Dwight Hohnstein

1.1K posts

Dwight Hohnstein banner
Dwight Hohnstein

Dwight Hohnstein

@djhohnstein

IBM X-Force Red @[email protected]

Katılım Ocak 2018
213 Takip Edilen3.8K Takipçiler
Sabitlenmiş Tweet
Dwight Hohnstein
Dwight Hohnstein@djhohnstein·
Apollo 2.0 is now out! 7 months and ~450,000 lines of code led to: - Dynamic Command Loading - P2P over SMB/TCP - SOCKS5 Proxying (tested w/RDP/impacket/FireFox) - "Safe" In-process Assembly Execution - User-compiled PE execution - Reduced size (~450kb) github.com/MythicAgents/A…
Cody Thomas@its_a_feature_

Mythic 2.3.7 is finally out! This includes an entirely new interface, tab-completable and conditional command parameters, LaTeX reporting, updated ATT&CK mappings, updated agents, and more! Check out the blog at posts.specterops.io/mythic-2-3-an-… and the change log docs.mythic-c2.net/common-qa/chan…

English
5
103
233
0
Dwight Hohnstein retweetledi
Dave Cossa
Dave Cossa@G0ldenGunSec·
Ever been on an SCCM site server and *this* close to a DA pw that you couldn't decrypt for some reason? Check out my new blog looking at encryption in use within SCCM sites configured for High Availability and accompanying tooling to recover passwords: ibm.com/think/x-force/…
English
3
57
140
14.4K
Dwight Hohnstein retweetledi
chompie
chompie@chompie1337·
kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
English
23
117
610
61.7K
Dwight Hohnstein retweetledi
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I'm releasing a backend for multi-agent AI systems that need to model complex non-linear problems. Kafka handles async agent communication, with ingestion plugins that route data to Neo4j, Qdrant, and MinIO. Check it out on the IBM X-Force GitHub! github.com/xforcered/Agen…
English
5
37
137
14.1K
Dwight Hohnstein retweetledi
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
To trigger local SYSTEM authentication for relaying to ADCS or LDAP for LPE you would usually need the printer service or EFS service to be enabled (printerbug/petitpotam). Here is an alternative without this requirement 🤠 github.com/rtecCyberSec/R…
S3cur3Th1sSh1t tweet media
English
3
106
326
34K
Dwight Hohnstein retweetledi
Dave Cossa
Dave Cossa@G0ldenGunSec·
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence. ibm.com/think/x-force/…
English
7
82
187
24.1K
Dwight Hohnstein retweetledi
Akamai Security Intelligence Group
Akamai Security Intelligence Group@akamai_research·
Today we unveil BadSuccessor - a new no-fix Active Directory privilege escalation technique. We will explore the recently introduced dMSA feature, and show how it enables turning a very common, seemingly benign permission, into a full domain take over. akamai.com/blog/security-…
English
3
181
497
58.5K
Dwight Hohnstein retweetledi
chompie
chompie@chompie1337·
Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…
English
23
232
793
136K
Dwight Hohnstein retweetledi
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 #1" target="_blank" rel="nofollow noopener">ibm.com/think/x-force/…
English
17
178
464
69.1K
Dwight Hohnstein retweetledi
Bobby Cooke
Bobby Cooke@0xBoku·
As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to @d_tranman for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki
English
27
229
700
568.2K
Dwight Hohnstein
Dwight Hohnstein@djhohnstein·
RT @retBandit: I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at https:/…
English
0
4
0
10
Dwight Hohnstein retweetledi
Josh
Josh@passthehashbrwn·
New blog from me on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that I identified in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan. securityintelligence.com/x-force/being-…
English
13
147
425
55.3K
Dwight Hohnstein retweetledi
Dwight Hohnstein retweetledi
Boschko
Boschko@olivier_boschko·
Dopped a spicy 25-min read exploring adversarial ML 🤠 It's a mix of in-depth & light peppering of the broader field. So much I couldn’t fit (extraction, inversion, poisoning), but I hope it sparks curiosity. Made for learners no fancy background ❤️ boschko.ca/adversarial-ml/
English
12
66
205
25.4K