Steve Breen

401 posts

Steve Breen banner
Steve Breen

Steve Breen

@breenmachine

Montreal Bergabung Mayıs 2011
250 Mengikuti1.7K Pengikut
Steve Breen
Steve Breen@breenmachine·
@execveat The original Potato vulnerability for local privilege escalation actually worked for quite a while before it got fixed! It was mostly just the implementation of some of @tiraniddo's research that had been marked "WontFix" by MS.
English
0
0
1
0
Steve Breen
Steve Breen@breenmachine·
@shortxstack Is that graphic available anywhere? It's really cool.
English
1
0
0
0
Thomas H. Ptacek
Thomas H. Ptacek@tqbf·
Like, I understand some very notable science to have been the product of this kind of contrary impulse, but, as a description of all or even most successful science, my spidey sense is tingling? But I’m not a scientist?
English
4
0
4
0
Steve Breen
Steve Breen@breenmachine·
@steventseeley I also noticed "paste-from-file" with some binary files was breaking recently. Had to use curl.
English
0
0
1
0
ϻг_ϻε
ϻг_ϻε@steventseeley·
For someone who crafts payloads manually in repeater, this drove me nuts so I also downgraded.
Soroush Dalili@irsdl

@hkashfi Yes the problem was so bad many like me are using the previous version (less buggy)

English
1
1
11
0
Steve Breen me-retweet
0xdeadbeefJERKY ☠️
0xdeadbeefJERKY ☠️@0xdeadbeefJERKY·
This paper is *the* resource for abusing tokens on Windows for privilege escalation. I especially appreciate the level of detail @dronesec and @breenmachine go into to explain the token ecosystem, permissions, past attacks, etc. 10/10 would read again. github.com/hatRiot/token-…
English
2
3
6
0
Steve Breen me-retweet
Andrea P
Andrea P@decoder_it·
I'm releasing with @Giutro Juicy Potato, another Local Privilege Escalation tool from a Windows Service Accounts to SYSTEM by abusing the golden privileges (decoder.cloud/2018/08/10/jui…)
English
3
94
156
0
Steve Breen me-retweet
Justin Kennedy
Justin Kennedy@jstnkndy·
#UnpopularOpinion conferences should more heavily vet talks and reject those that are subpar because those speakers often get an inflated sense of skill and spread misinformation.
English
5
4
40
0
Steve Breen me-retweet
James Forshaw
James Forshaw@tiraniddo·
@ifsecure uploaded the privilege escalation I wrote (with @halvarflake size coding) for the WPAD blog. #c5" target="_blank" rel="nofollow noopener">bugs.chromium.org/p/project-zero… Small footprint and uses RPC libs instead of parsing the RPC traffic like Rotten Potato /cc @breenmachine
English
0
30
39
0
Steve Breen
Steve Breen@breenmachine·
@jensvoid @foxglovesec I believe you maintain the printer hacking wiki? Great resource, was very useful during this project. If you have any questions or would like to add some of this material to the wiki, I'd be interested in assisting.
English
0
0
0
0