Andrea Santese

480 posts

Andrea Santese banner
Andrea Santese

Andrea Santese

@Medu554

Red Team Operator | OSCE | OSCP | OSWP

[::/0] Katılım Şubat 2012
750 Takip Edilen811 Takipçiler
pfiatde
pfiatde@pfiatde·
Obscurities with MS Teams MS Teams does not verify most of the messages, which allows to do some strange things. Strangest behaviour is the crosstenant fileshare, two days late to the party but as the draft was ready releasing anyway. But thats not all :) badoption.eu/blog/2023/06/2…
pfiatde tweet media
English
2
16
38
7.2K
Zuk
Zuk@ihackbanme·
How to avoid this WhatsApp account takeover? 1. Make sure that your voicemail pincode is not the default pincode. 2. Setup 2FA pincode on your WhatsApp
English
34
123
887
200.8K
Zuk
Zuk@ihackbanme·
The recent WhatsApp accounts takeover is simple and genius. This is how it works: You're sleeping. A "hacker" tries to login to your account via WhatsApp. You get a text message with a pincode that says "Do not share this". You don't share it, yet you still get hacked. How?
English
108
1.9K
4.7K
1.3M
Andrea Santese
Andrea Santese@Medu554·
After a bit of research it came out that it's possible to leverage Teams functionalities for a better phishing scenario. The idea is using it as an alternative way of initial access. Hope it can help some red team guys out there! posts.inthecyber.com/leveraging-mic…
English
0
0
3
0
Andrea Santese
Andrea Santese@Medu554·
@ivane7227 @mrd0x Well done Ivan, to you and to the other guys you work with at Universita del Salento. I've always said that "Nui simu li meju" 💪
English
0
0
1
0
Andrea Santese retweetledi
Axel Souchet
Axel Souchet@0vercl0k·
I've built a PoC for CVE-2021-31166 the "HTTP Protocol Stack Remote Code Execution Vulnerability": github.com/0vercl0k/CVE-2… 🔥🔥
GIF
English
11
525
1.2K
0
Andrea Santese retweetledi
Alejandro G.
Alejandro G.@lockedbyte·
I developed a Remote Code Execution PoC exploit for the Exim Use-After-Free that was recently disclosed (as part of @qualys 21Nails advisory). Tested just on Exim 4.92. PoC available: github.com/lockedbyte/CVE…
Alejandro G. tweet media
English
6
298
791
0
Andrea Santese retweetledi
John Doe
John Doe@mitohormesis·
Just published a remote shellcode loader I've been working on to show why we shouldn't rely solely on real-time injection alerting. Writeup in a few days :) My C sucks so it's a "PoC". github.com/xinbailu/DripL…
English
1
54
164
0
Andrea Santese retweetledi
d3fp4r4m
d3fp4r4m@defparam·
Hey all! first blog post. Are the popular fuzzers just for binary exploitation? In this blog post I outline how you can find logic issues in web-related regular expressions using differential fuzzing. (spoiler: 29 lines of python using Google Atheris) defparam.medium.com/finding-issues…
English
1
86
200
0
Andrea Santese retweetledi
raptor
raptor@0xdea·
High-level approaches for finding vulnerabilities < a very well written vulnerability research primer written by @jackson_t in 2017 (but still 100% relevant today) jackson-t.ca/finding-vulner…
English
1
42
89
0
Andrea Santese retweetledi
chompie
chompie@chompie1337·
My first ever blog post: Anatomy of an Exploit: RCE CVE-2020-1350 #SIGRed. RCE PoC included, for research purposes. This was my first userland Windows heap exploit and I hope a deep dive into the process will help others. Patch or apply the workaround. graplsecurity.com/post/anatomy-o…
English
13
261
665
0
Andrea Santese retweetledi
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
A short post to address an exploit chain I did in last year. Both slides and YouTube video are online now - A Journey Combining Web Hacking and Binary Exploitation in Real World! blog.orange.tw/2021/02/a-jour…
English
6
296
750
0