Justin Perdok

70 posts

Justin Perdok banner
Justin Perdok

Justin Perdok

@JustinPerdok

IT Geek, Ethical Hacker, DevOps Nut, PowerShell Fanatic and lover of beers🍻 @OrangeCyberNL / @sensepost, my tweets are my own.

Netherlands Katılım Şubat 2015
105 Takip Edilen208 Takipçiler
Justin Perdok retweetledi
vx-underground
vx-underground@vxunderground·
A sitcom that follows a group of friends, the up's and down's in the Russian ransomware cyber crime ecosystem, and their ultimate pursuit of love
English
22
195
1.5K
138.7K
Justin Perdok retweetledi
Orange Cyberdefense's SensePost Team
The RID500 Admin account doesn't benefit from Protected User Group restrictions. This is a MS WONTFIX & means you can authenticate as Admin using RC4 KRB or perform any KRB delegation attack if you impersonate the RID500 Admin. The latest find by @Defte_ sensepost.com/blog/2023/prot…
English
3
87
167
33.3K
Justin Perdok
Justin Perdok@JustinPerdok·
Mfw you get into a VPN, have access to a ton of VHDX's including DC's with a lowpriv user, but the damn the VPN is limited to a max of 355KB/s.
GIF
English
0
0
2
0
Justin Perdok retweetledi
Dnd Sesame Tweet
Dnd Sesame Tweet@DndSesame·
When the guy from IT has to come up and talk with accounting.
Dnd Sesame Tweet tweet media
English
28
447
2.6K
0
Justin Perdok retweetledi
Dominic White 👾
Dominic White 👾@singe·
We in ZA have nine positions open right now; pentesters, presales, IT, sales, sales admin. We're a great place to work (you can even ask people who left us), customers like us (85 NPS), we do fun work. DM me if you want to chat about a role. Full list at jobs.za.orangecyberdefense.com/jobs
English
1
9
19
0
Justin Perdok retweetledi
Cas van Cooten
Cas van Cooten@chvancooten·
Everyone likes a good hacking story right? I have just the thing for you. Let me tell you about that time I ‘accidentally’ hacked a four-story display next to one of the biggest highways in the Netherlands 👀 🧵
Cas van Cooten tweet media
English
17
99
810
0
Marcello
Marcello@byt3bl33d3r·
🥬🥬🥬🥬
Marcello tweet media
QME
2
0
20
0
Justin Perdok
Justin Perdok@JustinPerdok·
@felmoltor Yeh that dude is gonna sell you some of his fine leather jackets.
English
0
0
1
0
Justin Perdok
Justin Perdok@JustinPerdok·
@cnotin @cyb3rops But personally if I would run this in prod,and want realtime results, I'd probably rebuild those poc's into something more sophisticated.
English
1
0
0
0
Justin Perdok
Justin Perdok@JustinPerdok·
@cnotin @cyb3rops Thanks😁 no the poc's are designed to run on-demand since it's just intended as a showcase how you could monitor this by collecting known good configs. But there is nothing keeping you from setting up a scheduled task/while loop or w.e. with these scripts.
English
1
0
0
0
Clément Notin
Clément Notin@cnotin·
💡 Are you monitoring Active Directory #DCSync attacks using event ID 4662? 👆 Don't forget to ensure that the required SACL on domain root is enabled! It is, by default, but an attacker with privileges high enough for DCSync could also remove it... 🤔
Clément Notin tweet media
English
6
102
413
0
Justin Perdok
Justin Perdok@JustinPerdok·
@cnotin @cyb3rops You should be able to monitor this if you collect 'known good' sddls configurations and compare recent changes/current configs to them. Here's a very basic poc I build some time ago when I played around with monitoring ace changes. github.com/justin-p/Monit…
English
1
0
4
0
Clément Notin
Clément Notin@cnotin·
@cyb3rops For example, an AD monitoring solution is able to fetch and analyze changes in the nTSecurityDescriptor
English
1
0
4
0
Justin Perdok
Justin Perdok@JustinPerdok·
Took a while, but it's finally here😁 3226/7000
Justin Perdok tweet media
English
0
0
2
0