khr@sh (@khr0x40sh) 's Twitter Profile
khr@sh

@khr0x40sh

Aspiring, self-taught developer (C, C++, C#, VB.Net, Perl, Python, Java) with interests in Information Security, humor, and well when appropriate, both.

ID: 211900271

linkhttp://khr0x40sh.wordpress.com calendar_today04-11-2010 15:57:43

2,2K Tweet

274 Followers

327 Following

Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

If you have Active Directory Certificate Services (ADCS) in your environment, run Locksmith now! In Active Directory Security Assessments, we have found critical security issues in *most* ADCS configurations. The great thing about Locksmith is that it doesn't just highlight the

If you have Active Directory Certificate Services (ADCS) in your environment, run Locksmith now!

In Active Directory Security Assessments, we have found critical security issues in *most* ADCS configurations.

The great thing about Locksmith is that it doesn't just highlight the
Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

Update on the NTLM reflection attack: ctjf discovered that SMB signing enforcement does NOT protect against the NTLM reflection attack🛡 Cross-protocol relaying is still possible, even with mitigations in place. Only patching your system fully mitigates the vulnerability! 1/4🧵

Update on the NTLM reflection attack:
ctjf discovered that SMB signing enforcement does NOT protect against the NTLM reflection attack🛡

Cross-protocol relaying is still possible, even with mitigations in place. Only patching your system fully mitigates the vulnerability!
1/4🧵
Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

Using ADCS to Attack HTTPS-Enabled WSUS Clients: @[email protected] and I have extended the research by Coontzy1 on WSUS attacks and explored how to leverage misconfigured ADCS templates to gain code execution on HTTPS-enabled WSUS clients. 1/2🧵

Using ADCS to Attack HTTPS-Enabled WSUS Clients:

<a href="/cookieTheft/">@cookietheft@ioc.exchange</a> and I have extended the research by <a href="/Coontzy1/">Coontzy1</a> on WSUS attacks and explored how to leverage misconfigured ADCS templates to gain code execution on HTTPS-enabled WSUS clients.

1/2🧵
Steven Lim (@0x534c) 's Twitter Profile Photo

🛡️Detection of NTLM Reflection Exploits in Windows SMB Authentication The Depth Security blog on “Using NTLM Reflection to Own Active Directory (CVE-2025-33073)” explains how attackers exploit weaknesses in Windows SMB client authentication to escalate privileges and compromise

🛡️Detection of NTLM Reflection Exploits in Windows SMB Authentication

The Depth Security blog on “Using NTLM Reflection to Own Active Directory (CVE-2025-33073)” explains how attackers exploit weaknesses in Windows SMB client authentication to escalate privileges and compromise
FofaBot (@fofabot) 's Twitter Profile Photo

⚠️⚠️ CVE-2026-21962 (CVSS 10.0): Oracle Fusion Middleware to unauthenticated remote total takeover via HTTP 🔗FOFA Link: en.fofa.info/result?qbase64… 🎯5.3k+ Results are found on the en.fofa.info nearly year. FOFA Query: app="Oracle-Fusion-Middleware" 🔖Refer:

⚠️⚠️ CVE-2026-21962 (CVSS 10.0): Oracle Fusion Middleware to unauthenticated remote total takeover via HTTP
🔗FOFA Link: en.fofa.info/result?qbase64…
🎯5.3k+ Results are found on the en.fofa.info nearly year.
FOFA Query: app="Oracle-Fusion-Middleware"
🔖Refer:
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Fortinet admins are seeing attackers exploiting a patch bypass for a previously fixed FortiGate authentication bypass (CVE-2025-59718) to hack patched firewalls. bleepingcomputer.com/news/security/…

🕳 (@sekurlsa_pw) 's Twitter Profile Photo

Telnetd ‘If the client supply a carefully crafted USER environment value being the string "-f root", and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root’ seclists.org/oss-sec/2026/q…

Marc-André Moreau (@awakecoding) 's Twitter Profile Photo

What's cooking? PowerShell Remoting over SSH, in pure .NET, without the OpenSSH client. And yes, it can interactively prompt for credentials or accept them as input for automation 👇

What's cooking? PowerShell Remoting over SSH, in pure .NET, without the OpenSSH client. And yes, it can interactively prompt for credentials or accept them as input for automation 👇
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

CustomDpapi: Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData! github.com/EvilBytecode/C… #redteam

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

GhostKatz bypasses EDR by dumping LSASS credentials directly from physical memory. Learn how this new Red Team tool abuses signed drivers to stay invisible. meterpreter.org/screaming-at-t…

GhostKatz bypasses EDR by dumping LSASS credentials directly from physical memory. Learn how this new Red Team tool abuses signed drivers to stay invisible.
meterpreter.org/screaming-at-t…
Co11ateral (@co11ateral) 's Twitter Profile Photo

Timeroasting can be used to extract user hashes and it's stealtier than DCSync or NTDS shadow copies. Defenders should start monitoring this activity. Learn how: hackers-arise.com/powershell-for… OccupytheWeb Olexander Di #DFIR #BlueTeam #redteam

Timeroasting can be used to extract user hashes and it's stealtier than DCSync or NTDS shadow copies. Defenders should start monitoring this activity.

Learn how: hackers-arise.com/powershell-for…

<a href="/three_cube/">OccupytheWeb</a> <a href="/_aircorridor/">Olexander</a> <a href="/DI0256/">Di</a> 
#DFIR #BlueTeam #redteam
Moonbeom(Daniel) (@krneotra) 's Twitter Profile Photo

Exploit Demo & Analysis Article by 78ResearchLab(78ResearchLab) CVE-2026-20817 : Windows Error Reporting(WER) Service Elevation of Privilege Vulnerability blog.78researchlab.com/2ffdb461-3e5b-… #CVE_2026_20817 #LPE #Windows

0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

Windows Defender Evasion via PPL Manipulation New Medium post, in this one we explore a practical technique that leverages Windows PPL internals to limit effective remediation by Microsoft Defender, even when clearly malicious behaviors are performed medium.com/@s12deff/demon…

Steph (@w34kp455) 's Twitter Profile Photo

You require more passwords 👾 . Finally, released breach.txt, a wordlist built from real-world passwords found in breaches, forum dumps, leaked logs, and other "sources". weakpass.com/wordlists/brea… Will try to keep it up-to-date, at least for some time 😀 #infosec

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Interact with Kerberos and DPAPI without opening an LSASS handle. LSA Whisperer BOF uses official APIs to bypass PPL and Credential Guard during red teaming. meterpreter.org/beyond-the-mem…

Interact with Kerberos and DPAPI without opening an LSASS handle. LSA Whisperer BOF uses official APIs to bypass PPL and Credential Guard during red teaming.
meterpreter.org/beyond-the-mem…