
Marina Simakov
@simakov_marina
Security Researcher @PreemptSecurity
ID: 824617862706892801
26-01-2017 13:59:53
201 Tweet
1,1K Followers
205 Following



Are all your DCs already patched against Zerologn (CVE-2020-1472)? Check out this simplified overview of the critical vulnerability discovered by Secura + further steps you can take to protect your network 😎 Yaron Zinar Preempt, A CrowdStrike Company preempt.com/blog/security-…

Excited to join the CrowdStrike team! 🎉


Just merged Jake Karnes implementation CVE-2020-17049 (aka Kerberos Bronze Bit Attack). Great stuff and thorough explanations in the blogposts. Great research Jake! Enjoy! github.com/SecureAuthCorp…

While the Bronze Bit vulnerability was patched, the ability to bypass the "Kerberos Only" protection in Kerberos Constrained Delegation was published 2 years ago by Elad Shamir and still works today against patched DCs 😇 shenaniganslabs.io/2019/01/28/Wag…

NTLM relay refuses to die! A new blog is alive with details about the cool vuln in Print Spooler we have found! It was patched by Microsft in the last Patch Tuesday. We also have a PoC we intend to release later. The blog was written jointly with Alex Ionescu crowdstrike.com/blog/cve-2021-…

5 months ago Lee Chagolla-Christensen and I started looking into the security of Active Directory Certificate Services. Today we're releasing the results of that research- a blog post posts.specterops.io/certified-pre-… + a 140-page whitepaper and defensive audit tool (links at the top of the post) [1/6]

Excited to share I'll be (virtually) in Vegas presenting in DEF CON a talk titled: "Adventures in MitM-land: Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes" with Sagi Sheinfeld Eyal Karni 🍅. We'll present cool new MitM attacks against NTLM and Kerberos






we got a persistent 0click on ChatGPT by sharing a doc that allowed us to exfiltrate sensitive data and creds from your connectors (google drive, sharepoint, ..) + chat history + future conversations it gets worse. we deploy a memory implant #DEFCON #BHUSA Tamir Ishay Sharbat

next. we hijacked cursor via jira mcp by submitting a support ticket cursor harvests and exfiltrate all creds from your dev machine and then reports back to the dev that "the 2-hour downtime that affected user transactions has been resolved" #DEFCON #BHUSA Marina Simakov