Aurélien Chalot

1.6K posts

Aurélien Chalot banner
Aurélien Chalot

Aurélien Chalot

@Defte_

Hacker, sysadmin and security researcher @OrangeCyberdef 💻 Calisthenic enthousiast 💪 and wannabe philosopher https://t.co/SqDDhIGGGh 📖 🔥 Hide&Sec 🔥

The grid Katılım Kasım 2017
475 Takip Edilen4.2K Takipçiler
Sabitlenmiş Tweet
Aurélien Chalot
Aurélien Chalot@Defte_·
Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳
Aurélien Chalot tweet media
English
7
299
1.4K
70.3K
那个火饺🦆(JJ)
那个火饺🦆(JJ)@thatjiaozi·
Note to self: i should quit and open a bakery fml
English
2
0
14
1.2K
Aurélien Chalot retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Releasing one of my research tools: EVENmonitor🖥️ Inspired by LDAPmonitor, I implemented a monitoring tool for the Windows Event log in pure python. You can just attach it via the network and then filter for specific event IDs or keywords. Available at: github.com/NeffIsBack/EVE…
GIF
English
3
53
202
13.1K
Callum Stewart
Callum Stewart@stewart_sec·
@sekurlsa_pw @RedHatPentester So from a low priv user you can determine if a PSO exists and which users it applies to but you can’t see the policy details. W/ a DA acct you can see policy details. If I see a PSO I just refuse to spray any users that it applies to unless the client will tell me the details
English
2
0
9
5.6K
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
If a pentester ignores the password policy and performs password spraying blindly, they may unintentionally lock multiple user accounts. This can disrupt business operations and immediately alert system administrators to suspicious activity. For example, if the policy locks accounts after five failed login attempts, spraying several passwords too quickly across many accounts could trigger a mass lockout event. By reviewing the password policy first, the penetration tester can design a controlled and stealthy spraying strategy. Knowing the lockout threshold allows the tester to limit attempts to safe numbers and space them out over time.
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
13
64
483
28.6K
Garrett
Garrett@unsigned_sh0rt·
@Defte_ @Sniffler0x1 I'm re-reading the thread and realizing the perspective you're coming from now. In SCCM you can enable a setting to not automatically approve unknown clients. You can also define boundary groups for new clients which gives your some granularity on approval.
English
2
0
2
106
Aurélien Chalot
Aurélien Chalot@Defte_·
Dumb question. I'm fine-tuning my AD recommendation and work on the NAA SCCM. There's one thing I don't get. Since we need the domain computer password to retrieve the NAA password from the HTTP endpoint, why do we need the NAA account if we already have a computer account ?
English
4
0
21
4.8K
Garrett
Garrett@unsigned_sh0rt·
@Defte_ @Sniffler0x1 initially it's a self-signed certificate (or PKI if they have AD CS setup) that's used by the client to start the enrollment process with the management point management point sends the NAA, NAA gives access to shares
English
2
0
0
87
Aurélien Chalot
Aurélien Chalot@Defte_·
@Sniffler0x1 and ultimately, how ehttp fixes the problem ? There's no more NAA account but I don't get how the DP knows that a non domain joined account can authenticate and be provisionned. I should just read more documentations I guess D
English
2
0
1
162
Aurélien Chalot
Aurélien Chalot@Defte_·
@Sniffler0x1 So the real question I have got, is why would that account be spread via the HTTP endpoint. If the computer is not domain joined, it cannot reach that endpoint anyway. But yeah, if the computer boots via PXE, then the password is used to reach the AD
English
1
0
0
332
Aurélien Chalot
Aurélien Chalot@Defte_·
@ShitSecure Found some reasons althought I still don't get why that mechanism even exists xD
Aurélien Chalot tweet media
English
0
0
0
299
Aurélien Chalot
Aurélien Chalot@Defte_·
@ShitSecure Is this some kind of a legacy issue as we see everyday in the windows world ? ahah
English
1
0
0
292
Aurélien Chalot
Aurélien Chalot@Defte_·
Is this just a fallback account, in case the computer account fails at doing something ?
English
0
0
0
589
Aurélien Chalot
Aurélien Chalot@Defte_·
Some papers mention the "if another account is needed to provision the computer" but the computer account is enough to read SMB shares where scripts and packages are stored. Also, the computer is already enrolled in the AD. What would be a legit use case of that account then?
English
1
0
0
651
Aurélien Chalot
Aurélien Chalot@Defte_·
@sama How can you even trust AI won't be misused by dow when your country is run by a fool crying on twitter when Anthropic refused the deal ? "Communist leftist" whatever bullcrap this is. The guy broke every rules but still you manage to believe he won't break your terms ?
English
1
0
3
198
Sam Altman
Sam Altman@sama·
I'd like to answer questions about our work with the DoW and our thinking over the past few days. Please AMA.
English
7.6K
590
10.5K
7.1M
Aurélien Chalot retweetledi
Boschko
Boschko@olivier_boschko·
Discovered 2 RCEs in Unitree Go2 with @ruikai. CVE-2026-27509 is unauth'd over DDS. CVE-2026-27510 is the same sink, different source. Dropped the 32-minute technical writeup from unboxing to shells. Hope you enjoy the read! ❤️ boschko.ca/unitree-go2-rce
English
3
29
103
11.7K