drm (@lowercase_drm) 's Twitter Profile
drm

@lowercase_drm

@AlmondOffSec but mostly shilling for #pywerview

ID: 1500259527916236804

calendar_today06-03-2022 00:01:26

149 Tweet

595 Takipçi

76 Takip Edilen

drm (@lowercase_drm) 's Twitter Profile Photo

i was bored at night, so i played with the netsync attack. Meet netdumper.py, a pure TCP RPC based script to netsync machine (and gMSA!) accounts. Nothing new, mostly based on previous works by Charlie Clark, Andrew, @evi1cg et al. gist.github.com/ThePirateWhoSm… 🌻

i was bored at night, so i played with the netsync attack. 
Meet netdumper.py, a pure TCP RPC based script to netsync machine (and gMSA!) accounts. Nothing new, mostly based on previous works by <a href="/exploitph/">Charlie Clark</a>, <a href="/4ndr3w6S/">Andrew</a>, @evi1cg et al.
gist.github.com/ThePirateWhoSm…
🌻
drm (@lowercase_drm) 's Twitter Profile Photo

Another free #impacket IoC: just search for packets with Auth Context ID = 79231 within your DCERPC traffic.🕵️‍♂️

Another free #impacket IoC: just search for packets with Auth Context ID = 79231 within your DCERPC traffic.🕵️‍♂️
guilhem rioux (@guilhemrioux) 's Twitter Profile Photo

Glad to publish a blog post on a critical vulnerability I found some months ago on GLPI, that impacts all default installation under a certain version: sensepost.com/blog/2025/leak… We also released a tool that implements some check for known vulnerabilities: github.com/Orange-Cyberde…

DEFCON Paris (@defconparis) 's Twitter Profile Photo

Hello, small error on the date the meetup will be held on May 19. Program: 🎙️ "Your cloud identity providers are phishing platforms" - by Alexandre S. 🎙️ "Understanding EDRs to better bypass them" - by CursedFRA 📍 Oculto, 27 R. Quincampoix, 75004 🕖 19:00 See you there !

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
Yuval Gordon (@yug0rd) 's Twitter Profile Photo

Many missed this on #BadSuccessor: it’s also a credential dumper. I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.

sn🥶vvcr💥sh (@snovvcrash) 's Twitter Profile Photo

Why're we still doing the Impacket thing when @skelsec's stuff is so sick? gist.github.com/snovvcrash/a1a… (just kidding ofc, Impacket is forever in our hearts)

RedTeam Pentesting (@redteampt) 's Twitter Profile Photo

Newer Windows clients often enforce signing ✍️ when using SMB fileshares. To quickly deploy an SMB server with signing supported we implemented this in impacket's smbserver.py based on a prior work by drm. github.com/fortra/impacke…