XiaoliChan

1.1K posts

XiaoliChan banner
XiaoliChan

XiaoliChan

@Memory_before

Hey👋 , XiaoliChan is here

Katılım Ocak 2017
459 Takip Edilen306 Takipçiler
XiaoliChan retweetledi
Phith0n
Phith0n@phithon_xg·
Ghost Bits is a brilliant research: i.blackhat.com/Asia-26/Presen… Now you can reproduce CVE-2025-41242 in Vulhub, Spring/Jetty Path traversal caused by Ghost Bits: github.com/vulhub/vulhub/… This issue exists in spring-boot-starter-jetty <= 3.2.4 with zero configuration
Phith0n tweet mediaPhith0n tweet media
English
3
76
298
30.7K
XiaoliChan retweetledi
Haidar
Haidar@haider_kabibo·
So here is new local privilege escalation zero-day I discovered, not patched yet too :). In simple terms, if you have a service like RDP that exposes an RPC server, there many system services running as SYSTEM connect to it as RPC clients. If that service is turned off (RDP is off by default), it seems that any other process in Windows can expose the same RPC server using the same endpoint. Now all the RPC calls from that SYSTEM processes will come to this fake server and If the process that deployed the server has SeImpersonatePrivilege, it can escalate to SYSTEM by impersonate the RPC client. In the white paper below, I describe five exploit paths you can abuse. However it's architecture problem and maybe there are more. It's Not A Potato securelist.com/phantomrpc-rpc…
English
16
164
789
49.5K
XiaoliChan retweetledi
BriPwn
BriPwn@BriPwn·
Your EDR just coerced itself. 🫠 Drop a crafted LNK → MsSense.exe makes a CreateFile call → machine account hands over its Net-NTLMv2 hash over WebDAV → relay to LDAP → Shadow Credentials or RBCD. No user interaction. No exotic exploit. Just vibes and a shortcut file. If you're running Microsoft Defender for Endpoint, this one is literally about you. 👀 Full attack + detection breakdown 👇 youtu.be/30Qiq_Gt_bA #purpleteam #MDE #NTLMcoercion #detectionengineering
YouTube video
YouTube
English
7
95
425
34.7K
XiaoliChan retweetledi
MDSec
MDSec@MDSecLabs·
Our latest post on the blog details a Windows EoP courtesy of @filip_dragovic... "Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM" - mdsec.co.uk/2026/02/total-…
English
0
88
224
34.9K
XiaoliChan retweetledi
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
Stuck Without Coercion options? Why not just Coerce MDE? @Sniffler/stuck-without-coercion-options-why-not-just-coerce-mde-aecc23b43b66" target="_blank" rel="nofollow noopener">medium.com/@Sniffler/stuc…
English
2
30
107
10.1K
XiaoliChan retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
Forgot to post it, but the recording of my Black Hat talk was released last week. If you're interested in all the hybrid AD attack surface you never knew about, give it a watch: youtu.be/rzfAutv6sB8?si…
YouTube video
YouTube
English
2
110
379
28.7K
XiaoliChan retweetledi
Silky
Silky@S1lky_1337·
Dropping a new article. It's about a new local privilege escalation technique that becomes viable when a writable system path is present. Yet another technique. It uses Windows Audio for escalation and doesn't require system reboots. @S.1.l.k.y/abusing-windows-audio-for-local-privilege-escalation-1d59440116cb?postPublishedType=repub" target="_blank" rel="nofollow noopener">medium.com/@S.1.l.k.y/abu…
English
4
147
553
48.4K
XiaoliChan retweetledi
Andrea P
Andrea P@decoder_it·
Lots of recent posts on NTLM reflection → AD compromise. To be clear: real fix is CVE-2025-54918, not CVE-2025-33073. Until Oct 2025, any user could own a 2025 domain if DCs ran Print Spooler. shorturl.at/4WpRh
English
1
55
195
12.4K
XiaoliChan retweetledi
Andrea P
Andrea P@decoder_it·
Blog post about my recent CVE-2025-58726, aka “The Ghost Reflection” is out, read it here: semperis.com/blog/exploitin… 🙃
English
3
90
182
16.8K
XiaoliChan retweetledi
SpecterOps
SpecterOps@SpecterOps·
SCCM admins: review your roles. MSSQL admins: review ALTER ANY LOGIN exposure. @_Mayyhem details CVE-2025-47179 & CVE-2025-49758 and how these escalations can be identified through graph analysis. Check out his blog post for more! ghst.ly/49Fj4fM
English
0
34
81
5.3K
XiaoliChan retweetledi
n00py
n00py@n00py1·
NTLM reflection attacks can be used to compromise Active Directory domains even with SMB signing if systems aren’t fully patched depthsecurity.com/blog/using-ntl…
English
4
117
372
24K
XiaoliChan retweetledi
0xedh
0xedh@0xedh·
Spent some time porting DumpGuard to C as a BOF. Abuses Remote Credential Guard to pull NTLMv1 hashes without going near LSASS or needing admin. Shoutout to @bytewreck for the original research. github.com/0xedh/dumpguar…
GIF
English
1
112
342
16.6K
XiaoliChan retweetledi
TrustedSec
TrustedSec@TrustedSec·
Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services. In our new blog, @freefirex2 breaks down the types of service triggers that exist and how they can be activated with little to no code required. trustedsec.com/blog/theres-mo…
English
2
59
158
56.4K
XiaoliChan retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
We suggest assigning such vulnerable templates the new ESC number 17 (ESC17) to help identify and mitigate these risks. You can read our blog post here: blog.digitrace.de/2026/01/using-… 2/2🧵
English
2
69
191
12.2K