Marc Smeets

23.8K posts

Marc Smeets banner
Marc Smeets

Marc Smeets

@MarcOverIP

Does a thing or two with red teaming @OutflankNL | part time race and drift car instructor

Tweets in NL & EN Katılım Temmuz 2009
493 Takip Edilen4.7K Takipçiler
Marc Smeets
Marc Smeets@MarcOverIP·
🖕Putin
Volodymyr Zelenskyy / Володимир Зеленський@ZelenskyyUa

As of now, already 5 people have been reported killed in Kyiv as a result of last night’s Russian attack. My condolences to their families and loved ones. Around 40 people have been injured in the capital, and another 7 in the Kyiv region. There are already 28 injured in Kharkiv. And two people have been injured in the Odesa region. In total, 180 sites have been damaged across the country, including more than 50 ordinary residential buildings. A search and rescue operation is still ongoing in Kyiv’s Darnytskyi district. Efforts continue to find people under the rubble. More than 10 people are reported missing. All necessary services are also operating in the Obolonskyi district. And recovery efforts are underway after Russian strikes in the Poltava region. Overall, more than 750 personnel of the State Emergency Service of Ukraine and nearly 750 police officers have already been engaged across the country to eliminate the consequences of the attack. I am grateful to all who help the rescuers and the police Also, earlier today, during a humanitarian mission in Kherson, the Russians twice attacked a vehicle of the UN Office for the Coordination of Humanitarian Affairs with FPV drones, and the Russians could not have been unaware of which vehicle they were targeting. The Head of the UN Office for the Coordination of Humanitarian Affairs and eight other staff members were inside. Fortunately, no one was injured. The mission personnel have been evacuated. Even so, a significant number of missiles and drones were shot down during these attacks – the overall interception rate is over 93%. Of course, it needs to be higher. And of course, the most difficult challenge is defending against ballistic missiles. I thank everyone who is helping us with this. There must be a just response to all these strikes. And pressure on Moscow must be such that they feel the consequences of their terror there. It is important that global sanctions against Russia remain in place. Russia’s accountability for this war, and our sanctions pressure, must work at full strength. And it is also very important that the world does not stay silent about this terror and stands with Ukraine.

English
0
0
1
187
Marc Smeets retweetledi
mgeeky | Mariusz Banach
35+ non-Office file formats fully weaponized & obfuscated by the OST Builder - coming soon! So many ways to run your shellcodes. This release becomes my hello world to the OST family 👋
Outflank@OutflankNL

New release: kicking off Red Macros Factory integration into OST by @OutflankNL researcher @mariuszbit! ⚙️ Builder tool now ships with better script payload gen, obfuscation, guardrails, LNK tradecraft, and new conversion paths. More formats and payload shenanigans coming soon!

English
4
13
118
8.3K
Marc Smeets
Marc Smeets@MarcOverIP·
Red teaming && racing, two of my main interests, now together in 1 event! Come and join me on May 27 at Racesquare Utrecht to hear me talk about red team tooling, and to jump in a virtual F1 car for a race. More info on this *free* event: the-s-unit.nl/fortra-event/
English
0
1
4
226
Marc Smeets retweetledi
Mattijs RCX
Mattijs RCX@alcyonsecurity·
How to run a bug bounty program on the cheap: 1. Receive a vulnerability report and sit on it for a week. Do NOT triage yet. 2. Wait for another researcher reporting the same issue 3. Triage both reports as duplicate 4. Profit. Doubly validated bug at zero cost!!! #BugBounty
English
1
2
5
604
Marc Smeets retweetledi
impulsive
impulsive@weezerOSINT·
This is Microsoft's 5th WinRE BitLocker bypass in 3 years. CVE-2022-41099, CVE-2023-21563, CVE-2024-20666, BitUnlocker, now YellowKey
English
4
14
232
19.7K
Marc Smeets retweetledi
impulsive
impulsive@weezerOSINT·
How it works: 1. Recovery tools look for a config file called RecoverySimulation.ini on the OS drive 2. If Active=Yes, it enables "test mode" for the recovery tools 3. Test mode unlocks your BitLocker drive but a flag called FailRelock tells it to skip relocking 4. cmd.exe spawns with full access to your "encrypted" drive
impulsive tweet media
English
5
25
229
23.2K
Marc Smeets retweetledi
impulsive
impulsive@weezerOSINT·
I just reverse engineered the YellowKey BitLocker bypass Microsoft shipped code that checks for a flag called "FailRelock" in every Windows 11 recovery image. When it's set to 1, after recovery unlocks your BitLocker drive, it never relocks it. All you need is a USB stick. This code only exists in the recovery environment. Not in normal Windows. They left an entire debug testing framework in production.
impulsive tweet media
impulsive@weezerOSINT

The userland demon is about to drop again.

English
35
435
2.6K
265.4K
Marc Smeets retweetledi
Haifei Li
Haifei Li@HaifeiLi·
CVE-2026-40361 (msrc.microsoft.com/update-guide/v…), patched today, is a critical 0-click UAF/RCE bug in Microsoft Outlook that I discovered back in Q1. You definitely want to patch this sooner rather than later. The danger of such 0-click bugs in Outlook is that they are triggered as soon as the victim reads or previews the email - no clicking of links or attachments is required. Since the bugs reside in Outlook's email rendering engine, it is difficult to mitigate or block (though specifically setting Outlook to render emails only in plain text format is a valid mitigation). Fun fact about the discovery: after the discovery of the #BadWinmail bug a decade ago, I wanted to run an experiment in Q1 to see if I could find another 0-click RCE in Outlook. The result? It wasn't easy — I even built a dedicated system for it — but I eventually found this one. :) To understand why such bugs are so critical, check out the #BadWinmail video demo I released a decade ago: youtube.com/watch?v=ngWVbc…. They share the same attack vector (though #BadWinmail was a working exploit, while this one was a PoC). Essentially, anyone could compromise a CEO or CFO just by sending an email. The threat perfectly bypasses enterprise firewalls and is delivered directly to the inbox. Furthermore, note that Outlook (Classic) lacks an application sandbox, making this attack vector even more dangerous. Regarding defense and detection: if you are concerned about Outlook 0-click 0-days, my EXPMON system (pub.expmon.com) provides cutting-edge detection against such advanced threats. When I designed the original system in 2020/2021, I developed this functionality specifically considering the impact of #BadWinmail. The system accepts .eml or .msg formats, and email samples are deeply tested within an Outlook sandbox. For enterprise users, emails can be "dumped" from the mail server, and EXPMON can be deployed in a private network. Contact me for more details. P.S. I just noted that the title of the Microsoft Security Update (msrc.microsoft.com/update-guide/v…) lists this as a Microsoft Word bug, which may or may not be entirely accurate. I demonstrated this bug to MSRC by showing that it works in a real, live Outlook + Exchange Server environment. My bet is that because the bug resides in wwlib.dll — a shared DLL used heavily by both Outlook and Word — it likely affects both Outlook (via email) and Word (via a document file). Regardless of the title, it is a genuine Outlook 0-click RCE. #CVE-2026-40361 #PatchTuesday #Outlook #0click #EmailSecurity #EnterpriseSecurity #expmon #ThreatIntel #ExploitDetection
YouTube video
YouTube
English
6
86
421
56.3K
Steve S.
Steve S.@0xTriboulet·
I want two features for my iPhone: 1. Turn off all notifications, all the time, from all apps, always, silence only (no badges, banners, etc). 2. Turn on all sounds, flashing, vibration, etc from any application if the notification originates from my wife.
English
2
0
4
598
Autowelt
Autowelt@Autoweltmedia·
BMW 125i, E82. Compact size and short wheelbase. N52 3.0 L naturally aspirated inline-six with 215 hp. On paper, it wasn’t that quick. But the throttle response, engine sound and rear-wheel drive gave it all an experience of a small sportscar. Especially from inside the cabin, its a proper 6 speed manual. It somehow felt quicker than the numbers suggested. Because everything about the car amplified speed, the looks, the sound of the 6 cylinder, shifting gears.
English
3
7
123
6.4K
Marc Smeets retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 How the TanStack npm attack actually happened: 1. Attacker opened a normal-looking pull request (#7378) on the TanStack repo. 2. GitHub automatically ran CI tests on that PR. 3. Code inside the PR stole the workflow's GitHub Actions Cache write token during the test run. 4. The attacker used that token to plant poisoned files in the shared build cache. The PR could be closed afterwards. The poisoned cache stays. 5. The official release workflow later pulled from the cache, baked the malicious files into the build, and signed and published 84 malicious package versions to npm.
Adnan Khan@adnanthekhan

This attack leveraged GitHub Actions Cache Poisoning. Payload deployed here: github.com/TanStack/route… It looks like it detonated here: #step:26:2" target="_blank" rel="nofollow noopener">github.com/TanStack/route…

English
61
574
4.7K
800.8K
Marc Smeets retweetledi
Socket
Socket@SocketSecurity·
🚨 BREAKING: 84 TanStack npm packages were compromised in an ongoing Mini Shai-Hulud supply chain attack, adding suspected CI credential-stealing malware. Socket flagged every malicious version within six minutes of publication. This is a developing story.
Socket tweet media
English
72
371
1.6K
818.9K
Marc Smeets retweetledi
Sovey
Sovey@SoveyX·
I officially reached the end of the Internet. Don’t ask me what I searched to find this.
Sovey tweet media
English
946
1.4K
9.1K
883.5K
Marc Smeets retweetledi
Stijn de Vreede 🍿
Stijn de Vreede 🍿@VrijndeSteede·
DigiD nadat het Amerikaans wordt.
Stijn de Vreede 🍿 tweet media
Nederlands
34
231
4.4K
82.4K
Rad
Rad@rad9800·
N many years after working in cyber ...
Rad tweet media
English
2
0
15
2.9K
Marc Smeets
Marc Smeets@MarcOverIP·
@atoonk 🙈 no idea why this is still on my bookshelf
Marc Smeets tweet media
English
0
0
1
134
Andree Toonk
Andree Toonk@atoonk·
Cleaning up some stuff today. A bit of nostalgia 🤓Probably don’t need this anymore. Last time I opened it was well over a decade ago.
Andree Toonk tweet media
English
2
0
11
712