USB

97 posts

USB

USB

@Janrdzz

cybersecurity

::1 Katılım Ocak 2018
117 Takip Edilen4 Takipçiler
USB retweetledi
mthcht
mthcht@mthcht2·
👁️ LOLC2 Collection of C2 frameworks abusing legitimate services to evade detection Major update: new projects tested, enriched data, and deeper insights. site: lolc2.github.io github: github.com/lolc2/lolc2.gi…
English
0
24
101
8.1K
USB retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Collecting ADCS data with NetExec🔥 Thanks to the addition of CertiHound, developed and implemented by 0x0Trace, we can now collect ADCS data using the --bloodhound collector of NetExec. As before, the data is exported as JSON files that can be imported directly into BloodHound.
Alex Neff tweet media
English
2
66
270
10.4K
USB retweetledi
BriPwn
BriPwn@BriPwn·
MOTW is supposed to warn you when a downloaded file is dangerous. What if the archive chain kills it before Windows ever gets the chance? 🚨 CAB → TAR → TAR → 7-Zip = no Zone.Identifier, no SmartScreen, no warning. Just execution. Full attack + detection breakdown in the latest Weekly Purple Team 👇 youtu.be/pQxiPwGTBL8 Shoutout to @merterpreter for finding this one 🙏 #purpleteam #MOTW #detectionengineering #cybersecurity
YouTube video
YouTube
English
2
21
76
6.1K
USB retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ CRITICAL: Ubiquiti UniFi Network Application vulnerabilities were just disclosed CVE-2026-22557 CVSS 10.0 Remote path traversal vulnerability allowing an attacker to access and manipulate files, leading to account takeover. No authentication required. CVE-2026-22558 — CVSS 7.7 Authenticated NoSQL Injection allowing privilege escalation.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
42
334
2.1K
302.1K
USB retweetledi
Alex Plaskett
Alex Plaskett@alexjplaskett·
An analysis of CVE-2026-21236 - A heap based buffer overflow in the Microsoft Windows Kernel afd.sys - was just published by @ASN_Sinanju_06S a recent secondment with my team EDG! Nice work for her first triage of a kernel memory corruption bug! nccgroup.com/research/vulne…
English
3
63
229
15.8K
USB retweetledi
Carlos Vieira (lynx)
Carlos Vieira (lynx)@carlos_crowsec·
CVE-2026-25769: Wazuh Post-Auth RCE Our team discovered an insecure deserialization vulnerability in the Wazuh Cluster that enables remote command execution via a worker node, potentially leading to full cluster compromise. CVSS: 9.1 (authentication required) Wazuh - Security Advisories: github.com/wazuh/wazuh/se… PoC: github.com/hakaioffsec/CV… Blog: hakaisecurity.io/cve-2026-25769…
Hakai Offsec@HakaiOffsec

In this research, Hakai Security Research Team has identified a critical Remote Code Execution (RCE) vulnerability in Wazuh versions up to 4.14.1 that allows arbitrary command execution on the master node through insecure deserialization in the cluster communication protocol. Written by Texugo hakaisecurity.io/cve-2026-25769…

English
2
44
148
17.9K
USB retweetledi
Philip Elder
Philip Elder@MPECSInc·
ACTIVE DIRECTORY: _msdcs STUB ZONE! _msdcs STUB ZONE! _msdcs STUB ZONE! Always make sure those NS records _are up to date_ before making _ANY_ changes in Active Directory such as introducing a new DC!!! It's a manual thing unfortunately. :-( Keep an eye on that _msdcs_ stub zone under Domain.Local!
Philip Elder tweet media
English
2
23
161
21.9K
USB retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
Forgot to post it, but the recording of my Black Hat talk was released last week. If you're interested in all the hybrid AD attack surface you never knew about, give it a watch: youtu.be/rzfAutv6sB8?si…
YouTube video
YouTube
English
2
109
378
28.1K
USB retweetledi
kqx
kqx@kqx_io·
The fox caught fire??? New blog post very soon at kqx.io 6b2f0f9f754952d956cab1a6922c920664d2636c192db4db614866345369a888
English
1
10
87
22.3K
USB retweetledi
Marc-André Moreau
Marc-André Moreau@awakecoding·
Do you want quick and easy PowerShell Remoting over SSH that you can *automate* with password authentication? Public key authentication is obviously better, but the initial configuration is often done using password-based authentication. Install-Module AwakeCoding.PSRemoting Enjoy!
Marc-André Moreau tweet media
English
1
12
70
5.7K
USB retweetledi
USB retweetledi
Aurélien Chalot
Aurélien Chalot@Defte_·
Anyone know if Microsoft silently patch the Shadow Creds attack recently ? Looks like a computer object cannot write its own attribute anymore :D
English
11
30
133
43K
USB retweetledi
Praetorian
Praetorian@praetorianlabs·
Having trouble with your beacons surviving reboots on red teams? Our new open-source tool, Swarmer, lets you take advantage of ancient Windows registry trickery to write new startup keys without EDR ever detecting the write operations. Check out the blog post about it here: hubs.ly/Q040pxyB0
English
0
20
78
5.7K
Logan Goins
Logan Goins@_logangoins·
@Janrdzz @sekurlsa_pw In addition to that, setting LDAPS channel binding to "When supported" could give you a lot more flexibility in your environment. The Windows SMB client always adds the CBT, meaning that your custom infra would still be able to connect to LDAPS without binding AND prevent relays
English
1
0
2
50
USB
USB@Janrdzz·
@sekurlsa_pw @_logangoins My apologies for my ignorance. If you have more than a Domain Controller, can you prevent LDAP Relaying against all DCs with just one DC with LDAP Signing and Channel Binding enabled and enforced?
English
2
0
2
42
🕳
🕳@sekurlsa_pw·
@_logangoins 😅, yeah you are right. Let me RT it with the right recommendations.
English
1
0
2
131
USB retweetledi
Mehmet Ergene 🔸
Mehmet Ergene 🔸@Cyb3rMonk·
🤦‍♂️ One KQL to Detect Just One option. #AISlop
Mehmet Ergene 🔸 tweet media
English
8
7
42
7.1K
USB retweetledi
watchTowr
watchTowr@watchtowrcyber·
And, we're back - analyzing CVE-2025-52691, a pre-auth RCE in SmarterTools SmarterMail mail server solution. Speak soon (:^)) and enjoy.. labs.watchtowr.com/do-smart-peopl…
English
5
54
193
37.4K