Hocine

212 posts

Hocine banner
Hocine

Hocine

@Sant0rryu

Katılım Şubat 2019
523 Takip Edilen489 Takipçiler
Hocine retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
Forgot to post it, but the recording of my Black Hat talk was released last week. If you're interested in all the hybrid AD attack surface you never knew about, give it a watch: youtu.be/rzfAutv6sB8?si…
YouTube video
YouTube
English
2
110
379
28.7K
Hocine retweetledi
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
ADCSDevilCOM 📍 A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB directly. By: @AnonArtist8 github.com/7hePr0fess0r/A…
English
3
67
294
16K
Hocine retweetledi
SpecterOps
SpecterOps@SpecterOps·
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm
English
10
336
741
136.7K
Hocine retweetledi
Steven
Steven@0xthirteen·
I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it specterops.io/blog/2025/08/1…
English
1
59
124
12.1K
Hocine retweetledi
hashcat
hashcat@hashcat·
hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: hashcat.net/forum/thread-1…
hashcat tweet media
English
21
369
1.2K
79.1K
Hocine retweetledi
Yuval Gordon
Yuval Gordon@YuG0rd·
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…
Yuval Gordon tweet media
English
22
371
878
166.8K
Hocine retweetledi
Andrea P
Andrea P@decoder_it·
I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…
English
2
150
351
19.6K
Hocine retweetledi
Enderman
Enderman@endermanch·
Did you know you can run certutil to decode Windows HRESULT/NTSTATUS error values? certutil -error
Enderman tweet mediaEnderman tweet media
English
41
171
1.8K
89.9K
Hocine retweetledi
Orange Cyberdefense's SensePost Team
Attacks against AD CS are de rigueur these days, but sometimes a working attack doesn’t work somewhere else, and the inscrutable error messages are no help. Jacques replicated the most infuriating and explains what’s happening under the hood in this post sensepost.com/blog/2025/divi…
Orange Cyberdefense's SensePost Team tweet media
English
1
110
316
37.1K
Hocine retweetledi
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Bypass AMSI in 2025, my newest blog post is published 🥳! A review on what changed over the last years and what's still efficient today. en.r-tec.net/r-tec-blog-byp…
S3cur3Th1sSh1t tweet media
English
1
281
673
35.9K
Hocine retweetledi
Synacktiv
Synacktiv@Synacktiv·
In our latest article, @croco_byte and @SScaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav HTTP authentication, enhancing the NTLM and Kerberos relaying capabilities of multicast poisoning attacks! synacktiv.com/publications/t…
English
3
95
179
16.4K
Hocine retweetledi
Aurélien Chalot
Aurélien Chalot@Defte_·
While doing internal assessments, I was often able to bypass EDR's because of them trusting legitimate binaries. In this blogpost I'll show why trust is wrong creating a python wrapper for PsExeSVC.exe (M$) and explain why zero trust is mandatory! tinyurl.com/4vr94skf
English
8
92
388
27.5K