๐ [ jack_halon, Jack Halon ]
Today I am releasing part 2 of my 3-part browser exploitation series on Chrome!
In part 2, we take a deep dive into the V8 compiler pipeline by understanding what happens under the hood in Ignition, Sparkplug, and TurboFan!
Enjoy!
https://t.co/XAnbzdnjeQ
๐ https://jhalon.github.io/chrome-browser-exploitation-2/
๐ฅ [ tweet ]
Today I am releasing part 2 of my 3-part browser exploitation series on Chrome!
In part 2, we take a deep dive into the V8 compiler pipeline by understanding what happens under the hood in Ignition, Sparkplug, and TurboFan!
Enjoy!
https://t.co/XAnbzdnjeQ
๐ https://jhalon.github.io/chrome-browser-exploitation-2/
๐ฅ [ tweet ]
๐ [ aetsu, ๐ฌ๐๐๐๐ ]
TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
https://t.co/jZ8KQnSUxs
๐ https://github.com/h3xduck/TripleCross
๐ฅ [ tweet ]
TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
https://t.co/jZ8KQnSUxs
๐ https://github.com/h3xduck/TripleCross
๐ฅ [ tweet ]
๐ [ testanull, Janggggg ]
You guys must be waiting for this,
So this is the working PoC script of the Exchange 0day exploited ITW
https://t.co/XGx0fYJygm
๐ https://github.com/testanull/ProxyNotShell-PoC
๐ฅ [ tweet ]
You guys must be waiting for this,
So this is the working PoC script of the Exchange 0day exploited ITW
https://t.co/XGx0fYJygm
๐ https://github.com/testanull/ProxyNotShell-PoC
๐ฅ [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
ะะพะฒัะต ัััะฟัะธะทั ะฒ AD CS... ะะพะฑะฐะฒะธะผ ัะตั
ะฝะธะบั ESC11๐
https://blog.compass-security.com/2022/11/relaying-to-ad-certificate-services-over-rpc/
#ad #pentest #redteam
https://blog.compass-security.com/2022/11/relaying-to-ad-certificate-services-over-rpc/
#ad #pentest #redteam
๐ [ Ben0xA, Ben Ten (0xA) ]
Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast
๐ https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/
๐ฅ [ tweet ]
Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast
๐ https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/
๐ฅ [ tweet ]
๐ [ BushidoToken, Will | Darknet Diaries #126 ]
๐New Blog: I have attempted to track what happened to Conti this year after the leaks and collapse of the group. Here are my findings, largely based on #OSINT. Enjoy!
https://t.co/0jSd1ZFkLf #Conti #Quantum #BlackBasta #Royal #WizardSpider #CTI
๐ https://blog.bushidotoken.net/2022/11/the-continuity-of-conti.html
๐ฅ [ tweet ]
๐New Blog: I have attempted to track what happened to Conti this year after the leaks and collapse of the group. Here are my findings, largely based on #OSINT. Enjoy!
https://t.co/0jSd1ZFkLf #Conti #Quantum #BlackBasta #Royal #WizardSpider #CTI
๐ https://blog.bushidotoken.net/2022/11/the-continuity-of-conti.html
๐ฅ [ tweet ]
๐ [ splinter_code, Antonio Cocomazzi ]
A bad news for all potato lovers ๐ญ
Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick to recover the INTERACTIVE sid group through the logon type New Credentials (9).
More details here ๐
https://t.co/hfhZxk3zMg
cc @decoder_it
๐ https://github.com/antonioCoco/JuicyPotatoNG/issues/4
๐ฅ [ tweet ]
A bad news for all potato lovers ๐ญ
Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick to recover the INTERACTIVE sid group through the logon type New Credentials (9).
More details here ๐
https://t.co/hfhZxk3zMg
cc @decoder_it
๐ https://github.com/antonioCoco/JuicyPotatoNG/issues/4
๐ฅ [ tweet ]
๐ข1
๐ [ 0xdf_, 0xdf ]
Hathor from @hackthebox_eu was a monster Windows box. My favorite parts were being forced to understand the AppLocker rules, and finding the code signing cert in the recycle bin and using it to bypass applocker. Lots of tricky steps on this one.
https://t.co/thTyAtHW9p
๐ https://0xdf.gitlab.io/2022/11/19/htb-hathor.html
๐ฅ [ tweet ]
Hathor from @hackthebox_eu was a monster Windows box. My favorite parts were being forced to understand the AppLocker rules, and finding the code signing cert in the recycle bin and using it to bypass applocker. Lots of tricky steps on this one.
https://t.co/thTyAtHW9p
๐ https://0xdf.gitlab.io/2022/11/19/htb-hathor.html
๐ฅ [ tweet ]
๐ [ 0xBoku, Bobby Cooke ]
Checkout SQLRecon by @sanjivkawa! C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
https://t.co/qSWDXimeJS
The tool has a great wiki on how to use it and you can find conference talks & slide decks on the tool here: https://t.co/W5EKXDIrJI
๐ https://github.com/xforcered/SQLRecon
๐ https://github.com/skahwah/Conference-Talks/tree/main/2022-Way-West-Hackin-Fest
๐ฅ [ tweet ]
Checkout SQLRecon by @sanjivkawa! C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
https://t.co/qSWDXimeJS
The tool has a great wiki on how to use it and you can find conference talks & slide decks on the tool here: https://t.co/W5EKXDIrJI
๐ https://github.com/xforcered/SQLRecon
๐ https://github.com/skahwah/Conference-Talks/tree/main/2022-Way-West-Hackin-Fest
๐ฅ [ tweet ]
๐ [ _xpn_, Adam Chester ]
Having a bit of fun on Mastodon this weekend creating S-Rank Influencer accounts by mocking out ActivityPub ๐๐ https://t.co/OP5PXwrLFW
๐ https://infosec.exchange/@xpn/109371536418521307
๐ฅ [ tweet ]
Having a bit of fun on Mastodon this weekend creating S-Rank Influencer accounts by mocking out ActivityPub ๐๐ https://t.co/OP5PXwrLFW
๐ https://infosec.exchange/@xpn/109371536418521307
๐ฅ [ tweet ]
๐ [ ali_alwashali, Ali Alwashali-ng ]
Windows hardening script
https://t.co/b7QWvXL5iB
Leverages windows firewall to block certain binaries from making connections
Sets lsass in protected mode
Implementation of ASR rules
Harden office
Disables DNS multicast, smbv1, netbios, powershellv2
Change file associations
๐ https://gist.github.com/mackwage/08604751462126599d7e52f233490efe
๐ฅ [ tweet ]
Windows hardening script
https://t.co/b7QWvXL5iB
Leverages windows firewall to block certain binaries from making connections
Sets lsass in protected mode
Implementation of ASR rules
Harden office
Disables DNS multicast, smbv1, netbios, powershellv2
Change file associations
๐ https://gist.github.com/mackwage/08604751462126599d7e52f233490efe
๐ฅ [ tweet ]
๐ [ T00uF, TouF ]
Just pushed a HUGE refacto in #DonPapi to make it work with Kerberos TGT.
seems your clients are as my clients and don't use protected users enough ๐
or maybe you were using the --laps options to automatically retrieve local admin credz ? ๐ค
https://t.co/XiCB7MDVEs
๐ https://github.com/login-securite/DonPAPI
๐ฅ [ tweet ]
Just pushed a HUGE refacto in #DonPapi to make it work with Kerberos TGT.
seems your clients are as my clients and don't use protected users enough ๐
or maybe you were using the --laps options to automatically retrieve local admin credz ? ๐ค
https://t.co/XiCB7MDVEs
๐ https://github.com/login-securite/DonPAPI
๐ฅ [ tweet ]
๐ [ _Kudaes_, Kurosh Dabbagh ]
Unwinder, another approach to Thread Stack Spoofing by walking PE's unwind information. This technique allows to automatically create "any" desired call stack by parsing .pdata structures.
It took me a little bit longer than expected, but worth the effort!
https://t.co/9gUEanOHeC
๐ https://github.com/Kudaes/Unwinder
๐ฅ [ tweet ]
Unwinder, another approach to Thread Stack Spoofing by walking PE's unwind information. This technique allows to automatically create "any" desired call stack by parsing .pdata structures.
It took me a little bit longer than expected, but worth the effort!
https://t.co/9gUEanOHeC
๐ https://github.com/Kudaes/Unwinder
๐ฅ [ tweet ]
๐ [ theluemmel, ADCluemmelSec ]
Always good to have some NotCovenant running on a fully fledged Defender EDR system ^^
Thx @assume_breach for his cool writeups lately:
https://t.co/jAyRonr2sF
๐ https://assume-breach.medium.com/
๐ฅ [ tweet ]
Always good to have some NotCovenant running on a fully fledged Defender EDR system ^^
Thx @assume_breach for his cool writeups lately:
https://t.co/jAyRonr2sF
๐ https://assume-breach.medium.com/
๐ฅ [ tweet ]
๐ [ _dirkjan, Dirk-jan ]
The video recording of my Black Hat talk this summer "Backdooring and Hijacking Azure AD Accounts by Abusing External Identities" made it to YouTube: https://t.co/yOwxDB8reo
๐ https://www.youtube.com/watch?v=uKDS2t9_KsA
๐ฅ [ tweet ]
The video recording of my Black Hat talk this summer "Backdooring and Hijacking Azure AD Accounts by Abusing External Identities" made it to YouTube: https://t.co/yOwxDB8reo
๐ https://www.youtube.com/watch?v=uKDS2t9_KsA
๐ฅ [ tweet ]
๐ [ gladiatx0r, Maximus ]
Just a reminder that if LDAP(S) signing/binding is not enforced then you can still LPE on any Windows workstation. Awesome video demo by @vendetce shows you how. Alternatively start Webclient programmatically https://t.co/TCanM8C6Ai or switch out P.P. for https://t.co/3i83NdpQzc
๐ https://gist.github.com/klezVirus/af004842a73779e1d03d47e041115797
๐ https://github.com/nccgroup/Change-Lockscreen
๐ฅ [ tweet ][ quote ]
Just a reminder that if LDAP(S) signing/binding is not enforced then you can still LPE on any Windows workstation. Awesome video demo by @vendetce shows you how. Alternatively start Webclient programmatically https://t.co/TCanM8C6Ai or switch out P.P. for https://t.co/3i83NdpQzc
๐ https://gist.github.com/klezVirus/af004842a73779e1d03d47e041115797
๐ https://github.com/nccgroup/Change-Lockscreen
๐ฅ [ tweet ][ quote ]
๐ [ pdiscoveryio, ProjectDiscovery.io ]
Proxify - A portable CLI-based HTTP/Socks proxy written in Golang https://t.co/6M9dHWGtWo
#hackwithautomation #proxy #security #opensource
๐ https://blog.projectdiscovery.io/proxify-portable-cli-based-proxy/
๐ฅ [ tweet ]
Proxify - A portable CLI-based HTTP/Socks proxy written in Golang https://t.co/6M9dHWGtWo
#hackwithautomation #proxy #security #opensource
๐ https://blog.projectdiscovery.io/proxify-portable-cli-based-proxy/
๐ฅ [ tweet ]
๐ [ Synacktiv, Synacktiv ]
Our ninjas @yaumn_ and @mickaelweb recently assessed Microsoft Defender for Identity detection capabilities. In their recent blogpost, they describe the product's architecture, present some bypasses and give general Red Team advices. https://t.co/tuBoWYEVQ9
๐ https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html
๐ฅ [ tweet ]
Our ninjas @yaumn_ and @mickaelweb recently assessed Microsoft Defender for Identity detection capabilities. In their recent blogpost, they describe the product's architecture, present some bypasses and give general Red Team advices. https://t.co/tuBoWYEVQ9
๐ https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html
๐ฅ [ tweet ]
๐ [ _EthicalChaos_, Ceri ๐ด๓ ง๓ ข๓ ท๓ ฌ๓ ณ๓ ฟ ]
@_RastaMouse Python via choco is great, all fluid and just works. A Hyper-V VM with Windows 11 on + choco is awesome attacking machine. I have WSL on there as backup but rarely use, even for relaying
๐ฅ [ tweet ]
@_RastaMouse Python via choco is great, all fluid and just works. A Hyper-V VM with Windows 11 on + choco is awesome attacking machine. I have WSL on there as backup but rarely use, even for relaying
๐ฅ [ tweet ]
ั
ะพัะพัะธะน ัะพะฒะตั ะดะปั ะฒะธะฝะดะพัะตัะฐะฟะฐ ะพั ััะธะบะฐะป ั
ะฐะพัะฐX (formerly Twitter)
CCob๐ด๓ ง๓ ข๓ ท๓ ฌ๓ ณ๓ ฟ (@_EthicalChaos_) on X
Ceri Coburn: Hacker | Rฬทuฬทnฬทnฬทeฬทrฬท DIYer| Vizsla Fanboy and a Little Welsh Bull apparently ๐ด๓ ง๓ ข๓ ท๓ ฌ๓ ณ๓ ฟ
Author of poorly coded tools: https://t.co/P6tT2qQksC
Author of poorly coded tools: https://t.co/P6tT2qQksC
๐ฅ2
ะัะปััะพัะธ ะฟัะพ SPN-less RBCD ั ะะธะฝัะบัะฐ ะฑะตะท Rubeus ๐๐ป
https://threadreaderapp.com/thread/1595814518558543874.html
(ั Rubeus ััะพ ะฒะพั ัะฐะบ)
https://threadreaderapp.com/thread/1595814518558543874.html
(ั Rubeus ััะพ ะฒะพั ัะฐะบ)
Threadreaderapp
Thread by @snovvcrash on Thread Reader App
@snovvcrash: ๐งต (1/x) I know you love #pentest stories, so hereโs one of those โฌ๏ธ Thereโs a non-DC computer (Victim) that is a member of the Exchange Trusted Subsytem group and has DCSync privs. The WebClient...โฆ
๐คฏ2๐ฅ1