parzel

319 posts

parzel

parzel

@parzel2

Hacker based in Berlin | Working at @mod0 | https://t.co/6MZdC7Pcsk | he/him

Berlin, Deutschland Katılım Mayıs 2018
290 Takip Edilen947 Takipçiler
Sabitlenmiş Tweet
parzel
parzel@parzel2·
I will try to move to bsky permanently from now on. A lot of #itsec people are showing up there recently, and I am positive that finally, it will be possible to leave the toxic site Twitter has become. You can find me at parzel.bsky.social, happy to connect there!
English
0
0
1
128
parzel retweetledi
TrustedSec
TrustedSec@TrustedSec·
During a recent engagement, @Bandrel discovered how an attacker can craft a CSR by using default system certificates. After finding out this method was novel, the team kept digging. Read what they found in our new #blog! hubs.la/Q02SCqpG0
English
4
126
260
36.1K
parzel retweetledi
Andrea P
Andrea P@decoder_it·
Following up on my earlier tweet (x.com/decoder_it/sta…) regarding Kerberos relay with SMB server, I've uploaded my quick & dirty version. It's far from perfect, so feel free to improve it! github.com/decoder-it/Krb…
Andrea P@decoder_it

Is Kerberos relaying so limited? I'd say no, thanks to @tiraniddo CredMarshalTargetInfo trick. In this case, I'm relaying SMB to HTTP (ADCS) with a modified version of @cube0x0 krbrelay using DFSCoerce and PetitPotam - classic ESC8 attack with Kerberos, no DCOM involved ;)

English
6
98
244
56.8K
parzel
parzel@parzel2·
@garethheyes That's a big compliment coming from you, thanks! :)
English
0
0
0
234
parzel retweetledi
BSides Berlin
BSides Berlin@SidesBer·
🎟️📢Don't miss your chance to attend or present at BSides Berlin on October 26 in Festsaal Kreuzberg. Ticket sales and the Call for Papers are NOW OPEN!! bsides.berlin
English
2
7
12
1.9K
parzel retweetledi
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Struggeling to get those precious certificates with #certipy and AD CS instances that do not support web enrollment and do not expose CertSvc via RPC? @qtc_de has you covered and added functionality to use DCOM instead of good old RPC #redteaming github.com/ly4k/Certipy/p…
English
3
70
152
13.6K
parzel retweetledi
Dlive
Dlive@D1iv3·
We can relay back to the same machine using Kerberos relay instead of NTLM relay. I discovered this attack vector more than a year ago. I will describe it in detail in upcoming Black Hat Asia 2024 #certifieddcom--the-privilege-escalation-journey-to-domain-admin-with-dcom-37519" target="_blank" rel="nofollow noopener">blackhat.com/asia-24/briefi… and introduce more interesting attacks.
Dlive tweet media
English
18
186
589
80.7K
parzel retweetledi
Aleksandar Milenkoski
Aleksandar Milenkoski@milenkowski·
🇷🇺 Doppelgänger | Russia-Aligned Influence Operation Targets Germany We have been tracking the activities of the suspected Russia-aligned influence operation network Doppelgänger since late November 2023. Here is what we found... 🧵 sentinelone.com/labs/doppelgan… #threatintel
English
2
12
33
6.1K
parzel retweetledi
James Forshaw
James Forshaw@tiraniddo·
I try an avoid this hellsite, but I did a quick dive into sudo in Windows and here are my initial findings. tiraniddo.dev/2024/02/sudo-o… The main take away is, writing Rust won't save you from logical bugs :)
English
16
209
480
69.9K
parzel
parzel@parzel2·
Today we release the proof-of-concept exploits for the vulnerabilities we identified in HP #Poly VoIP devices. At the #37C3 we presented how these issues allow an attacker with network access to gain RCE and transform your devices into wiretaps. github.com/modzero/MZ-23-…
English
0
2
4
932