Leo Tsaousis

506 posts

Leo Tsaousis banner
Leo Tsaousis

Leo Tsaousis

@LAripping

Senior Security Consultant @ Reversec (fka @withconsulting / MWR). Talks mostly about security. As Rino put it, sometimes maybe good sometimes maybe shit

Katılım Eylül 2017
678 Takip Edilen586 Takipçiler
Leo Tsaousis
Leo Tsaousis@LAripping·
@__noided Indeed, VAPI like Twilio and the ElevenLabs telephony feature were nice and simple. Just didnt seem possible to spoof caller ID (and leverage the legit CNAM) which I needed for my scenario (business impersonation) as it increased perceived legitimacy from before even saying Hi
English
0
0
1
52
noid
noid@__noided·
@LAripping Cool post. For my simulations I found it easier to skip the whole PBX setup and just use an all-in-one provider like VAPI. They even have ElevenLabs models built in, so one less thing to wire up.
English
1
0
1
52
Leo Tsaousis
Leo Tsaousis@LAripping·
New blog post out: We built an AI Vishing system in 7 days to show that Scattered Spider's helpdesk campaigns can be automated at mass scale, easily. (clip included 🔊) labs.reversec.com/posts/2026/02/…
English
3
13
36
3.4K
Adam Chester 🏴‍☠️
@_RastaMouse @Lauratobin1 I mean, if I lived in Greece I’d be dancing over the weather too… “Drizzle in Manchester with winds of up to 50mph” set to Darude - Sandstorm doesn’t have the same vibe 🤣
English
1
0
2
287
Leo Tsaousis
Leo Tsaousis@LAripping·
My brilliant colleague Sharan @Tagging_SP has just published his research on #AzureArc: - 4 Privilege Escalation CVEs - complete with exploit scripts and PoC videos - earning him a Most Valuable Researcher (MVR) from @msftsecresponse There is A LOT in there
Leo Tsaousis tweet media
English
1
0
6
156
Leo Tsaousis
Leo Tsaousis@LAripping·
@0xAggelos People still ask me where I'm from! so I guess still room for improvement 😄
English
0
0
1
29
₳ggelos
₳ggelos@0xAggelos·
@LAripping Brother your accent is completely british right now 😃😃
English
1
0
1
26
Leo Tsaousis
Leo Tsaousis@LAripping·
@coolestcatiknow Not a defender but having worked with SOCs in ATT&CK-based purple teams, I think Option 1 captures more about the gist of the actual attacker action, -the How- and therefore makes rule writing more targeted. Will be clearer when to tag in TI reports too. Happy to DM for more 🙂
English
0
0
0
3
Cat
Cat@coolestcatiknow·
Disclaimer: This is exploratory work from me — this may or may not get implemented. Let me know what makes the most sense. Reply 1 (usage-focused) or 2 (account-type). Context and defender perspectives especially welcome.
English
1
0
0
62
Leo Tsaousis
Leo Tsaousis@LAripping·
An entire generation of Greek hackers dipped their toes in appsec trying to hack (and defend) eClass in @sol3gga's iconic "Web Wars" exercise 4 This brought back some memories... Shout out to all the @dit_uoa alumni out there (cc @0xAggelos)
twelvesec@twelvesec

This #vulnerability was identified by TwelveSec Lab #Cybersecurity researchers George Tyritidis and Edward Pasenidis. TwelveSec Lab is dedicated to supporting the #opensource community through active contributions and #security research. #Infosec #CVE buff.ly/USeP70r

English
0
0
1
179
Leo Tsaousis
Leo Tsaousis@LAripping·
@techspence Uncomfortable truth: it gets a bad reputation because noone's ever done baselining so they live with the fear it will impact users. Phased deployment too much effort
English
1
0
8
141
spencer
spencer@techspence·
Application control works, I don't think there's many who debate that. But part of the reason it gets a bad reputation is because of flawed deployments. Here's a few things to avoid: 1. Overly permissive path rules (e.g. wildcard paths) 2. Overly permissive publisher rules (e.g. everything from a publisher is allowed) 3. Using only hash rules 4. Allowing CMD/PowerShell/PowerShell_ISE/Terminal
English
5
2
31
5.8K
sudox
sudox@kmcnam1·
sudox tweet media
ZXX
2
1
18
930
Leo Tsaousis
Leo Tsaousis@LAripping·
@BBCiPlayer has this new docuseries telling the stories of great empires through artefacts in the British Museum. Unfortunately, they "forgot" that other great empire which decorates like half the British Museum at the moment... 🤔
Leo Tsaousis tweet media
English
0
0
1
47
Leo Tsaousis
Leo Tsaousis@LAripping·
2️⃣ The other way around: If you control SharePoint, what other SaaS'es can you compromise, via detours to endpoints? (of their admins)
English
1
0
0
89
Leo Tsaousis
Leo Tsaousis@LAripping·
Interesting Project 💡 I wrote about clever use of PowerShell Profiles to pivot from cloud-to-endpoint a while ago labs.reversec.com/posts/2025/07/… There's probably many ways to combine the two in Attack Path Mapping exercises: 🧵
Panos Gkatziroulis 🦄@ipurple

ProfileHound - a post-escalation tool to help find and achieve red-teaming objectives by locating domain user profiles on machines. It uses the BloodHound OpenGraph format to build a new edge called HasUserProfile github.com/m4lwhere/profi…

English
1
0
2
192