NotFound

5.5K posts

NotFound banner
NotFound

NotFound

@Notfound404__

-- Member of @HexpressoCTF -- ☕ https://t.co/Rat1YjeBMZ ☕GNU/Linux && bash|py addict 0x54726f6c6c2045766572797768657265

127.0.13.37 Katılım Temmuz 2012
864 Takip Edilen2.1K Takipçiler
Sabitlenmiş Tweet
NotFound
NotFound@Notfound404__·
If a website is protected by @CheckPointSW IPS "anti-SQLi" and mysql<=5 is running, you can easily bypass this by using "||" and "&&" instead of "OR" and "AND" which are blocked. Tested on the lastest version R80.20. #bugbountytip #bugbounty #pentest #payfornothing
English
2
92
146
0
NotFound retweetledi
Tib3rius
Tib3rius@0xTib3rius·
I am about to COMPLETELY disrupt the cybersecurity industry...💀💀💀 Presenting the Continuous Reasoning AI Pentester! Multiple AI agents running every security tool under the sun against your environment, at record speeds. Full pentests achieved in less than AN HOUR. Zero human input. One hundred percent success.
English
195
292
2.7K
248.4K
SaxX ¯\_(ツ)_/¯
SaxX ¯\_(ツ)_/¯@_SaxX_·
Rare image d'un analyste SOC face aux nombreux événements du SI
SaxX ¯\_(ツ)_/¯ tweet media
Français
2
8
45
5.9K
NotFound retweetledi
Logan Goins
Logan Goins@_logangoins·
I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…
English
7
170
435
33.2K
NotFound
NotFound@Notfound404__·
@penthium2 @rootme_org Sympa le "semaphore-like" version bash pour limiter le nombre d'exec en // !
Français
0
0
1
45
NotFound retweetledi
Yuval Gordon
Yuval Gordon@YuG0rd·
Many missed this on #BadSuccessor: it’s also a credential dumper. I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.
English
9
154
490
38.5K
NotFound retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
#BadSuccessor - a textbook example of why the security ecosystem is broken - A privilege escalation vuln in Windows Server 2025 AD (via dMSA) - Full domain compromise with default config - Microsoft was told, agreed it’s real, but rated it "moderate" - No patch, No fix - No code execution needed - No need to touch the DC - No RPC, no ntds.dit - Just a write to one attribute on an account you can create - Rubeus already supports dMSA abuse (since February) - Metasploit module is in the works Researchers published everything anyway. Because… "we respectfully disagree with Microsoft’s assessment". So yeah, let’s just drop an end-to-end domain takeover technique online to prove a point. To be fair, Windows Server 2025 isn’t widely deployed yet, so the real-world blast radius today is limited. But this isn’t about today - it’s about trust, process, and what happens when security decisions are driven by vendor priorities and researcher egos. What this tells me: 1. Microsoft either: - Can’t assess bugs anymore - Or stopped caring about on-prem AD completely (because Entra ID is what they want to sell) 2. And the offensive sec crowd? - They knew this would hit hard - But chose to burn the world anyway - Because their urge to be right > everyone else’s security In the end, both sides look bad. Microsoft, for being dysfunctional or apathetic Researchers, for chasing clout over coordinated disclosure Congrats. In a rare show of unity, both sides managed to screw this up. Blog: akamai.com/blog/security-… LinkedIn: linkedin.com/feed/update/ur… Metasploit issue: github.com/rapid7/metaspl…
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
34
144
678
154.9K
NotFound retweetledi
LaurieWired
LaurieWired@lauriewired·
Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local...) can Reverse Engineer malware for you. With the right prompting, it automates a *ton* of tedious tasks. One-shot markups of entire binaries with just a click. Open source, on Github now.
English
82
788
4.4K
283.6K
NotFound retweetledi
Orange Cyberdefense's SensePost Team
Attacks against AD CS are de rigueur these days, but sometimes a working attack doesn’t work somewhere else, and the inscrutable error messages are no help. Jacques replicated the most infuriating and explains what’s happening under the hood in this post sensepost.com/blog/2025/divi…
Orange Cyberdefense's SensePost Team tweet media
English
1
110
317
37.1K
NotFound
NotFound@Notfound404__·
@_SaxX_ Attention avec l'utilisation de "diskpart" et son équivalent Linux "dd" , n'est-ce pas 👀
Français
1
0
3
2.9K
SaxX ¯\_(ツ)_/¯
SaxX ¯\_(ツ)_/¯@_SaxX_·
C'est donc ça les vidéos sur TikTok 😮‍💨🤨🤔 ? (merci à un abonné qui me l'a envoyé) Tant qu'on y est alors, je vais vous donner mon conseil aussi ! Pour sécuriser votre ordinateur, votre mot de passe doit contenir votre date de naissance et votre ville de naissance obligatoirement. Ainsi les hackers ne pourront pas le trouver avec leurs programmes informatiques. Ne me remerciez pas. Bonne journée.
Français
16
11
138
34.2K
NotFound
NotFound@Notfound404__·
Oh ça, c'est fort ! Même pour les fanboy cli comme moi, toujours pratique d'avoir un tool qui donne une vue d'ensemble rapidement sur certains éléments. apackets.com
Français
0
0
2
295