EAGAIIN

608 posts

EAGAIIN banner
EAGAIIN

EAGAIIN

@EAGAIIN

I break things casu consulto. Red Team at CrowdStrike. My views and comment are my own and do not reflect my employer’s views.

Europe 가입일 Ağustos 2019
724 팔로잉119 팔로워
EAGAIIN 리트윗함
incendiumrocks
incendiumrocks@incendiumrockz·
It's been a while since I wrote a blog post. My new post writes about some cool updates to the MS-RPC-Fuzzer for recursively fuzzing complex structures, logging using ETW, and we found a way to escalate to nt\authority system! incendium.rocks/posts/Fuzzing-…
English
1
59
243
12.8K
EAGAIIN
EAGAIIN@EAGAIIN·
@yaumn_ Very juicy bonus! Relays are not dead. Thanks for the research 💪🏼
English
0
0
1
77
Haidar
Haidar@haider_kabibo·
So here is new local privilege escalation zero-day I discovered, not patched yet too :). In simple terms, if you have a service like RDP that exposes an RPC server, there many system services running as SYSTEM connect to it as RPC clients. If that service is turned off (RDP is off by default), it seems that any other process in Windows can expose the same RPC server using the same endpoint. Now all the RPC calls from that SYSTEM processes will come to this fake server and If the process that deployed the server has SeImpersonatePrivilege, it can escalate to SYSTEM by impersonate the RPC client. In the white paper below, I describe five exploit paths you can abuse. However it's architecture problem and maybe there are more. It's Not A Potato securelist.com/phantomrpc-rpc…
English
16
164
789
49.4K
vx-underground
vx-underground@vxunderground·
I don't use an anti-virus. If I detonate malware on my machine (which I have several times) I yank the CAT cable and then let out an audible and dramatic sigh.
English
10
12
497
15.9K
vx-underground
vx-underground@vxunderground·
Had a Threat Actor ask for an anti-virus recommendation DAWG, YOU ARE THE THREAT. WHY DO YOU NEED AN AV?
English
59
54
2.1K
77K
EAGAIIN 리트윗함
Jacob Paullus
Jacob Paullus@psycep_·
gopacket is live! Check it out, it is intended to be a full reimplementation of Impacket in Go (it is in beta please send me bug reports) github.com/mandiant/gopac…
English
7
124
418
59.8K
EAGAIIN 리트윗함
dylan davis
dylan davis@lildylannn·
I just dropped some research: DSCourier and would love for your opinion and to check it out!! It’s a novel post-exploitation technique abusing WinGet’s COM API to execute code through Microsoft-signed binaries. GitHub: github.com/DylanDavis1/DS… Blog: dylansec.com/DSCourier/
English
4
103
357
67.7K
Lupin
Lupin@0xLupin·
Her first week at Lupin & Holmes ? Garance compromised an npm package with 40M weekly downloads 🔥 Depi flagged a dangerous workflow in @ img/colour. She turned Dependabot into the trigger, got the workflow to run, and reached package write access. 40M weekly downloads. Week one. Garance rocks 🤟 landh.tech/blog/20260402-…
Lupin tweet media
English
5
18
126
10.9K
EAGAIIN 리트윗함
chiefofautism
chiefofautism@chiefofautism·
someone at ANTHROPIC just showed CLAUDE finding ZERO DAY vulnerabilities in a live conference demo claude has found zero day in Ghost, 50,000 stars on github, never had a critical security vulnerability in its entire, history... it found the blind SQL injection in 90 minutes, stole the admin api key, then did the exact, same thing to the linux kernel
English
303
1.3K
11.8K
1.9M
EAGAIIN 리트윗함
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿@_EthicalChaos_·
Small updated to DRSAT just pushed that will also allow Group Policy Editor and Certificate Authority / Templates MMC snap-ins work over a TCP only SOCKS connection. github.com/CCob/DRSAT
English
4
62
156
14.7K
nkl
nkl@614ck1n9·
@BetterCallMedhi Du coup, ça réduit le nombre de failles possibles, mais les red teams vont aussi utiliser les LLM. Est-ce qu’ils trouveront toujours des failles ?
Français
2
0
0
2.4K
EAGAIIN
EAGAIIN@EAGAIIN·
@TheXC3LL So the grass is not greener on the other side, just different
English
0
0
0
506
Jean
Jean@Jean_Maes_1994·
perfection.
Jean tweet media
English
5
6
71
7.4K
EAGAIIN 리트윗함
Logan D
Logan D@relay_royalty·
Introducing RelayKing. github.com/depthsecurity/… Blog: depthsecurity.com/blog/introduci… Automatically identify relay attack paths. No longer will you be left to manually detect a comprehensive inventory of all the relaying vectors on your engagements. It will detect signing/EPA settings on all protocols you specify, NTLM reflection CVEs, and WebDav WebClient presence. Then, produce a comprehensive report of the relaying vectors on the network in your preferred output format. This ensures that you report ALL vulnerable instances easily, without the need for manual patching together of results from various tools. Ideal usage is with a set of low-privilege AD credentials, but it also supports unauthenticated scanning (with far less coverage). See GitHub and the blog post for more details. Please note that there ARE bugs. The LDAP(S) detection has been annoying but SHOULD be mostly solid. If you get suspicious results from it, please report an issue on GitHub with the config RelayKing reported, versus the actual one. Enjoy!
English
3
86
213
18.2K