jdelta (@jdelta11) 's Twitter Profile
jdelta

@jdelta11

ID: 1102372978522800128

calendar_today04-03-2019 00:59:33

2,2K Tweet

687 Takipçi

259 Takip Edilen

Secorizon (@secorizon) 's Twitter Profile Photo

Don't want to capture Kerberos auth? No problem, Responder now allows you to downgrade to NTLM :) New setting in Responder.conf: KerberosMode -> FORCE_NTLM or CAPTURE

Don't want to capture Kerberos auth?
No problem, Responder now allows you to downgrade to NTLM :)
New setting in Responder.conf: 
KerberosMode -> FORCE_NTLM or CAPTURE
n00py (@n00py1) 's Twitter Profile Photo

NTLM reflection attacks can be used to compromise Active Directory domains even with SMB signing if systems aren’t fully patched depthsecurity.com/blog/using-ntl…

Secorizon (@secorizon) 's Twitter Profile Photo

Today Secorizon is releasing OffByWon, an advanced network protocol fuzzing framework. This tool allows you to bring chaos to drivers, servers, parsers. A minimal demo client performing a complete fuzzable LDAP NTLM authentication is included. Several advanced functionalities

Today Secorizon is releasing OffByWon, an advanced network protocol fuzzing framework.
This tool allows you to bring chaos to drivers, servers, parsers.

A minimal demo client performing a complete fuzzable LDAP NTLM authentication is included.

Several advanced functionalities
Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

I found unauthenticated bugs in MDT that can be abuse to coerce authenticaton from the host server or to leak creds stored in the deployment share's rules file. Instead of fixing the issues, Microsoft retired MDT. specterops.io/blog/2026/01/2…

MalDev Academy (@maldevacademy) 's Twitter Profile Photo

DumpBrowserSecrets has been updated to v1.1 featuring compile-time string obfuscation, API hashing, command-line argument and PPID spoofing via NtCreateUserProcess and more. github.com/Maldev-Academy…

Chris Spehn (@conscioushacker) 's Twitter Profile Photo

Stop listening to people that don't do the work. Those people are loud. Listen to people that do. The people that do the work are typically quiet.

Logan Goins (@_logangoins) 's Twitter Profile Photo

I ended up quickly modifying ntlmrelayx to support these changes so that relays to LDAP are possible again, thanks y'all for your hard work on figuring this out! You can find the changes here: github.com/logangoins/imp…

Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

Lots of improvements, bug fixes and working kerberos authentication in the new release 3.0.0 of smbclient-ng! github.com/p0dalirius/smb…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Can you port ADRecon to python for me? Of course, 5 minutes later easy peasy python version ready to go 😂 github.com/S3cur3Th1sSh1t…

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

Since I was bored in a plane I decided to revisit some of the Windows Hello tradecraft and finally implemented browser based FIDO2 auth using WHFB keys in roadtx. Thanks Fabian Bader and Nathan McNulty for the inspiration!

Joshua Prager (@praga_prag) 's Twitter Profile Photo

Have you got SCCM in your environment? Want to catch adversaries attempting to abuse it for malicious purposes? Check out my newest blog to setup deceptions within existing SCCM infra specterops.io/blog/2026/02/1…

Matt Creel (@tw1sm) 's Twitter Profile Photo

Vibed up a quick tool to visualize and stack significant red/blue events that occurred during an assessment. Have always liked including a high-level visual like this in debriefs but made them by hand in the past using something like draw[.]io

Josh (@passthehashbrwn) 's Twitter Profile Photo

Twitter blue teamers when you use novel killchains because it's too advanced vs Twitter blue teamers when you attack ADCS because it's too simple

Twitter blue teamers when you use novel killchains because it's too advanced
vs
Twitter blue teamers when you attack ADCS because it's too simple
Simone Margaritelli (@evilsocket) 's Twitter Profile Photo

State of security in Kali integrating AI ( kali.org/tools/mcp-kali… ): arguments are interpolated in a single command string, not escaped, so whatever the AI passes, including potential vectors for command injection, is executed. With pipes, &, ; and all that stuff like it's

State of security in Kali integrating AI ( kali.org/tools/mcp-kali… ):  arguments are interpolated in a single command string, not escaped, so whatever the AI passes, including potential vectors for command injection, is executed. With pipes, &, ; and all that stuff like it's
lcamtuf (@lcamtuf) 's Twitter Profile Photo

PSA: for security, put your AI agent in a water-tight sandbox, such as a dedicated VM. Once this is done, you can maximize productivity by giving it your credit card number, email credentials, the ability to write and run arbitrary code, and unconstrained access to the internet