Photo

Advanced SQL Injection Cheatsheet This repository contains a advanced methodology of all types of SQL Injection. github.com/kleiton0x00/Ad…

Advanced SQL Injection Cheatsheet
This repository contains a advanced methodology of all types of SQL Injection.

github.com/kleiton0x00/Ad…
Paolo Stagno (VoidSec) (@void_sec) 's Twitter Profile Photo

After a lot of effort, I thought to share my browser exploitation journey of an old Firefox Integer Overflow bug: voidsec.com/browser-exploi… Please, be clement as it's my 2nd time tackling browser exploitation and report back any messy explanation or if I missed some important bits.

Sonar (@sonarsource) 's Twitter Profile Photo

Our security researchers discovered a technique that allows attackers to disclose sensitive information from Python applications using the popular Django framework. Learn more in our technical analysis: blog.sonarsource.com/disclosing-inf…

Paolo Stagno (VoidSec) (@void_sec) 's Twitter Profile Photo

My write-up for the Blue Frost Security Windows Exploitation Challenge released during Ekoparty: voidsec.com/windows-exploi… Thanks Blue Frost Security for the challenge, I've enjoyed it very much

Riccardo (@dottor_morte) 's Twitter Profile Photo

Me and Her0 did a fair bit of research against one of the leading EDRs in the sector. This first post will hopefully be the start of a long saga, documenting all of our findings. This first part was dated back in 2020: riccardoancarani.github.io/2023-08-03-att…

Riccardo (@dottor_morte) 's Twitter Profile Photo

It's a bittersweet moment, but our series of "Attacking an EDR" has come to an end! Me and Her0 hope that you had as much fun reading it as we had writing it. riccardoancarani.github.io/2023-11-07-att…