Sven Schlüter (@secsven) 's Twitter Profile
Sven Schlüter

@secsven

Advanced Attack Simulation Specialist @ysecurityde - running all sorts of adversary emulations & pentests.

chaos.social/@secsven

ID: 17776998

linkhttps://www.y-security.de calendar_today01-12-2008 11:36:48

783 Tweet

504 Takipçi

506 Takip Edilen

Mairon (@zeromemoryex) 's Twitter Profile Photo

New AMSI lifetime bypass, it works by searching for the first byte of each instruction to prevent updates from affecting it, Check it out. #amsi #redteam #cybersecurity github.com/ZeroMemoryEx/A…

Y-Security (@ysecurity) 's Twitter Profile Photo

We recently collaborated with Hack The Box and took the challenge of reviewing their BlackSky Cloud Hacking Labs. Read about Chris's feedback and insights into the Hailstorm scenario at y-security.de/news-en/hack-t… #Y #HackTheBox #Cloud #AWS #Hailstorm #BugBounty

Aura (@securityaura) 's Twitter Profile Photo

How do you like being blind for a whole day despite having an EDR because... the EDR is doing a maintenance? For TA, this is the time to strike Carbon Black Cloud customers I guess 🙃 status.carbonblack.com/incidents/n1ch…

Chris (@0xchrisb) 's Twitter Profile Photo

Have you ever wondered how to start #AWS penetration testing? We have published AWS penetration testing: A step-by-step guide at the Hack The Box website: hackthebox.com/blog/aws-pente… #HTB #BugBounty #Y #Security #Cloud

Y-Security (@ysecurity) 's Twitter Profile Photo

Check out our blog post by Thore on our Mobile Application Testing service utilizing Apple Silicon. y-security.de/news-en/mobile… #pentest #mobile #jailbreak #apple #ios #testing #m1 #ysecurity

juraj somorovsky (@jurajsomorovsky) 's Twitter Profile Photo

We started to play with censorship circumventions. Of course, we exploit our TLS skills to bypass big firewalls. In our first work, Niklas Niere/JonSnowWhite shows that TLS record fragmentation is a useful technique to bypass the Great Firewall of China (GFW). upb-syssec.github.io/blog/2023/reco…

Y-Security (@ysecurity) 's Twitter Profile Photo

Recently we checked the security of a LoRaWAN implementation. In our latest post we share insights about the security of LoRaWAN, common LoRaWAN attacks and how we built a custom methodology and testing environment. y-security.de/news-en/securi… #pentest #lorawan #ysecurity

Y-Security (@ysecurity) 's Twitter Profile Photo

Our team recently took the challenge of mastering the Red Team Ops I and Red Team Ops II exam offered by zero . After completion, we received both the Red Team Operator and Red Team Lead certifications. Read our recent post: y-security.de/news-en/red-te… #RedTeam #RTO

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

New blog: Lateral movement and on-prem NT hash dumping with Microsoft Entra Temporary Access Passes. Some tips and tricks on abusing TAPs for Windows Hello persistence and NT hash recovery over Cloud Kerberos Trust. dirkjanm.io/lateral-moveme…

Y-Security (@ysecurity) 's Twitter Profile Photo

Our tool StealthGuardian has been accepted for Black Hat ARSENAL USA 2024. The Y-Security team will be in Las Vegas to present on protecting Red Team payloads from Blue Teams. y-security.de/news-en/black-… #BlackHat #BHUSA #RedTeam #VegasBaby

Sven Schlüter (@secsven) 's Twitter Profile Photo

Based in Germany and looking for a remote role in pentesting and attack simulation? Come join us and let's break things!

Y-Security (@ysecurity) 's Twitter Profile Photo

We have publicly released our internal tool StealthGuardian at Black Hat USA 2024. It can be combined with adversary simulation tools to verify the resistance, detection level and behaviour detection of defence mechanisms. y-security.de/news-en/stealt… #bhusa #blackhat #redteam

Phrack Zine (@phrack) 's Twitter Profile Photo

The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…

The time has come, and with it your reading material for the week.

Phrack #71 is officially released ONLINE! Let us know what you think!

phrack.org/issues/71/1.ht…
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Between July 2023 and June 2024, Microsoft observed nation-state threat actors conduct operations for financial gain, enlist cybercriminals to collect intelligence, and make use of the same tools and frameworks favored by cybercriminals: msft.it/6018mf9Sm

Y-Security (@ysecurity) 's Twitter Profile Photo

Our security team at Y-Security has identified a vulnerability in AXESS Auto Configuration Server (CVE-2024-56316) which allows unauthenticated remote attackers to trigger a permanent DoS. Advisory + Mitigation: y-security.de/news-de/axess-… #YSecurity #CVE202456316 #TR069 #ACS

Y-Security (@ysecurity) 's Twitter Profile Photo

Our security team at Y-Security has identified multiple vulnerabilities in TIM BPM Suite/TIM FLOW, allowing authorization bypass, privilege escalation, and SQL/HQL injection. Advisory + Mitigation: y-security.de/news-en/tim-bp…