KingKor (@siniskor) 's Twitter Profile
KingKor

@siniskor

pizza,style,music

ID: 845356567

calendar_today25-09-2012 11:32:35

16 Tweet

10 Followers

321 Following

Clément Labro (@itm4n) 's Twitter Profile Photo

New blog post! 🤓 Following the release of "Perfusion", my exploit tool for the RpcEptMapper registry key vulnerability, I decided to write a blog post to discuss the "unconventional" method I used. 😉 👉 Post: itm4n.github.io/windows-regist… 👉 Tool: github.com/itm4n/Perfusion

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

What a time to be alive... Install the Microsoft signed Hybrid Connection Manager on victim host, link it up with your Azure app, enjoy persistent access to the on-prem network from your Azure portal. Only needs https outbound to Azure and line of sight from victim to target host

What a time to be alive... Install the Microsoft signed Hybrid Connection Manager on victim host, link it up with your Azure app, enjoy persistent access to the on-prem network from your Azure portal. Only needs https outbound to Azure and line of sight from victim to target host
Omar Ωr Santos (@santosomar) 's Twitter Profile Photo

Adfsbrute - A Script To Test Credentials Against Active Directory Federation Services (ADFS), Allowing Password Spraying Or Bruteforce Attacks ift.tt/3dZnuS1 #cybersecurity #bugbountytips #hacking #tools

Adfsbrute - A Script To Test Credentials Against Active Directory Federation Services (ADFS), Allowing Password Spraying Or Bruteforce Attacks ift.tt/3dZnuS1 #cybersecurity #bugbountytips #hacking #tools
The Hacker News (@thehackersnews) 's Twitter Profile Photo

RemotePotato0 — A "won't fix" exploit for Windows that allows you to escalate your privileges from a generic User to Domain Admin. github.com/antonioCoco/Re…

🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

Want to try to decode SCCM passwords in SC_UserAccount table with #mimikatz ? 🥝 (hints, lots of them have usually admin rights 🤪) A little POC here: github.com/gentilkiwi/mim… So Jonas Vestberg can try it ;)

Want to try to decode SCCM passwords in SC_UserAccount table with #mimikatz ? 🥝

(hints, lots of them have usually admin rights 🤪)

A little POC here: github.com/gentilkiwi/mim…

So <a href="/bugch3ck/">Jonas Vestberg</a> can try it ;)
🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

I really love "new" Microsoft Kernel Code signing rules ( techcommunity.microsoft.com/t5/windows-har… ) #mimikatz driver (mimidrv) still load on a fresh, up to date 21H1 It seems Microsoft still must deal with legacy drivers😉

I really love "new" Microsoft Kernel Code signing rules
( techcommunity.microsoft.com/t5/windows-har… )

#mimikatz driver (mimidrv) still load on a fresh, up to date 21H1

It seems Microsoft still must deal with legacy drivers😉
mpgn (@mpgn_x64) 's Twitter Profile Photo

Connecting to RDP using Restricted Admin option seems to do the trick to evade this attack ✌️🎉 mstsc /RestrictedAdmin /v:<ip>

Connecting to RDP using Restricted Admin option seems to do the trick to evade this attack ✌️🎉

mstsc /RestrictedAdmin /v:&lt;ip&gt;
🥝🏳️‍🌈 Benjamin Delpy (@gentilkiwi) 's Twitter Profile Photo

There is Remote Desktop Client in the Microsoft Store, not using mstscax.dll CryptProtectData (DPAPI) instead of CryptProtectMemory > microsoft.com/p/microsoft-re… I'll not create a function for that in #mimikatz🥝 Maybe when it will not store in memory passwords 12x in CLEARTEXT 🤬

There is Remote Desktop Client in the Microsoft Store, 
not using mstscax.dll
CryptProtectData (DPAPI) instead of CryptProtectMemory
&gt; microsoft.com/p/microsoft-re…

I'll not create a function for that in #mimikatz🥝 
Maybe when it will not store in memory passwords 12x in CLEARTEXT 🤬