Giuseppe`Ohpe`Trotta

1.1K posts

Giuseppe`Ohpe`Trotta banner
Giuseppe`Ohpe`Trotta

Giuseppe`Ohpe`Trotta

@Giutro

I'm a constant seeker and maker of troubles | InfoSec | Shortcut maniac | Virtualization junkie | Puzzles addicted

IT Katılım Şubat 2010
394 Takip Edilen1.4K Takipçiler
Giuseppe`Ohpe`Trotta retweetledi
Nemesis Breach and Attack Simulation
During @offensive_con our @marver presented his research on security aspects of embedded SIM cards. We are releasing SMShell, an SMS based implant proof of concept for Red Teaming that can evade out of band. Blogpost: persistent-security.net/post/introduci… GitHub: github.com/persistent-sec…
offensivecon@offensive_con

Embedded Threats: A Deep Dive into the Attack Surface and Security Implications of eSIM Technology by @marver now #OffensiveCon23

English
0
26
54
15.5K
Martin Kleppe
Martin Kleppe@aemkei·
Combing pixel typography with labyrinthic lines will create some confusing op art. I wonder if anyone can read this:
Martin Kleppe tweet media
English
21
18
188
0
Giuseppe`Ohpe`Trotta retweetledi
Antonio Cocomazzi
Antonio Cocomazzi@splinter_code·
RemotePotato0 Update: We can confirm that cross session activation works in the relay scenario too so you can get rid of session 0 limitation! Now the real fun will ensue 😈 cc @decoder_it
GIF
James Forshaw@tiraniddo

Inspired by @decoder_it and @splinter_code recent NTLM relay tricks I thought I'd check if it's possible to combine cross session and IStorage COM activation. The answer may surprise you! (not really) tiraniddo.dev/2021/04/standa…

English
3
46
119
0
Giuseppe`Ohpe`Trotta retweetledi
bettercap
bettercap@bettercap·
v2.31.0 is out! The number of fixes and new features is just too long to fit in a single screenshot :D github.com/bettercap/bett…
English
2
10
54
0
smaury
smaury@smaury92·
Caption this.
smaury tweet media
English
7
0
4
0
Giuseppe`Ohpe`Trotta retweetledi
Simone Margaritelli
Simone Margaritelli@evilsocket·
a tenacious kernel panic, happening in macOS network stack when bettercap tries to inject packets in the interface in monitor mode (read only works) ... happening on M1 as well ... can somebody at Apple fix this please? github.com/bettercap/bett…
Simone Margaritelli tweet media
English
2
19
45
0
Giuseppe`Ohpe`Trotta
Giuseppe`Ohpe`Trotta@Giutro·
@evilsocket What about using a custom PAM module to log all the attempts and eventually improve your dictionary
English
1
0
3
0
Simone Margaritelli
Simone Margaritelli@evilsocket·
to the people who spawned 8 different servers in the same Lithuanian subnet to try to bruteforce my SSH password: password based login is disabled, I only login with my private key, save your money. yw
English
11
8
194
0
Giuseppe`Ohpe`Trotta retweetledi
antisnatchor
antisnatchor@antisnatchor·
MuraenaTeam strikes again. Together with @Giutro we released the new Muraena and NecroBrowser. Lots of new code+features. Phishing and post-phishing automation at scale for all your needs. Office365 and GitHub examples added. More coming soon 🎣🪝😎 github.com/muraenateam
English
0
16
44
0
Giuseppe`Ohpe`Trotta retweetledi
@qwertyoruiop@nso.group
@[email protected]@qwertyoruiopz·
love offensive mobile security and are looking for a job? my new company is hiring! shoot us an email at jobs@dfsec.it
English
29
104
537
0
Simone Margaritelli
Simone Margaritelli@evilsocket·
today i spent about an hour doing this diagram as a tool to study, navigate and exercise daily on the fretboard ... maybe it can be useful to somebody else 👍 🎸 (set 4 is like set 3)
Simone Margaritelli tweet media
English
2
1
29
0
Giuseppe`Ohpe`Trotta retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
It has a few more prerequisites, but I finally managed to get a #Zerologon exploit working that doesn't rely on resetting passwords to exploit. Use the printerbug to make DC1 connect to you, then with lots of magic relay that to DC2 directly to DRSUAPI to DCSync 😁
Dirk-jan tweet media
English
27
552
1.3K
0
Giuseppe`Ohpe`Trotta retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
There seems to be quite some questions and confusion about the impact of exploiting Zerologon (CVE-2020-1472) on the environment. So here's a thread 👇
English
5
521
1K
0