@[email protected] (inactive)

5.2K posts

@edermi@infosec.exchange (inactive)

@[email protected] (inactive)

@michael_eder_

account inactive, goto mastodon if you want to follow me

Munich Katılım Temmuz 2014
577 Takip Edilen975 Takipçiler
@edermi@infosec.exchange (inactive)
@[email protected] (inactive)@michael_eder_·
Took me two grok requests to return to default (or at least something that looks like it) See you over in the sane part of the internet!
English
0
1
0
43
@[email protected] (inactive) retweetledi
Aurélien Chalot
Aurélien Chalot@Defte_·
Anyone know if Microsoft silently patch the Shadow Creds attack recently ? Looks like a computer object cannot write its own attribute anymore :D
English
11
30
133
43.3K
@[email protected] (inactive) retweetledi
Mandiant (part of Google Cloud)
Net-NTLMv1 is outdated, insecure, and must go. 🛑 To help defenders prove the risk and accelerate deprecation, we’ve released a comprehensive dataset of rainbow tables. See how easily these keys can be recovered, and secure your environment. Read more: bit.ly/4qpV6MJ
Mandiant (part of Google Cloud) tweet media
English
3
85
282
44K
@[email protected] (inactive) retweetledi
@[email protected] (inactive) retweetledi
SpecterOps
SpecterOps@SpecterOps·
SCCM attack paths are messy until you can see them. 👀 ConfigManBearPig from @_Mayyhem extends BloodHound with SCCM nodes + edges using OpenGraph, plus queries to surface hierarchy takeovers and escalation paths. Check it out! ghst.ly/4svbcWO
English
1
42
136
11.1K
@[email protected] (inactive) retweetledi
Yuval Avrahami
Yuval Avrahami@yuvalavra·
We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself 🤯 How did we do it? Just two missing characters was all it took. This is the story of #CodeBreach 🧵👇
Yuval Avrahami tweet media
English
160
857
7.4K
1.3M
@[email protected] (inactive) retweetledi
Ricardo Ruiz
Ricardo Ruiz@RicardoJoseRF·
I just released SAMDump, a tool that extracts SAM and SYSTEM files via Volume Shadow Copy (VSS) API with optional exfiltration (local save or network transfer) and XOR obfuscation. Plus, it uses NT APIs for file operations github.com/ricardojoserf/…
English
0
42
120
6.5K
@[email protected] (inactive) retweetledi
Secorizon
Secorizon@secorizon·
Responder now supports much more LDAP authentications, the LDAP rogue server has been rewritten to support SASL mechanisms. You'll see a lot of these on your screens :)
Secorizon tweet media
English
3
47
198
14.2K
@[email protected] (inactive) retweetledi
mpgn
mpgn@mpgn_x64·
New Windows AD Lab "Pirates of the Caribbean" themed lab is live ! 🔥 🔷NTLMv1/RBCD 🔷GMSA & MSSQL Impersonation 🔷Kerberos Delegation 🔷NTDS Forensics Build on VMware, VirtualBox, or Ludus. Thanks @mael91620 for the help! Full treasure here⬇️ github.com/Pennyw0rth/Net…
English
2
103
392
23.6K
@[email protected] (inactive) retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Using ADCS to Attack HTTPS-Enabled WSUS Clients: @cookieTheft and I have extended the research by @Coontzy1 on WSUS attacks and explored how to leverage misconfigured ADCS templates to gain code execution on HTTPS-enabled WSUS clients. 1/2🧵
Alex Neff tweet media
English
2
79
290
25.8K
@[email protected] (inactive) retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Enumerate DNS zones that allow unauthenticated updates using NetExec🔥 Adding or updating DNS entries without authentication can give attackers a huge advantage. Thanks to @toffyrak such DNS zones can now be enumerated using NetExec🚀
Alex Neff tweet media
English
2
72
361
25K
@[email protected] (inactive) retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
NetExec now extracts even more secrets from the NTDS.dit🚀 With the new --history and --kerberos-keys flags, NetExec will also dump the password history and the AES/DES keys for Kerberos auth from the NTDS.dit🔑 Implemented by @kriyosthearcane, azoxlpf and me.
Alex Neff tweet media
English
7
94
440
17.5K
@[email protected] (inactive) retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Dump DPAPI credentials via WinRM with NetExec🔥 A lot of sensitive data is stored in Windows DPAPI, such as the login credentials used in scheduled tasks. Thanks to tiagomanunes this is now also possible via WinRM!
Alex Neff tweet media
English
3
58
251
11.4K
@[email protected] (inactive) retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Dumping juicy secrets from SAM/LSA is always nice right? I've added an implementation for the --sam and --lsa flags to the MSSQL protocol of NetExec🚀 No need for manual registry hive extraction anymore!
Alex Neff tweet media
English
9
65
316
12.8K
@[email protected] (inactive) retweetledi
RedTeam Pentesting
RedTeam Pentesting@RedTeamPT·
🚨8 months after public disclosure, @RHEL @AlmaLinux @rocky_linux are still vulnerable for a Ghostscript RCE with a reliable public exploit (CVE-2025-27835 and others)! It can be triggered by opening LibreOffice docs or through a server that uses ImageMagick for file conversion!
English
2
17
66
6K