Ryan Preston (@awsmhacks) 's Twitter Profile
Ryan Preston

@awsmhacks

Keyboard Cagefighter, Console Cowboy, cache me sliding into your DC's #secKC

ID: 4050375313

linkhttps://github.com/awsmhacks calendar_today28-10-2015 20:53:36

564 Tweet

340 Followers

629 Following

Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

This is your yearly reminder that ALL Udemy Bug Bounty courses are a waste of money. The content you need is out there, completely for free. Don't believe me? Here is a list of the best Bug Bounty Ressources out there 🧵👇 #bugbountytips #BugBounty

Duane Michael (@subat0mik) 's Twitter Profile Photo

SCCM network access accounts (NAAs) are back... And they're not going away. Not only can we query the credential blobs from WMI, we can also retrieve previously used account blobs from the CIM repository, even if the computer is no longer a client... posts.specterops.io/the-phantom-cr…

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

ZeusBox Yep. You are partially correct but theres a lot more to it than EAT and IAT hooks. Finding syscalls are fine, but in order to do that you must first find the ntdll in memory which is the tricky part. I think if you evade S1, you by default evade almost every EDR there is.

Antonio Cocomazzi (@splinter_code) 's Twitter Profile Photo

We are releasing an alternative way for elevating to SYSTEM when you have SeTcbPrivilege How? Leveraging AcquireCredentialsHandle through an SSPI hook that allows authenticating as SYSTEM to SCM Should be "lighter" than the classic S4U cc Andrea P gist.github.com/antonioCoco/19…

We are releasing an alternative way for elevating to SYSTEM when you have SeTcbPrivilege

How? 
Leveraging AcquireCredentialsHandle through an SSPI hook that allows authenticating as SYSTEM to SCM

Should be "lighter" than the classic S4U

cc <a href="/decoder_it/">Andrea P</a>

gist.github.com/antonioCoco/19…
Ryan Naraine (@ryanaraine) 's Twitter Profile Photo

This is a must-see for me at LABScon next week: ** The life and times of Sysinternals -- Mark Russinovich, Microsoft (@markrussinovich) Agenda is legit 💪 labscon.io/#day-1

Ryan Preston (@awsmhacks) 's Twitter Profile Photo

This is great! its also cross-platform! Download the CLI code binary for other os's/chipsets from code.visualstudio.com/Download# and they offer the tunnel feature too!

vx-underground (@vxunderground) 's Twitter Profile Photo

We are happy to announce we are hosting our first ever Malware Research Contest! Sponsored by our friends at SentinelOne * Must be novel research * Applicants can only be from the United States due to anti-gambling and money laundering laws * First place is a new Macbook Pro ♥️

Chris Bakke (@chrisjbakke) 's Twitter Profile Photo

GPT-5: can perfectly build any website GPT-6: can build and run a company GPT-7: passes Turing test GPT-8: overthrows world governments GPT-9: fails to understand how Jira is supposed to work, gives up, asks humans for help

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

New blog: Obtaining Domain Admin from Azure AD by abusing Cloud Kerberos Trust I teased this a bit during my Windows Hello talks, now found some time to write about this interesting technique. Also contains defenses and detection opportunities. dirkjanm.io/obtaining-doma…

Hassan (@pwnsauc3) 's Twitter Profile Photo

Made a tool which finds DLL files with RWX section in memory. I came up with this idea after I stumbled upon an interesting article by Security Joes github.com/pwnsauc3/RWXFi…

Peter Winter-Smith (@peterwintrsmith) 's Twitter Profile Photo

Today I am pleased to announce the release of a code analyser I’ve been working in my free time - wSAST (wsast.co.uk) wSAST aims to make code analysis easier for application security consultants by providing tools to graph relationships, find paths between functions,

mgeeky | Mariusz Banach (@mariuszbit) 's Twitter Profile Photo

🔥 Super excited to soon present my lifetime project publicly🤩 - 4yrs of R&D + 1y in commercial sale - Weaponization of 95+ file types - 140kLOC - 20+ tools - 10+ shellcode exec techniques (ts) - 8 MSI ts - 20+ LNK ts - 30+ script/macro ts ⚡ Battle tested, low-profile arsenal

🔥 Super excited to soon present my lifetime project publicly🤩

- 4yrs of R&amp;D + 1y in commercial sale
- Weaponization of 95+ file types
- 140kLOC
- 20+ tools
- 10+ shellcode exec techniques (ts)
- 8 MSI ts
- 20+ LNK ts
- 30+ script/macro ts

⚡ Battle tested, low-profile arsenal