w4rd4wg (@donxaridis) 's Twitter Profile
w4rd4wg

@donxaridis

g0t r00t?

ID: 42422301

calendar_today25-05-2009 15:16:09

3,3K Tweet

561 Followers

5,5K Following

raptor@infosec.exchange (@0xdea) 's Twitter Profile Photo

Always a great read: dolosgroup.io/blog/2021/7/9/… “We took a locked down FDE laptop, sniffed the BitLocker decryption key coming out of the TPM, backdoored a virtualized image, and used its VPN auto-connect feature to attack the internal corporate network.”

Always a great read:

dolosgroup.io/blog/2021/7/9/…

“We took a locked down FDE laptop, sniffed the BitLocker decryption key coming out of the TPM, backdoored a virtualized image, and used its VPN auto-connect feature to attack the internal corporate network.”
IAM!ERICA (@ericazelic) 's Twitter Profile Photo

What's missing? KERBEROS ABUSE •ASREP Roast •ASREQ (kerbrute – enum users) •ASREQ Roast •Kerberoast •Golden Ticket •Silver Ticket •Diamond Ticket •Sapphire Ticket •Bronze Ticket •Unconstrained Delegation •Constrained Delegation 1/2

Thomas Fahrer (@thomas_fahrer) 's Twitter Profile Photo

#Bitcoin Core 24.0 was just released. This one comes with a lot of controversy. A new feature effecting big industry players, the networks scalability and security. I'm talking about the mempoolfullrbf configuration option. Let me break it down as simply as I can. 🧵 👇

Nils Kuhnert (@0x3c7) 's Twitter Profile Photo

Just updated the "malwarebazaar" Python module to include a Python and CLI client for abuse.ch #YARAify and added a "richer" output. You can find it on Github (github.com/3c7/bazaar/rel…) and on PyPI (via "malwarebazaar"). #threatintel #malware

Just updated the "malwarebazaar" Python module to include a Python and CLI client for <a href="/abuse_ch/">abuse.ch</a> #YARAify and added a "richer" output. You can find it on Github (github.com/3c7/bazaar/rel…) and on PyPI (via "malwarebazaar").
#threatintel #malware
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Introduction to Linux raw sockets and port knocking technique by @Cooler_freenode antonio-cooler.gitbook.io/coolervoid-tav… #Linux #network #learning #programming #infosec

Introduction to Linux raw sockets and port knocking technique by @Cooler_freenode
 
antonio-cooler.gitbook.io/coolervoid-tav… 

#Linux #network #learning #programming #infosec
Mor Davidovich (@dec0ne) 's Twitter Profile Photo

Me and @idov31 are happy to introduce HWSyscalls, a new method to execute indirect syscalls using Hardware Breakpoints without calling directly to ntdll.dll, therefore bypassing the current way to detect it. A detailed blog post will follow soon. github.com/Dec0ne/HWSysca…

vx-underground (@vxunderground) 's Twitter Profile Photo

.Activision was breached December 4th, 2022. The Threat Actors successfully phished a privileged user on the network. They exfiltrated sensitive work place documents as well as scheduled to be released content dating to November 17th, 2023. Activision did not tell anyone.

.<a href="/Activision/">Activision</a> was breached December 4th, 2022. The Threat Actors successfully phished a privileged user on the network. They exfiltrated sensitive work place documents as well as scheduled to be released content dating to November 17th, 2023.

Activision did not tell anyone.
chompie (@chompie1337) 's Twitter Profile Photo

Releasing a Windows 11 LPE exploit by b33f | 🇺🇦✊ and I. Exploits CVE-2023-21768, a vuln in afd.sys. Blog post soon! github.com/xforcered/Wind…

Travis Goodspeed (@travisgoodspeed) 's Twitter Profile Photo

AT90SC3232C. My photos of the surface layer failed to stitch on account of the repeated memory regions, so I only have photos after delayering.

AT90SC3232C.  My photos of the surface layer failed to stitch on account of the repeated memory regions, so I only have photos after delayering.
Ne0ne (@0xtoxin) 's Twitter Profile Photo

🚨NEW BLOG🚨 #LummaC2 stealer analysis, mainly focused on things that haven't been covered in depth such as CRX (chrome extensions) IDs, Dynamic API resolving procedure and the hashing algorithm used. The blog is full of python script! Enjoy! 0xtoxin-labs.gitbook.io/malware-analys…

🚨NEW BLOG🚨
#LummaC2 stealer analysis, mainly focused on things that haven't been covered in depth such as CRX (chrome extensions) IDs, Dynamic API resolving procedure and the hashing algorithm used. 

The blog is full of python script!

Enjoy!

0xtoxin-labs.gitbook.io/malware-analys…
Fox-IT (@foxit) 's Twitter Profile Photo

🚨IMPORTANT🚨 We have observed that the implant placed on tens of thousands of Cisco devices has been altered to check for an Authorization HTTP header value before responding [1/3]

Shellter (@shellterproject) 's Twitter Profile Photo

Our official statement regarding the misuse of Shellter Elite, and the way Elastic Security Labs handled it. shellterproject.com/statement-rega…