TC (@tcs3c) 's Twitter Profile
TC

@tcs3c

father of three - h4ck3r of stuff - lover of life - singer of songs | pwning at @codewhitesec

ID: 2236620765

calendar_today21-12-2013 16:05:16

126 Tweet

149 Followers

213 Following

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Unauth'd admin access to #SAP #Netweaver? Our very own Kai Ullrich has you covered, see #CVE-2021-21481 and SAP Security Note 3022422. Better patch than sorry. Our customers got their heads-up already and we'll publish a detailed blog post when appropriate.

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Happy to announce that our talk 'PIC Your Malware' was accepted @BruCON! thefLink and b00n will share their experiences on leveraging fully position independent code to avoid suspicious memory artifacts & other useful techniques to stay under the radar of EDRs & BlueTeams 😎

TC (@tcs3c) 's Twitter Profile Photo

Read about what Kai Ullrich does „on a rainy sunday afternoon when the kids are busy with someone else“. 😎 Finest #SAP exploitation - enjoy!

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Getting RCE with a Razor! Our walk-through of CVE-2021-22941 affecting Citrix ShareFile Storage Zones Controller by Markus Wulftange is now live codewhitesec.blogspot.com/2021/09/citrix…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

If you have #Citrix #ADM exposed, better patch than sorry. frycos and banane found a hard to exploit but nonetheless nasty bug that could lead to an unauth'ed device brick/takeover: support.citrix.com/article/CTX460…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Bypassing .NET Serialization Binders: case studies for DevExpress (CVE-2022-28684) and Microsoft Exchange (CVE-2022-23277) by Markus Wulftange codewhitesec.blogspot.com/2022/06/bypass…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We could waffle on about our distinctive service portfolios. We could brag about the perks we provide. We could present you with our outstanding team. But you know what? Apply if you can! apply-if-you-can.com

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Proud to be sponsoring the celebration dinner today for the finalists of the Cyber Security Challenge Germany 2022. Great to support the hacking community and get in touch with so many talented minds. Cheers to all winners! #CSCG #finestHacking #finestDining

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

As part of our #x33fcon talk, invist and thefLink release a socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level 😎 Check it out: github.com/codewhitesec/L…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Our powerintern Fabian strikes again, teamed up with thefLink and developed SysmonEnte: a hard to detect attack on Sysmon. Check out our new blogpost: codewhitesec.blogspot.com/2022/09/attack…

frycos (@frycos) 's Twitter Profile Photo

I call it "Golden Token": Skype for Business Server 2019 Built-in RCE, anytime after certificate leak (similar to Golden SAML) #persistence

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

If you're into client virtualization with #QubesOS, use #KeePassXC and #rofi, our very own Tobias Neitzel has you covered with a nice frontend which makes your credential usage a little bit easier 😎 github.com/codewhitesec/q…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Even though JMX exploitation is well understood, Markus Wulftange and Tobias Neitzel found new universal exploitation techniques & one of them allows to gain instant Remote Code Execution using TemplatesImpl (which is now implemented in #beanshooter) codewhitesec.blogspot.com/2023/03/jmx-ex…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We're pleased to announce that we donated a total of $29,500 from vulnerability disclosure rewards to charities this year. Thanks to all colleagues who made this possible and hacky christmas everybody!

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Better patch your Veeam Backup & Replication servers! Full system takeover via CVE-2024-40711, discovered by our very own frycos - no technical details from us this time because this might instantly be abused by ransomware gangs code-white.com/public-vulnera…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-de…