AlterLabs (@alter_labs) 's Twitter Profile
AlterLabs

@alter_labs

Infosec Stuff

ID: 2925406896

calendar_today10-12-2014 09:27:57

1,1K Tweet

488 Followers

451 Following

The Met: Asian Art (@met_asianart) 's Twitter Profile Photo

Utagawa Hiroshige, Mariko, from the series Tokaidō (popularly known as the Reisho Tokaidō), ca. 1840 metmuseum.org/art/collection… #asianart #themet

Utagawa Hiroshige, Mariko, from the series Tokaidō (popularly known as the Reisho Tokaidō), ca. 1840 metmuseum.org/art/collection… #asianart #themet
Pinaki ❄️ (@0xinfection) 's Twitter Profile Photo

Just published the third blog of the "Offensive WMI" series. This post focuses on interacting with the Windows Registry via WMI. So here it is. :) "Offensive WMI - Interacting with Windows Registry (Part 3)" 0xinfection.github.io/posts/wmi-regi…

Just published the third blog of the "Offensive WMI" series. This post focuses on interacting with the Windows Registry via WMI. So here it is. :)

"Offensive WMI - Interacting with Windows Registry (Part 3)"

0xinfection.github.io/posts/wmi-regi…
Ami Luttwak (@amiluttwak) 's Twitter Profile Photo

gossi This is even more severe. The RCE is the simplest RCE you can ever imagine. Simply remove the auth header and you are root. remotely. on all machines. Is this really 2021?

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

Content of my #RomHack2021 talk "Breaking Azure AD joined endpoints in Zero Trust environments" is up! Video: youtube.com/watch?v=OigKnI… Slides (pdf): dirkjanm.io/assets/raw/rom… As usual all the links to my talk materials are also on dirkjanm.io/talks

✞ inversecos (@inversecos) 's Twitter Profile Photo

1\ I updated the attacks on #AzureAD and #M365 matrix! Now includes hybrid/non hybrid techniques used for impersonation, persistence and access including: > Silver Tickets > Pass the PRT / Cert > Service principal abuse > Identity federation abuse bit.ly/3F9CXM4

1\ I updated the attacks on #AzureAD and #M365 matrix!  Now includes hybrid/non hybrid techniques used for impersonation, persistence and access including:

> Silver Tickets 
> Pass the PRT / Cert

>  Service principal abuse

> Identity federation abuse

bit.ly/3F9CXM4
Emil Lerner (@emil_lerner) 's Twitter Profile Photo

For ones who are into attacks targeting image processing libs I wrote a small tool that can embed GhostScript exploits into a PDF (to bypass signature checks). Already have several bb findings) github.com/neex/ghostinth…

James Kettle (@albinowax) 's Twitter Profile Photo

Manually testing for IDOR can get pretty tedious... so Backslash Powered Scanner will now recognise and flag iterable inputs! If you're interested in the background and philosophy behind BPS, check out the presentation: portswigger.net/research/backs…

Manually testing for IDOR can get pretty tedious... so Backslash Powered Scanner will now recognise and flag iterable inputs!

If you're interested in the background and philosophy behind BPS, check out the presentation:
portswigger.net/research/backs…
S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

OffensiveVBA is published. Take a look. PR's are very welcome as I'm 100% sure it's missing many things.🍻 github.com/S3cur3Th1sSh1t…

Ryan (@haus3c) 's Twitter Profile Photo

I wrote a script that will create a token by passing in credentials, without the use of any Azure PowerShell modules. This can be used to make a token which can be used anywhere & bypass Conditional Access Policies or 2FA in Azure. Example in the Readme. github.com/hausec/PowerZu…

Charlie Bromberg « Shutdown » (@_nwodtuhs) 's Twitter Profile Photo

Oh yeah 🤘 DACL read/write/backup/restore tooling in Impacket Python. Example screenshot with DCSync, but WriteMembers, ResetPassword and FullControl also possible 🔧 PR: github.com/SecureAuthCorp… 🧑‍🍳 The Hacker Recipes: thehacker.recipes/ad/movement/ac… Co-authored by BlackWasp

Oh yeah 🤘 DACL read/write/backup/restore tooling in Impacket Python. Example screenshot with DCSync, but WriteMembers, ResetPassword and FullControl also possible

🔧 PR: github.com/SecureAuthCorp…

🧑‍🍳 The Hacker Recipes: thehacker.recipes/ad/movement/ac…

Co-authored by <a href="/BlWasp_/">BlackWasp</a>
BurpSuite.guide (@burpsuiteguide) 's Twitter Profile Photo

If you are a huge fan of Burp Suite's predefined payload lists (like me) and you use it in Intruder without additional configuration, you might be missing something. (1/4) 🧵

Jared Atkinson (@jaredcatkinson) 's Twitter Profile Photo

🧵 1/ Two days ago I shared this image to demonstrate how many unique paths exist for a single behavior. At the time I didn't know how to use it, but today I realized it shows why red teams, MITRE evals, & vendor tests can't answer Technique coverage questions without change.

🧵 
1/ Two days ago I shared this image to demonstrate how many unique paths exist for a single behavior. At the time I didn't know how to use it, but today I realized it shows why red teams, MITRE evals, &amp; vendor tests can't answer Technique coverage questions without change.
Charlie Bromberg « Shutdown » (@_nwodtuhs) 's Twitter Profile Photo

In case you missed it, here are two diagram and table to help understand and abuse NTLM relay attacks 😃 (I could use some help to finish them and do some foolproofing, but they're already helpful as is imo)

In case you missed it, here are two diagram and table to help understand and abuse NTLM relay attacks 😃 (I could use some help to finish them and do some foolproofing, but they're already helpful as is imo)
🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

Want a quick & dirty (but supported by Microsot) way to avoid #follina Office know payloads? Just disable "Troubleshooting wizards" by GPO > admx.help/?Category=Wind… HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnostics - EnableDiagnostics - 0 By CERT Banque de France