Simone
@saim1z
ID: 2813782593
07-10-2014 12:50:50
20 Tweet
111 Takipçi
462 Takip Edilen
If you liked the Drop The MIC vulnerability, be sure to check Drop The MIC 2 to see how we bypassed the original fix + an additional vulnerability abusing any client sending LMv2 responses to bypass the MIC, EPA & more. Yaron Zinar Preempt, A CrowdStrike Company preempt.com/blog/drop-the-…
Sharing this again in my account as ElephantSe4l seems to be shadowbanned (wtf twitter...) crummie5.club/freshycalls/
Happy to announce I'll be presenting "Understanding and Hiding your Operations" this Saturday 19th of December (17:00 GMT+1) at 🥷🏼 No cON Name. Hacking & IT Security conference #ncn2k20 More info: noconname.org @NCCGroupEspana NCC Group Research & Technology
When (NTLM) relaying potatoes lead you to domain admin... A "permanent" 0day Privilege Escalation Vulnerability in Windows RPC Protocol ;-) cc Antonio Cocomazzi Our writeup here: labs.sentinelone.com/relaying-potat…
#RemotePotato0 new release! Now you can also grab and steal the NTLMv2 hashes of every user logged on a machine from an unprivileged user! ✅ works fully local - no network interaction (except win 2019) ✅ ntlm related ✅ won't fix Windows in 2k21 cc Andrea Pierini