ARZ

2.3K posts

ARZ

ARZ

@Arz_101

Smol Pentester | OSCP | OSEP | gib AD | UwU

Pakistan Katılım Nisan 2019
302 Takip Edilen1K Takipçiler
ARZ retweetledi
Speed⭐️
Speed⭐️@ishowspeedsui·
@LoganPaul you don’t even know shit about one piece
English
2
44K
609.6K
32.1M
ARZ retweetledi
impulsive
impulsive@weezerOSINT·
Windows defender has been compromised. right now there is a public unpatched exploit that gives any app on your windows PC full system admin access. no password. no popup. nothing your antivirus doesnt stop it. your antivirus IS the exploit. windows defender is the attack vector ransomware gangs can use this to encrypt your entire machine and steal every saved password, browser session, and discord token you have. fully patched windows 11. real time protection on thread
impulsive tweet mediaimpulsive tweet media
English
220
1.5K
8.9K
2.2M
ARZ retweetledi
هدى نعيم Huda Naim
هدى نعيم Huda Naim@HuDa_NaIm92·
في مشهد يهز الضمير الإنساني، وثقت الكاميرا لحظات احتضار طفل فلسـ.طيني بعد أن استهدفه قـ.ناص إسـ.رائيـ.لي بدم بارد. الطفل ينزف ببطء، وحده، دون أن يُسمح لأحد بإنقاذه... صرخة البراءة التي خنقت أمام صمت العالم. كم من الأطفال يجب أن يسقطوا حتى يتحرك الضمير؟
العربية
4.9K
44.9K
122.1K
4.7M
ARZ retweetledi
Jvnior
Jvnior@Jvnior·
🚨🇮🇱 LIVE FOOTAGE: IDF soldiers tortured a Palestinian kid and threw him off a roof. They call themselves “the most moral army.”
English
2.9K
41K
85.6K
7.2M
ARZ retweetledi
User not Found
User not Found@AwaisAfzal0·
well i know how this thing work
User not Found tweet mediaUser not Found tweet media
English
0
1
1
92
ARZ retweetledi
Alan MacLeod
Alan MacLeod@AlanRMacLeod·
"Man in military fatigues" is a new one.
Alan MacLeod tweet media
English
578
33.7K
159.4K
1.7M
ARZ retweetledi
DiscussingFilm
DiscussingFilm@DiscussingFilm·
First peek at the new ‘REGULAR SHOW’ series. Releasing May 11 on Cartoon Network.
DiscussingFilm tweet media
English
410
5.6K
78K
2.4M
ARZ retweetledi
duck
duck@ExtremeBlitz__·
ChatGPT: “Sorry, I cant talk about that” Grok:
English
316
23.3K
225.1K
6.5M
ARZ retweetledi
BriPwn
BriPwn@BriPwn·
Your EDR just coerced itself. 🫠 Drop a crafted LNK → MsSense.exe makes a CreateFile call → machine account hands over its Net-NTLMv2 hash over WebDAV → relay to LDAP → Shadow Credentials or RBCD. No user interaction. No exotic exploit. Just vibes and a shortcut file. If you're running Microsoft Defender for Endpoint, this one is literally about you. 👀 Full attack + detection breakdown 👇 youtu.be/30Qiq_Gt_bA #purpleteam #MDE #NTLMcoercion #detectionengineering
YouTube video
YouTube
English
7
95
425
34.7K
ARZ retweetledi
dbugs
dbugs@ptdbugs·
Changes in NTLM relay in Windows Server 2025 Research by Decoder reveals that Windows Server 2025 introduces hidden modifications to Microsoft’s authentication mechanisms that affect how "NTLM relay" attacks work. The study focuses on how new policies and updated "SMB", "LDAP", and "HTTP" components have altered attack behavior within domain environments. The shift is driven not by а new security policy, but by internal changes to the Microsoft v1 authentication package ("msv1_0.dll"). This package now strictly blocks the generation of "NTLMv1" for cross-domain requests, effectively closing a legacy NTLM attack vector between Domain Controllers (DCs) that was previously a staple in penetration testing and red teaming. 📎 Article: decoder.cloud/2026/02/25/wha… #dbugs_attacks
dbugs tweet media
English
1
42
160
10.5K
ARZ retweetledi
Logan Goins
Logan Goins@_logangoins·
I ended up quickly modifying ntlmrelayx to support these changes so that relays to LDAP are possible again, thanks y'all for your hard work on figuring this out! You can find the changes here: github.com/logangoins/imp…
RedTeam Pentesting@RedTeamPT

🚀Our tool keycred for KeyCredentialLinks and Shadow Credential attacks now works with updated domain controllers again! It turns out, Microsoft violated their own specs. Try it out: github.com/RedTeamPentest…

English
0
31
86
8.7K
ARZ retweetledi
TrustedSec
TrustedSec@TrustedSec·
Want stronger #LDAP security without accidentally taking down production? Scott Blake walks through how LDAP Signing and Channel Binding work, what Windows Server 2025 changes by default, and why “audit before enforce” should be your new favorite phrase. hubs.la/Q040TCz20
English
1
40
126
19.4K
ARZ retweetledi
Logan D
Logan D@relay_royalty·
Introducing RelayKing. github.com/depthsecurity/… Blog: depthsecurity.com/blog/introduci… Automatically identify relay attack paths. No longer will you be left to manually detect a comprehensive inventory of all the relaying vectors on your engagements. It will detect signing/EPA settings on all protocols you specify, NTLM reflection CVEs, and WebDav WebClient presence. Then, produce a comprehensive report of the relaying vectors on the network in your preferred output format. This ensures that you report ALL vulnerable instances easily, without the need for manual patching together of results from various tools. Ideal usage is with a set of low-privilege AD credentials, but it also supports unauthenticated scanning (with far less coverage). See GitHub and the blog post for more details. Please note that there ARE bugs. The LDAP(S) detection has been annoying but SHOULD be mostly solid. If you get suspicious results from it, please report an issue on GitHub with the config RelayKing reported, versus the actual one. Enjoy!
English
3
86
213
18.1K