Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile
Norbert Tihanyi, PhD

@tihanyinorbert

Synack Red Team member | Top 50 ringzer0 CTF | OSCE | OSEP | OSCP | OSWP | CRTP | CEH | ECES | Lead Security Researcher @ TII, CTF player

ID: 1118238928283344897

linkhttps://github.com/tihanyin calendar_today16-04-2019 19:45:11

252 Tweet

1,1K Followers

147 Following

Springer Nature (@springernature) 's Twitter Profile Photo

If you're affiliated with a participating institution, the Hungary OA agreements means you can publish your article OA with fees covered, in more than 400 fully OA journals and 2,000 hybrid journals across the Springer Nature portfolio. Find out more about your eligibility.

Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

The first reported DES fixed point (Enc_K(P)=P) for non weak-keys. You can verify it manually using OpenSSL: echo 9fe10d2e8c496143 | xxd -r -p | openssl enc -des-ecb -nopad -K 5d460701328f2962 | xxd -p ieeexplore.ieee.org/document/98328…

Simone Margaritelli (@evilsocket) 's Twitter Profile Photo

You can force any v8/Electron process to execute arbitrary js code (child_process, http, etc) by forcefully enabling and abusing the builtin debug mechanism ... here's VS Code executing Calc, but I suspect any Electron app is susceptible 🔥 it works with SIP enabled on macOS

You can force any v8/Electron process to execute arbitrary js code (child_process, http, etc) by forcefully enabling and abusing the builtin debug mechanism ... here's VS Code executing Calc, but I suspect any Electron app is susceptible 🔥 it works with SIP enabled on macOS
mgeeky | Mariusz Banach (@mariuszbit) 's Twitter Profile Photo

☢️ Can confirm: Macros killed in Office 365, 2207 (Build 15427.20210) 1. if doc has MOTW, macros are disabled. 2. if doc is opened from MOTW flagged ISO/IMG, macros are disabled ISOs are no longer effective containers for MOTW evasion. However, bundling payloads into LNK is 🔥

☢️ Can confirm: Macros killed in Office 365, 2207 (Build 15427.20210)

1. if doc has MOTW, macros are disabled.
2. if doc is opened from MOTW flagged ISO/IMG, macros are disabled

ISOs are no longer effective containers for MOTW evasion.

However, bundling payloads into LNK is 🔥
an0n (@an0n_r0) 's Twitter Profile Photo

Here is why NetNTLMv1 should be disabled in prod networks ASAP. Besides cracking the hash back to NTLM (and then forging Silver Tickets) is straightforward, there is also a lesser known but immediate relay attack path by removing the MIC and doing RBCD abuse. Demo in screenshots.

Here is why NetNTLMv1 should be disabled in prod networks ASAP. Besides cracking the hash back to NTLM (and then forging Silver Tickets) is straightforward, there is also a lesser known but immediate relay attack path by removing the MIC and doing RBCD abuse. Demo in screenshots.
Chick3nman 🐔 (@chick3nman512) 's Twitter Profile Photo

First hashcat benchmarks on the new NVIDIA RTX 4090! Coming in at an insane >2x uplift over the 3090 for nearly every algorithm. Easily capable of setting records: 300GH/s NTLM and 200kh/s bcrypt w/ OC! Thanks to blazer for the run. Full benchmarks here: gist.github.com/Chick3nman/32e…

First <a href="/hashcat/">hashcat</a> benchmarks on the new <a href="/nvidia/">NVIDIA</a> RTX 4090! Coming in at an insane &gt;2x uplift over the 3090 for nearly every algorithm. Easily capable of setting records: 300GH/s NTLM and 200kh/s bcrypt w/ OC! Thanks to blazer for the run. Full benchmarks here: gist.github.com/Chick3nman/32e…
an0n (@an0n_r0) 's Twitter Profile Photo

here is the proper way to RC4 encode with OpenSSL compatible with SystemFunction032 (use the raw hex key instead of passphrase). awesome shellcode exec method from S3cur3Th1sSh1t 👍 s3cur3th1ssh1t.github.io/SystemFunction…

here is the proper way to RC4 encode with OpenSSL compatible with SystemFunction032 (use the raw hex key instead of passphrase).

awesome shellcode exec method from <a href="/ShitSecure/">S3cur3Th1sSh1t</a> 👍

s3cur3th1ssh1t.github.io/SystemFunction…
mpgn (@mpgn_x64) 's Twitter Profile Photo

CrackMapExec version 5.4.0 "Indestructible G0thm0g" is out for everyone and also available in Kali Linux 🎉 ➡️ apt update ➡️ apt install crackmapexec Happy Hacking ! 🔥🪂 Release blog post 🔽 wiki.porchetta.industries/news-2022/inde…

CrackMapExec version 5.4.0 "Indestructible G0thm0g" is out for everyone and also available in <a href="/kalilinux/">Kali Linux</a> 🎉

➡️ apt update
➡️ apt install crackmapexec

Happy Hacking ! 🔥🪂

Release blog post 🔽 
wiki.porchetta.industries/news-2022/inde…
an0n (@an0n_r0) 's Twitter Profile Photo

what a wonderful technique for stealing chrome/edge cookies without knowing the user password via chrome debug mode by “Alex”: mango.pdf.zone/stealing-chrom… have not known it before (what a shame😄), although it is 4+ yrs old and still working. here it is, demo using Sliver C2.🔥

what a wonderful technique for stealing chrome/edge cookies without knowing the user password via chrome debug mode by <a href="/mangopdf/">“Alex”</a>:

mango.pdf.zone/stealing-chrom…

have not known it before (what a shame😄), although it is 4+ yrs old and still working.

here it is, demo using Sliver C2.🔥
Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

Do you think that establishing TCP connections and executing commands in PHP is a malicious activity? I don't think so, and neither does VirusTotal. #PHP #reverseshell

Do you think that establishing TCP connections and executing commands in PHP is a malicious activity? I don't think so, and neither does VirusTotal.
#PHP #reverseshell
Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

Take a look at our latest publication in Acta Informatica, a journal by Springer, titled "Simple Chain Automaton Random Number Generator for IoT Devices". link.springer.com/article/10.100… #IoT , #Cryptography , #PRNG

Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

Introducing the FormAI dataset. A collection of 112,000 compilable AI-generated C programs and their vulnerability classifications. ieee-dataport.org/documents/form… #AI , #dataset , #vulnerability

Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

Have you ever considered the security of codes generated by AI? We have published the FormAI dataset, a large collection of 112 000 AI-generated compilable and independent C programs with vulnerability classification. github.com/FormAI-Dataset ieee-dataport.org/documents/form…

Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

Want to know more about the security of "Edge Learning for 6G-Enabled Internet of Things"? Delighted to announce that our latest research accepted in the prestigious IEEE Communications Surveys & Tutorials (35.6 IF) ieeexplore.ieee.org/document/10255… #6G, #security, #IEEE, #AI, #edge

Norbert Tihanyi, PhD (@tihanyinorbert) 's Twitter Profile Photo

The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification | Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering dl.acm.org/doi/10.1145/36…

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

We've just released Shadow Repeater, for AI-enhanced manual testing. Simply use Burp Repeater as you normally would, and behind the scenes Shadow Repeater will learn from your attacks, try payload permutations, and report any discoveries via Organizer.