Cube0x0 (@cube0x0) 's Twitter Profile
Cube0x0

@cube0x0

0xC2.io -founder
🇸🇪

ID: 936310701047668736

linkhttps://github.com/cube0x0 calendar_today30-11-2017 19:07:21

1,1K Tweet

11,11K Takipçi

451 Takip Edilen

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

#VisualStudio 1-click RCE, No Smartscreen warning, No trust need, No futher interaction need. Just download from internet, 1-click then pwn. But it will not be fixed, because Microsoft consider it's not a vulnerability😅

Jason Lang (@curi0usjack) 's Twitter Profile Photo

Interested in red team operations using almost all internal tooling against some of the hardest companies in the world? Love coding on the fly? TrustedSec Targeted Operations may be for you. Shoot me a DM.

James Forshaw (@tiraniddo) 's Twitter Profile Photo

Taking a cue from Dlive and Andrea Pierini's work on inducing authentication out of remote DCOM I thought I'd quickly write up a post about getting Kerberos authentication out of the initial OXID resolving call. tiraniddo.dev/2024/04/relayi…

CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

Time to be terrified. I've just dropped my Okta Terrify tool which I demonstrated as part of my BSides Cymru talk last week. You can now backdoor compromised Okta accounts via Windows Okta Verify using attacker controlled passwordless keys. Enjoy - github.com/CCob/okta-terr…

Greg Linares (Laughing Mantis) (@laughing_mantis) 's Twitter Profile Photo

Since I'm 6 drinks in for 20 bucks, let me tell you all about the story of how the first Microsoft Office 2007 vulnerability was discovered, or how it wasn't. This was a story I was gonna save for a book but fuck it, I ain't gonna write it anyways.

Cube0x0 (@cube0x0) 's Twitter Profile Photo

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time. Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time.

Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and
Andrea Pierini (@decoder_it) 's Twitter Profile Photo

Is Kerberos relaying so limited? I'd say no, thanks to James Forshaw CredMarshalTargetInfo trick. In this case, I'm relaying SMB to HTTP (ADCS) with a modified version of Cube0x0 krbrelay using DFSCoerce and PetitPotam - classic ESC8 attack with Kerberos, no DCOM involved ;)

Is Kerberos relaying so limited? I'd say no, thanks to <a href="/tiraniddo/">James Forshaw</a>  CredMarshalTargetInfo  trick. In this case, I'm relaying SMB to HTTP (ADCS) with a modified version of <a href="/cube0x0/">Cube0x0</a>  krbrelay using DFSCoerce and PetitPotam - classic ESC8 attack with Kerberos, no DCOM involved ;)
Cube0x0 (@cube0x0) 's Twitter Profile Photo

Don't we all get to the point where all you want to do is capture and relay NTLM and Kerberos authentications in a BOF? It's just faster to write a capture & relaying framework in C for ntlm, kerberos, dcom, smb, http, mssql with native Windows support than fixing impacket.

Don't we all get to the point where all you want to do is capture and relay NTLM and Kerberos authentications in a BOF?

It's just faster to write a capture &amp; relaying framework in C for ntlm, kerberos, dcom, smb, http, mssql with native Windows support than fixing impacket.
Cube0x0 (@cube0x0) 's Twitter Profile Photo

I have received a few questions about reusing existing open-source and in-house BOFs in 0xC2 so I am leaving it here for visibility. Yes the 0xC2 Windows agent has a backward-compatible layer so you can reuse your existing object file tools after converting the Sleep script to

I have received a few questions about reusing existing open-source and in-house BOFs in 0xC2 so I am leaving it here for visibility. 

Yes the 0xC2 Windows agent has a backward-compatible layer so you can reuse your existing object file tools after converting the Sleep script to
Andrea Pierini (@decoder_it) 's Twitter Profile Photo

M'm glad to release the tool I have been working hard on the last month: #KrbRelayEx A Kerberos relay & forwarder for MiTM attacks! >Relays Kerberos AP-REQ tickets >Manages multiple SMB consoles >Works on Win& Linux with .NET 8.0 >... GitHub: github.com/decoder-it/Krb…

M'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A  Kerberos relay &amp; forwarder for MiTM attacks! 
&gt;Relays Kerberos AP-REQ tickets 
&gt;Manages multiple SMB consoles 
&gt;Works on Win&amp; Linux with .NET 8.0
&gt;...
GitHub: github.com/decoder-it/Krb…
Cube0x0 (@cube0x0) 's Twitter Profile Photo

I asked myself, how difficult would it be to run a 0xC2 agent in a non-rooted Samsung phone, via an APK installation, and use it for lateral movement Turns out, not very difficult at all

I asked myself, how difficult would it be to run a 0xC2 agent in a non-rooted Samsung phone, via an APK installation, and use it for lateral movement

Turns out, not very difficult at all
Andrea Pierini (@decoder_it) 's Twitter Profile Photo

I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…