Timothy D. Morgan

566 posts

Timothy D. Morgan

Timothy D. Morgan

@ecbftw

Founder & CTO of @DeepSurfaceSec 15 years helping others fix their code. Now fixing the brokenness of vuln management. Opinions are often strong and are my own.

Portland, Oregon Bergabung Ağustos 2013
107 Mengikuti603 Pengikut
Timothy D. Morgan me-retweet
DeepSurface Security
DeepSurface Security@DeepSurfaceSec·
#DeepSurface is thrilled to announce our new Integration Partnership with Lansweeper! Together we are pushing the boundaries of visibility– giving you a complete view of your assets AND where your #cybersecurity risk really exists. 1/2 🧵
DeepSurface Security tweet media
English
1
1
0
120
spencer
spencer@techspence·
Hey hackers.... What's your favorite local privilege escalations in windows/AD environments? 😈😎
English
75
63
568
152.5K
Timothy D. Morgan
Timothy D. Morgan@ecbftw·
@gf_256 Bonus points if you've ever pulled that off during a pentest. I once submitted negative value as a refund to the "customer". At the report readout, I told the devs "Oh, but I really doubt your fulfillment department would issue the refund" ...*pause*... "You might be surprised."
English
1
1
141
0
cts🌸
cts🌸@gf_256·
security researchers be like
cts🌸 tweet media
English
58
557
6.8K
0
Timothy D. Morgan me-retweet
Horizon3 Attack Team
Horizon3 Attack Team@Horizon3Attack·
Check out a recent finding by one of our own, Naveen Sunkavally. CVE-2022-28219 is an unauth RCE for ManageEngine ADAudit Plus. This XXE -> Deserialization chain often leads to host compromise as well as priv'd AD creds. Check out the blog post and POC: horizon3.ai/red-team-blog-…
English
5
252
679
0
Timothy D. Morgan me-retweet
Nicolas Grégoire
Nicolas Grégoire@Agarri_FR·
OWASP's example implementation of check_private_ip() is quite naive. It can be bypassed with 0x7f.0.0.1 #SSRF #application-layer_1" target="_blank" rel="nofollow noopener">cheatsheetseries.owasp.org/cheatsheets/Se…
English
3
25
111
0
Timothy D. Morgan me-retweet
Alex Ionescu
Alex Ionescu@aionescu·
It’s 2022, and the fix is still “disable the anti malware agent”. Don’t ever change, infosec/AV industry.
English
5
37
247
0
Timothy D. Morgan me-retweet
Greg Linares (Laughing Mantis)
Greg Linares (Laughing Mantis)@Laughing_Mantis·
#Log4J Worm is ITW @vxunderground has a sample of the self propagating worm using log4j as a vector. It installs a Mirai bot which makes sense to targeting embedded Linux devices Looks like it uses user-agent for exploitation and modifies the binary before sending (?)
English
4
154
305
0