Antonio Cocomazzi

1.8K posts

Antonio Cocomazzi

Antonio Cocomazzi

@splinter_code

offensive security - windows internals | BlueSky: https://t.co/ytvJCoaF2c | Mastodon: https://t.co/hNIHa6L14d

Italy 가입일 Ağustos 2016
325 팔로잉9.4K 팔로워
Antonio Cocomazzi 리트윗함
diversenok
diversenok@diversenok_zero·
> A new Project Zero blog post by James Forshaw projectzero.google/2026/02/gphfh-… Me: Oh hey, I recognize this function! UIAccess + GetProcessHandleFromHwnd / NtUserGetWindowProcessHandle were the core of my CVE-2021-31951 EoP 😋 So some fixes leading to v3 actually date a bit earlier
English
1
11
76
4.1K
Antonio Cocomazzi 리트윗함
Andrea P
Andrea P@decoder_it·
Just dropped a short post on why some classic NTLM relay tricks seems to be dead on Server 2025. decoder.cloud/2026/02/25/wha…
English
2
65
201
13.4K
Antonio Cocomazzi 리트윗함
Andrea P
Andrea P@decoder_it·
Just published a summary of "modern" Windows authentication reflection attacks. Turns out reflection never really died. 😅decoder.cloud/2025/11/24/ref…
English
3
82
233
20.5K
Antonio Cocomazzi 리트윗함
Andrea P
Andrea P@decoder_it·
Blog post about my recent CVE-2025-58726, aka “The Ghost Reflection” is out, read it here: semperis.com/blog/exploitin… 🙃
English
3
90
182
16.7K
Antonio Cocomazzi 리트윗함
Andrea P
Andrea P@decoder_it·
Remember the CredMarshalInfo trick? If you hadn’t applied the June 2025 patch, CVE-2025-33073 would have been critical. We know that in NTLM local auth, msg 3 is empty:You can drop sign/seal -> from Domain User to DomainAdmin escalation. 😅
Andrea P tweet mediaAndrea P tweet media
English
5
62
225
18.5K
Antonio Cocomazzi 리트윗함
Andrea P
Andrea P@decoder_it·
Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used. Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.
Andrea P tweet mediaAndrea P tweet media
English
4
82
284
19K
Antonio Cocomazzi 리트윗함
diversenok
diversenok@diversenok_zero·
Better socket handle visibility coming soon to @SystemInformer 🔥 When viewing a process handle table, SI will recognize files under \Device\Afd and retrieve information about their state, protocol, addresses, and more. Also works on Bluetooth and Hyper-V sockets 🤩
diversenok tweet media
English
2
21
117
12.3K
Antonio Cocomazzi
Antonio Cocomazzi@splinter_code·
The role is opened in multiple locations in Europe (we’re hiring across Italy, Spain, Poland, Czech Republic, Slovakia and France), with optional relocation support to Czechia if you'd prefer to move (must be eligible to work in the EU already at the time of applying).
English
1
0
1
573
Antonio Cocomazzi 리트윗함
Andrea P
Andrea P@decoder_it·
In my long history of submissions, I think this is the first time one has been marked as critical😅
Andrea P tweet media
English
3
1
83
6.3K
Antonio Cocomazzi 리트윗함
Andrea P
Andrea P@decoder_it·
I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…
English
2
150
350
19.5K
Antonio Cocomazzi 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft has discovered post-compromise exploitation of CVE 2025-29824, a zero-day elevation of privilege vulnerability in Windows Common Log File System (CLFS), against a small number of targets. msft.it/6019qIVV9
English
8
119
302
71.2K
Antonio Cocomazzi 리트윗함
Elad Shamir
Elad Shamir@elad_shamir·
NTLM relay is still a major threat and is now even easier to abuse. We just added new NTLM relay edges to BloodHound to help defenders fix and attackers think in graphs. Read my detailed post - the most comprehensive guide on NTLM relay & the new edges: ghst.ly/4lv3E31
English
6
111
258
21.4K
Antonio Cocomazzi 리트윗함
Boris Larin
Boris Larin@oct0xor·
We (me + @2igosha) have discovered a new Google Chrome 0-day that is being used in targeted attacks to deliver sophisticated spyware 🔥🔥🔥. It was just fixed as CVE-2025-2783 and we are revealing the first details about it and “Operation ForumTroll” securelist.com/operation-foru…
English
9
97
282
37.2K
Antonio Cocomazzi 리트윗함
Raffaele Sabato
Raffaele Sabato@syrion89·
Check out our new blog post!
SentinelOne@SentinelOne

🍎🚨🕵️‍♂️ The notoriously elusive macOS malware, ReaderUpdate, is back — stealthier than ever. @philofishal and @syrion89 uncover how ReaderUpdate Reforged blends Go, Crystal, Nim, and Rust into a potent mix. 📄 This new research from SentinelOne exposes how these new variants are spreading and how you can protect your organization. Stay informed. Stay secure. Dive into the research: s1.ai/readup

English
1
5
13
1.6K