
Giuseppe`Ohpe`Trotta
@giutro
I'm a constant seeker and maker of troubles | InfoSec | Shortcut maniac | Virtualization junkie | Puzzles addicted
ID: 115690951
19-02-2010 15:30:00
1,1K Tweet
1,1K Followers
396 Following


Today we release our blog post that demonstrates a new single request exploit for CVE-2019-19781 that is effective even if all of the "vulnerable" Perl files have been deleted š We also share stats on devices that are patched but still contain backdoors blog.fox-it.com/2020/07/01/a-sā¦



Weāre hiring interns at Black Hills Information Security for a bunch of R&D projects! (All internships are payed & remote). Applicants must of some basic C# and Python knowledge. If youāre interested send me your resume and weāll talk! (DMs are open)




love offensive mobile security and are looking for a job? my new company is hiring! shoot us an email at [email protected]


MuraenaTeam strikes again. Together with Giuseppe`Ohpe`Trotta we released the new Muraena and NecroBrowser. Lots of new code+features. Phishing and post-phishing automation at scale for all your needs. Office365 and GitHub examples added. More coming soon š£šŖš github.com/muraenateam

Following my "old" blog post decoder.cloud/2020/05/30/the⦠, I have published the very quick & dirty "juicy_2" code github.com/decoder-it/jui⦠, maybe useful when you have impersonation privs on newer versions of Windows 10 & Server 2019 cc Antonio Cocomazzi Giuseppe`Ohpe`Trotta



When (NTLM) relaying potatoes lead you to domain admin... A "permanent" 0day Privilege Escalation Vulnerability in Windows RPC Protocol ;-) cc Antonio Cocomazzi Our writeup here: labs.sentinelone.com/relaying-potatā¦

RemotePotato0 Update: We can confirm that cross session activation works in the relay scenario too so you can get rid of session 0 limitation! Now the real fun will ensue š cc Andrea Pierini




During offensivecon our Markus Vervier presented his research on security aspects of embedded SIM cards. We are releasing SMShell, an SMS based implant proof of concept for Red Teaming that can evade out of band. Blogpost: persistent-security.net/post/introduci⦠GitHub: github.com/persistent-secā¦