default itsec guy

7.4K posts

default itsec guy

default itsec guy

@bongoalex

just the average next door security janitor

Cyberspace Katılım Haziran 2009
537 Takip Edilen515 Takipçiler
Rasta Mouse
Rasta Mouse@_RastaMouse·
If AI is so productive, why are we not just working 1-2 day weeks?
English
18
3
65
7K
Daniel Cuthbert
Daniel Cuthbert@dcuthbert·
ServiceNow is the Lotus Notes of this generation. A UX designed by people with no eyes
English
77
62
868
70.9K
Mantodea Security
Mantodea Security@MantodeaSec·
We are excited to announce that in the past months both @BigM1ke_oNe and @kingcope_MTD have joined our team. 💪 We are proud to welcome such renowned experts to our team.
GIF
English
1
0
4
167
default itsec guy
default itsec guy@bongoalex·
@vysecurity Can't compare non open source to open source. Think about costs and limitations
English
1
0
0
45
Vincent Yiu
Vincent Yiu@vysecurity·
I think the latest Opus and Gemini 3 just did a game over to the Chinese open source models...
English
1
0
0
895
default itsec guy
default itsec guy@bongoalex·
found old stuff like PE compressors from 2002 ... wonder what to do with it
default itsec guy tweet media
English
0
0
0
30
default itsec guy retweetledi
Andrea P
Andrea P@decoder_it·
We know that Microsoft improved the overall printing security in 2025, now using DCE/RPC for callback, you can force NTLM local auth and reflect back machine auth even without CredMarshalTargetInfo() trick 😇
Andrea P tweet mediaAndrea P tweet media
English
6
73
297
17.8K
default itsec guy retweetledi
Seth Jenkins
Seth Jenkins@__sethJenkins·
All my recent activity wasn't for nothing...I'm pleased to announce that I'll be speaking at @DistrictCon with @natashenka about a 0-click to kernel exploit chain for the Pixel 9 in January!
Seth Jenkins tweet media
English
3
17
208
15.6K
default itsec guy retweetledi
Justin Elze
Justin Elze@HackingLZ·
This is underrated and has worked forever
Justin Elze tweet media
English
8
23
270
18.8K
default itsec guy retweetledi
LuemmelSec
LuemmelSec@theluemmel·
Lol "ZDI has marked all 13 issues as zero-day vulnerabilities, given Ivanti’s failure to release fixes in accordance with responsible disclosure deadlines." cyberinsider.com/zdi-drops-13-u…
English
2
43
127
23.7K
Two Seven One Three
Two Seven One Three@TwoSevenOneT·
#redteam You can exploit the update functionality vulnerability of #Windows Defender to move its executable folder to a location of your choosing. After that, you can use DLL Sideloading for persistence, inject code, or simply disable it... #blueteam
Two Seven One Three tweet mediaTwo Seven One Three tweet mediaTwo Seven One Three tweet media
English
8
88
415
32.6K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Best Citrix Breakout ever. You can only download .ica files that provide access to certain local applications but breakout out of these applications is not possible? Just modify the .ica file before starting it and remove The InitialProgram= value -> Full Citrix Session! 🤓
S3cur3Th1sSh1t tweet media
English
10
84
388
33.8K
joernchen
joernchen@joernchen·
Be careful out there, identity theft is real!
joernchen tweet media
English
5
1
56
3.5K
default itsec guy retweetledi
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net
English
0
9
23
2.7K
default itsec guy
default itsec guy@bongoalex·
@rad9800 How you build sandbox when you don't have access to console and logs. Wtf post of the day
English
0
0
1
297
Rad
Rad@rad9800·
EDR vendors secure their sales pipelines but neglect monitoring GitHub for exposed installer tokens -leaving customers vulnerable to abuse and over-licensing. Adversaries likely exploit these tokens to build sandboxes for payload testing. Here are search patterns to help identify these exposures and push vendors toward better security practices: CrowdStrike: Base: - Falcon - falconctl - CrowdStrike - FalconSensor_Windows Filters: - /[A-Za-z0-9]{32}-[0-9]{2}/ Example Queries: crowdstrike /CID=[A-Za-z0-9]{32}-[0-9]{2}/ NOT owner:crowdstrike - crowdstrike falcon /[A-Za-z0-9]{32}-[0-9]{2}/ NOT "1234567890ABCDEF1234567890ABCDEF-12" SentinelOne: Base: - SITE_TOKEN - sentinelctl - SentinelOne - SentinelOneInstaller Filters: - 5zZW50aW5lbG9uZS5uZXQiL - eyJ1 Example Queries: - SITE_TOKEN 5zZW50aW5lbG9uZS5uZXQiL - Sentinelone language:powershell eyJ1 Carbon Black: Base: - COMPANY_CODE - installer_vista_win7_win8 Filters: - /COMPANY_CODE=[A-Z0-9]{19}/ Example Queries: - installer_vista_win7_win8 /COMPANY_CODE=[A-Z0-9]{19}/ Note: Add "s3" to any base term search to find publicly hosted installer binaries. Vendors must apply the same rigor to token management as they do to sales - protecting customers from licensing abuse and denying threat actors easy sandbox setup.
Rad tweet media
English
6
48
310
29K
SkelSec
SkelSec@SkelSec·
Update: MS sent a message that this might be eligible for a bounty and should give them more info. I just.... ehhhh
SkelSec@SkelSec

Shared the PoC with @mkolsek few days ago, the same one I gave to microsoft. Unlike microsoft however, they not only verified the issue within days but refined it demonstrating that ANY domain user can crash a fully patched windows 2025 server as of now.

English
2
0
16
2.4K
Kuba Gretzky
Kuba Gretzky@mrgretzky·
@bongoalex I once watched a full playthrough of UFO: Enemy Unknown 🥲
English
1
0
0
45