Sabitlenmiş Tweet
Aurélien Chalot
1.6K posts

Aurélien Chalot
@Defte_
Hacker, sysadmin and security researcher @OrangeCyberdef 💻 Calisthenic enthousiast 💪 and wannabe philosopher https://t.co/SqDDhIGGGh 📖 🔥 Hide&Sec 🔥
The grid Katılım Kasım 2017
477 Takip Edilen4.2K Takipçiler

In this blogpost I tried to sum up everything I know, walking you from the "I have an EDR, I'm secure" mindset to "let's build a resilient tiering model". Let me know what you think about it :)!
sensepost.com/blog/2026/from…
English

@Defte_ @HackAndDo Socks proxy pivoting through a trusted service handle is nasty for defenders because it blends into legitimate admin traffic almost perfectly.
English

Thanks to Azox, it is now possible to use psexecsvc (github.com/sensepost/susi…) through a socks proxy like ntlmrelayx allowing executing system commands via a trusted service, as NT System, and evading EDR's. Also thanks to @HackAndDo for his fixes :D

English

Following the blogpost about implementing the Channel Binding token for TDS.py on Impacket (sensepost.com/blog/2025/a-jo…), here is the module you can use to check whether or not CBT is required on MSSQL databases via NetExec github.com/Pennyw0rth/Net… 🔥🔥

English

@tyche_rle Réflexion simple, tes parents achètent deux maisons, tu en hérites, les loues, en rachète 3, ton enfant 8, son enfant 20. L'expentionalité du patrimoine mène à une fine couche de la population qui détient tout et une énorme qui n'a rien. Tu trouves ça moral et juste ?
Français

@SinSinology @thatjiaozi I'll open a farm next to you guys to provide cereals and milk if that's okay 🤣
English

@thatjiaozi pastries, cookies, breads with me
cinnamon buns too
English
Aurélien Chalot retweetledi

Stealthy WMI lateral movement - StealthyWMIExec.py
ghaleb0x317374.github.io/2026/03/15/Ste…
English
Aurélien Chalot retweetledi

Releasing one of my research tools: EVENmonitor🖥️
Inspired by LDAPmonitor, I implemented a monitoring tool for the Windows Event log in pure python. You can just attach it via the network and then filter for specific event IDs or keywords.
Available at: github.com/NeffIsBack/EVE…
GIF
English
Aurélien Chalot retweetledi

New post on the MDSec blog and another Windows EoP....
RIP RegPwn - mdsec.co.uk/2026/03/rip-re…
Saying goodbye to a much loved EoP, by @filip_dragovic
English

@sekurlsa_pw @RedHatPentester So from a low priv user you can determine if a PSO exists and which users it applies to but you can’t see the policy details. W/ a DA acct you can see policy details. If I see a PSO I just refuse to spray any users that it applies to unless the client will tell me the details
English

If a pentester ignores the password policy and performs password spraying blindly, they may unintentionally lock multiple user accounts. This can disrupt business operations and immediately alert system administrators to suspicious activity. For example, if the policy locks accounts after five failed login attempts, spraying several passwords too quickly across many accounts could trigger a mass lockout event.
By reviewing the password policy first, the penetration tester can design a controlled and stealthy spraying strategy. Knowing the lockout threshold allows the tester to limit attempts to safe numbers and space them out over time.



English

@unsigned_sh0rt @Sniffler0x1 Omg thank you so much dude 🥳! That's exactly what I was looking for!!
English

@Defte_ @Sniffler0x1 I'm re-reading the thread and realizing the perspective you're coming from now.
In SCCM you can enable a setting to not automatically approve unknown clients.
You can also define boundary groups for new clients which gives your some granularity on approval.
English

@unsigned_sh0rt @Sniffler0x1 But what prevents a random non domain joined computer to enroll on the MP via the self signed certificate and then get the NAA ?
English

@Defte_ @Sniffler0x1 initially it's a self-signed certificate (or PKI if they have AD CS setup) that's used by the client to start the enrollment process with the management point
management point sends the NAA, NAA gives access to shares
English

@Sniffler0x1 and ultimately, how ehttp fixes the problem ? There's no more NAA account but I don't get how the DP knows that a non domain joined account can authenticate and be provisionned. I should just read more documentations I guess D
English

@Sniffler0x1 So the real question I have got, is why would that account be spread via the HTTP endpoint. If the computer is not domain joined, it cannot reach that endpoint anyway.
But yeah, if the computer boots via PXE, then the password is used to reach the AD
English

@ShitSecure Found some reasons althought I still don't get why that mechanism even exists xD

English

@ShitSecure Is this some kind of a legacy issue as we see everyday in the windows world ? ahah
English



