Jonas Vestberg (@bugch3ck) 's Twitter Profile
Jonas Vestberg

@bugch3ck

Privilege Escalation Engineer @ WithSecure

ID: 360875184

calendar_today23-08-2011 22:15:49

5,5K Tweet

1,1K Followers

349 Following

SpecterOps (@specterops) 's Twitter Profile Photo

Happening now at #SOCON2025: WithSecure™'s Max Keasley is demonstrating a new attack method against AD FS federated logins. This technique impersonates any federated user by modifying the AD FS configuration database, w/o requiring a privileged foothold on Tier 0 assets.

Happening now at #SOCON2025: <a href="/WithSecure/">WithSecure™</a>'s Max Keasley is demonstrating a new attack method against AD FS federated logins. This technique impersonates any federated user by modifying the AD FS configuration database, w/o requiring a privileged foothold on Tier 0 assets.
Leo Tsaousis (@laripping) 's Twitter Profile Photo

My DistrictCon talk is now on Youtube! This was the one about the IBM B2B Integrator vulns, and features reversing, old-school memes, a shell-popping demo, and a philosophical dilemma youtube.com/watch?v=zwSkPW…

Aurélien Chalot (@defte_) 's Twitter Profile Photo

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D Blogpost: sensepost.com/blog/2025/is-t… Tool: github.com/fortra/impacke… And also, big thanks to jmk (Joe Mondloch) for the collab' :D!

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D

Blogpost: sensepost.com/blog/2025/is-t…
Tool: github.com/fortra/impacke…

And also, big thanks to jmk (Joe Mondloch) for the collab' :D!
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

I spoke about the initial credential guard vulnerability at #SOCON2025, but I left out the part where the fix could be bypassed. Both bypasses have now been fixed which I cover in my blog post along with some juicy technical details. Enjoy.

Jonas Vestberg (@bugch3ck) 's Twitter Profile Photo

My take on this is that someone red teamed McDonald's, found a code signing cert and took the opportunity to sign some malware. Bred there myself, not McDonald's and didn't sign any malware because I didn't want to gamble with the client's reputation.