Austin (@amartinsec) 's Twitter Profile
Austin

@amartinsec

Pentesting stuff

ID: 1183420652780429313

linkhttp://blog.amartinsec.com calendar_today13-10-2019 16:34:15

64 Tweet

147 Followers

1,1K Following

vx-underground (@vxunderground) 's Twitter Profile Photo

tl;dr of Today -Lockbit ransomware group taunts FBI -LAPSUS$ Telegram still active, despite arrests -Raccoon Stealer developer died in the midst of the invasion of Ukraine -IT Army of Ukraine breaches Yandex food delivery database, exposing FSB agents who ordered food

tl;dr of Today

-Lockbit ransomware group taunts FBI
-LAPSUS$ Telegram still active, despite arrests
-Raccoon Stealer developer died in the midst of the invasion of Ukraine
-IT Army of Ukraine breaches Yandex food delivery database, exposing FSB agents who ordered food
51pwn (@hktalent3135773) 's Twitter Profile Photo

Spring RCE 0day? set @CacheResult(cacheName = "51pwn", skipGet = false...) If you know me go sleep.... github.com/hktalent/sprin…

vx-underground (@vxunderground) 's Twitter Profile Photo

Yesterday U.S. Cyber Command Director Gen. Paul Nakasone confirmed for the first time that the U.S. had conducted offensive cyber operations in support of Ukraine. More info: thehill.com/policy/cyberse…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I found this in the process memory of a loaded Brute Ratel C4 samples reported by Unit42 Is that the org that leaked the framework or just an arbitrary UserAgent set by the threat actor? If it's the latter, I'd be sorry unit42.paloaltonetworks.com/brute-ratel-c4… Sample bazaar.abuse.ch/sample/d71dc7b…

I found this in the process memory of a loaded Brute Ratel C4 samples reported by Unit42 

Is that the org that leaked the framework or just an arbitrary UserAgent set by the threat actor? 
If it's the latter, I'd be sorry

unit42.paloaltonetworks.com/brute-ratel-c4…

Sample
bazaar.abuse.ch/sample/d71dc7b…
dade (@0xdade) 's Twitter Profile Photo

Bug bounty twitter is wild. They're out here like "cat is a tool that is used by millions every day, but only 0.001% of those are masters of cat. Check out my 🧵to become a master of cat #bugbountytips" And then it's like 5 basic things jacked straight from the top of man cat.

MDSec (@mdseclabs) 's Twitter Profile Photo

In our latest blog post, we publish a MS "won't fix" unauthenticated SSRF to RCE in Microsoft Office Online Server mdsec.co.uk/2022/10/micros… by Manish Kishan Tanwar

In our latest blog post, we publish a MS "won't fix" unauthenticated SSRF to RCE in Microsoft Office Online Server mdsec.co.uk/2022/10/micros… by <a href="/IndiShell1046/">Manish Kishan Tanwar</a>
vx-underground (@vxunderground) 's Twitter Profile Photo

From our headquarters underneath the Vatican, happy Halloween! Today we release the first edition of our new publication Black Mass. Special thanks to our Editor in Chief Helen (of Tor) for all of her hard work. papers.vx-underground.org/papers/Other/V…

From our headquarters underneath the Vatican, happy Halloween!

Today we release the first edition of our new publication Black Mass.

Special thanks to our Editor in Chief <a href="/h313n_0f_t0r/">Helen (of Tor)</a> for all of her hard work.

papers.vx-underground.org/papers/Other/V…
Austin (@amartinsec) 's Twitter Profile Photo

Looks like Chrome now blocks sites from writing to the clipboard without user interaction. It's still able to be written to through a gesture (ex. clicking a button) even if you've denied clipboard access. #chrome

Austin (@amartinsec) 's Twitter Profile Photo

Welp, I thought I'd hop on the ~novel~ C2 train by using canary tokens as a transfer medium. It's still in development, but I'll (publicly) link the repo when it's stable. #c2 #redteam

Welp, I thought I'd hop on the ~novel~ C2 train by using canary tokens as a transfer medium. It's still in development, but I'll (publicly) link the repo when it's stable. #c2 #redteam
Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…