mintko (@m1ntko) 's Twitter Profile
mintko

@m1ntko

ID: 1285989074948456450

calendar_today22-07-2020 17:24:36

26 Tweet

23 Followers

362 Following

BlackArrow (@blackarrowsec) 's Twitter Profile Photo

💥One shell to HANDLE them all New approach to escalate privileges from a web shell by abusing open token handles. #RedTeam /cc Kurosh Dabbagh ➡ tarlogic.com/blog/token-han…

💥One shell to HANDLE them all
New approach to escalate privileges from a web shell by abusing open token handles. #RedTeam /cc <a href="/_Kudaes_/">Kurosh Dabbagh</a> 

➡ tarlogic.com/blog/token-han…
BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Windows Local Privilege Escalation via StorSvc service (writable SYSTEM path DLL search order Hijacking) /cc Antón Ortigueira Kurosh Dabbagh ➡️ github.com/blackarrowsec/…

BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Have you ever tried exploiting a Spring Boot Actuators RCE but the restart endpoint was disabled? ⬇️ Abuse this behaviour using this #TrickOrThreat by Antón Ortigueira

Have you ever tried exploiting a Spring Boot Actuators RCE but the restart endpoint was disabled?    

⬇️ Abuse this behaviour using this #TrickOrThreat by <a href="/antuache/">Antón Ortigueira</a>
Kurosh Dabbagh (@_kudaes_) 's Twitter Profile Photo

It turns out that gdi32full.dll is vulnerable to "delayed" dll sideloading, which means that virtually any software that uses Windows dialog boxes (of any kind) is vulnerable to this attack. And they are not few. 🧵

BlackArrow (@blackarrowsec) 's Twitter Profile Photo

In our latest post, ☞ zǝuıʇɹɐɯ olqɐd ☜ introduces a new technique to obtain cleartext passwords from MSSQL by abusing linked servers through the ADSI provider. ➡️ Read more: tarlogic.com/blog/linked-se…

In our latest post, <a href="/xassiz/">☞ zǝuıʇɹɐɯ olqɐd ☜</a> introduces a new technique to obtain cleartext passwords from MSSQL by abusing linked servers through the ADSI provider.

➡️ Read more: tarlogic.com/blog/linked-se…
BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Watchguard has fixed 4 vulnerabilities in Watchguard EPDR discovered by our researchers Antón Ortigueira and Marcos Díaz. These vulnerabilities can be used to turn-off the defensive capabilities of the product and achieve privilege escalation. ➡️ Advisories: watchguard.com/es/wgrd-psirt/…

Watchguard has fixed 4 vulnerabilities in Watchguard EPDR discovered by our researchers <a href="/antuache/">Antón Ortigueira</a> and <a href="/Calvaruga/">Marcos Díaz</a>.

These vulnerabilities can be used to turn-off the defensive capabilities of the product and achieve privilege escalation.

➡️ Advisories: watchguard.com/es/wgrd-psirt/…
Cyber Detective💙💛 (@cyb_detective) 's Twitter Profile Photo

Seekolver #python tool for searching and filtering subdomains using different APIs: SecurityTrails AlienVault VirusTotal SpyOnWeb Crt sh github.com/Krypteria/Seek… Creator krp

Seekolver

#python tool for searching and filtering subdomains using different APIs:

SecurityTrails 
AlienVault
VirusTotal
SpyOnWeb
Crt sh

github.com/Krypteria/Seek…

Creator <a href="/_kripteria/">krp</a>
BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Are you aware that Threat Actors can use virtualization as an effective evasion technique? Our #ThreatHunting team presents some useful queries to detect this technique. ➡️ github.com/blackarrowsec/…

Are you aware that Threat Actors can use virtualization as an effective evasion technique? 

Our #ThreatHunting team presents some useful queries to detect this technique.

➡️ github.com/blackarrowsec/…
BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Enhanced version of secretsdump from #Impacket to dump credentials without touching disk. This feature takes advantage of the WriteDACL privileges held by local administrators to provide temporary read permissions on registry hives. github.com/fortra/impacke…

BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Our colleagues Kurosh Dabbagh & Inés will be at #HackOn2024 presenting an alternative approach to ROP-based sleep obfuscation technique to evade memory scanners. ➡️ Read more: hackon.es/charlas/In%C3%…

Our colleagues <a href="/_Kudaes_/">Kurosh Dabbagh</a> &amp; <a href="/ineesdv/">Inés</a> will be at #HackOn2024 presenting an alternative approach to ROP-based sleep obfuscation technique to evade memory scanners.

➡️ Read more: hackon.es/charlas/In%C3%…
Kurosh Dabbagh (@_kudaes_) 's Twitter Profile Photo

Although it's nothing new, Inés and I are pleased to publish our own ROP-based implementation of the code fluctuation technique. We've tried to keep it simple and functional, avoiding to use common features like Timers, HWBP or APCs. github.com/Kudaes/Shelter

BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Are you aware of this technique for achieving fileless persistence? Find out how it works and how to detect it. ➡️ github.com/blackarrowsec/…

Are you aware of this technique for achieving fileless persistence? 

Find out how it works and how to detect it.

➡️ github.com/blackarrowsec/…
BlackArrow (@blackarrowsec) 's Twitter Profile Photo

In a few hours, our colleague Kurosh Dabbagh will talk at EuskalHack about call stack spoofing to hide the execution of implants from memory. #ESCVII ➡️ Read more: securitycongress.euskalhack.org/ponentes_es.ht…

In a few hours, our colleague <a href="/_Kudaes_/">Kurosh Dabbagh</a> will talk at <a href="/EuskalHack/">EuskalHack</a> about call stack spoofing to hide the execution of implants from memory. #ESCVII

➡️ Read more: securitycongress.euskalhack.org/ponentes_es.ht…
krp (@_kripteria) 's Twitter Profile Photo

I created a tool designed to simplify the generation of proxy DLLs (i know, a bit late to the game) while addressing common conflicts related to windows.h when it comes to redefining an existing function when performing proxy DLL. It was a fun project 😁 github.com/Krypteria/Prox…

Kurosh Dabbagh (@_kudaes_) 's Twitter Profile Photo

I've just released Eclipse, a PoC of what I call Activation Context Hijack. This technique redirects any application to load an arbitray DLL, allowing to inject code into any trusted process. More info available on Github. github.com/Kudaes/Eclipse

Kurosh Dabbagh (@_kudaes_) 's Twitter Profile Photo

Although direct access to disk is not new at all, especially when it comes to forensics, I think this approach could be useful in a number of contexts during a RT engagement. github.com/Kudaes/MFTool

BlackArrow (@blackarrowsec) 's Twitter Profile Photo

This Thursday, our colleague Kurosh Dabbagh will be at Navaja Negra Conference presenting Activation Context Hijack: a new code execution technique for Windows environments. ➡️ More info: navajanegra.com/2025/speaker/k…

This Thursday, our colleague <a href="/_Kudaes_/">Kurosh Dabbagh</a>  will be at <a href="/NavajaNegra_AB/">Navaja Negra Conference</a> presenting Activation Context Hijack: a new code execution technique for Windows environments.

➡️ More info: navajanegra.com/2025/speaker/k…
BlackArrow (@blackarrowsec) 's Twitter Profile Photo

Kudos to our colleague Kurosh Dabbagh , who yesterday delighted us at Navaja Negra Conference with his talk 'Activation Context Hijack,' which can be rewatched here: twitch.tv/videos/2581089…

Kudos to our colleague <a href="/_Kudaes_/">Kurosh Dabbagh</a> , who yesterday delighted us at <a href="/NavajaNegra_AB/">Navaja Negra Conference</a> with his talk 'Activation Context Hijack,' which can be rewatched here: twitch.tv/videos/2581089…
krp (@_kripteria) 's Twitter Profile Photo

Overly complex ACL graphs? Neo4LDAP now helps you prioritise attack paths without losing visibility. • Editable ACE weights • Shadow Relationships Details + PoC 👇 medium.com/@kripteria.sec…