Jim Sykora

19K posts

Jim Sykora banner
Jim Sykora

Jim Sykora

@JimSycurity

I enjoy security, technology, learning, books, & the great outdoors. Trying to be human & kind. Opinions = mine. He/Him/Hän

Minnesota, USA Katılım Mayıs 2019
2K Takip Edilen2.6K Takipçiler
Jim Sykora retweetledi
r0BIT
r0BIT@0xr0BIT·
shipping: WinSSHound maps SSH access in AD as BloodHound paths. because Windows OpenSSH cheerfully ignores your "Deny Logon" GPOs (pre-2025) and on a default sshd_config every Authenticated User in the domain can walk right in. Why? Because Microsoft. github.com/1r0BIT/WinSSHo…
English
0
67
202
11.7K
Jim Sykora
Jim Sykora@JimSycurity·
@d0tslash I keep a couple stacks of beef jerky in my pocket. Never go hungry and dogs love me.
English
0
0
1
80
KF
KF@d0tslash·
The lady at the taco shop told me today she notices I never wear necklaces or jewelry. I told her “yeah, I stack silver instead”, and pulled my pocket silver out. In the most adorable way she goes “omg it’s so heavy!” 😂 youtube.com/watch?v=8RxpRD…
YouTube video
YouTube
English
1
0
4
549
Jim Sykora retweetledi
SpecterOps
SpecterOps@SpecterOps·
In his latest research, @_xpn_ tears apart VS Code Dev Tunnels and finds a C2 framework underneath — REST → WebSocket → SSH → MsgPack RPC, remote exec, file ops. Find the Ouroboros tool and protocol breakdown at the link! 👇 ghst.ly/4mZ4arb
English
0
52
158
8.5K
Jim Sykora retweetledi
TrustedSec
TrustedSec@TrustedSec·
How well do you really understand what's happening inside a #Kerberos exchange? In our latest blog, @codewhisperer84 breaks down the full authentication flow and demonstrates how to interact with every stage using the #Titanis toolset. Read it now! hubs.la/Q04dcFgv0
English
3
74
183
11.9K
Jim Sykora retweetledi
Synacktiv
Synacktiv@Synacktiv·
This second blogpost concludes @yaumn_'s research on #Windows authentication reflection. He discloses the new Kerberos authentication coercion technique he discovered to remotely compromise Windows systems 💥 A little bonus is even included at the end 👀👇 synacktiv.com/en/publication…
English
2
57
127
11.1K
Jim Sykora
Jim Sykora@JimSycurity·
@_subTee I trace that exact moment to the point in time where I thought security was some policies and risk assessments crap to making my network a hostile place for attackers.
English
0
0
1
13
Jim Sykora retweetledi
Logan Goins
Logan Goins@_logangoins·
Just added krb5 auth over ADWS in my tool SOAPy. I noticed since SOAPy released 2 yrs ago with the first ADWS python code nobody had implemented krb5 auth in python. Check it out here, and stay tuned for an upcoming blog post + big release 👀 github.com/logangoins/SOA…
English
1
39
121
9.1K
Jim Sykora retweetledi
SpecterOps
SpecterOps@SpecterOps·
ICYMI 👀 @_Mayyhem & Javier Azofra Ovejero shipped MSSQLHound in Go. Same lab, 17 min → under 17 sec Cross-platform, SOCKS, Kerberos/NT hash auth, + 37 BloodHound edges with pathfinding. If MSSQL isn't in your attack paths yet, it should be. ghst.ly/4cUKgtJ
English
0
5
21
1.8K
Jim Sykora retweetledi
codewhisperer84
codewhisperer84@codewhisperer84·
New Titanis release => github.com/trustedsec/Tit… The new Dsrep lets you dump secrets from AD, Ldap supports queries for DNS records and timestamp conversions, Dcom supports dotted-property notation, along with other enhancements and fixes.
English
2
30
87
5.8K
Jim Sykora
Jim Sykora@JimSycurity·
@IAMERICAbooted @atheosblazezero @SpecterOps It's definitely not that easy. Properly modeling of the attack graph for all pertinent scenarios, accounting for important edge cases without attempting to account for all edge cases, and thoroughly validating the results is challenging and not quick.
English
1
0
1
50
EZ
EZ@IAMERICAbooted·
@atheosblazezero @SpecterOps I dont think its that easy. The goal would be how you get from prompt to access to other systems and ultimately co trol the entperise via prompt when that was never intended.
English
2
0
0
72
EZ
EZ@IAMERICAbooted·
Hey @SpecterOps , we need BloodHound for agentic systems :p
English
2
0
19
1.7K
Bryan Dam
Bryan Dam@bdam555·
Achievement Unlocked: presenting at a user group with my fly open. <facepalm> #OldManThings
English
3
0
20
719
Jim Sykora retweetledi
Bad Sector Labs
Bad Sector Labs@badsectorlabs·
🏟️ Ludus launched 2 years ago and the community embraced and extended it with write-ups, roles, configs, and environments. We're excited to see what you build with Ludus 2! (1/4)
English
3
21
82
8.3K
Jim Sykora retweetledi
codewhisperer84
codewhisperer84@codewhisperer84·
Titanis v0.9.205 released => github.com/trustedsec/Tit… Major enhancements include an LDAP client, Kerberos PKINIT across the tool set, registry tool (Reg), and Sddl tool for describing/converting SDDL.
English
1
19
92
5.9K
Jim Sykora retweetledi
SpecterOps
SpecterOps@SpecterOps·
Right-click. Click an action. What could go wrong? At #Insomnihack, @podalirius_ will reveal two command injection vulnerabilities hidden inside Windows context menus, affecting both Windows 10 and 11. Don't miss it! ghst.ly/47adSA1
SpecterOps tweet media
English
0
15
47
3.6K
Jim Sykora
Jim Sykora@JimSycurity·
@curi0usJack Last month I gave a talk about abusing backup privileges with Titanis along w/ a PoSH module I released that builds on those capabilities. I talked about a TrustedSec tool at WWHF, a con BHIS founded. I work at SpecterOps. I hung out with my Red Siege buds. I'd do it again.
English
1
0
4
166
Rasta Mouse
Rasta Mouse@_RastaMouse·
Did someone fork BloodHound to EpsteinHound?
Rasta Mouse tweet media
English
8
7
123
9.4K