WHOAMI

151 posts

WHOAMI banner
WHOAMI

WHOAMI

@wh0amitz

Red Team / Offensive Security, Cameo in @StrawHat_CTF for pentest. Web Security / Windows / Active Directory / Post Exploitation

Beijing Katılım Şubat 2022
154 Takip Edilen596 Takipçiler
WHOAMI retweetledi
Andrea P
Andrea P@decoder_it·
M'm glad to release the tool I have been working hard on the last month: #KrbRelayEx A Kerberos relay & forwarder for MiTM attacks! >Relays Kerberos AP-REQ tickets >Manages multiple SMB consoles >Works on Win& Linux with .NET 8.0 >... GitHub: github.com/decoder-it/Krb…
Andrea P tweet media
English
15
230
548
50.6K
WHOAMI retweetledi
Andrea P
Andrea P@decoder_it·
Relaying DCOM has always intrigued me, so I decided to dive in. Started with a MiTM attack using a fake DNS entry, targeting certificate requests to an ADCS server and relaying to SMB.
Andrea P tweet media
English
1
40
160
11.4K
WHOAMI
WHOAMI@wh0amitz·
Sleepy🥱
English
0
0
1
213
WHOAMI retweetledi
James Forshaw
James Forshaw@tiraniddo·
It seems amazing to me that MS have spent years talking about this feature and have not fixed well known public bypasses. My similar Kerberos trick probably works tiraniddo.dev/2022/03/bypass… as does googleprojectzero.blogspot.com/2019/12/callin… if you accept a prompt :)
Andrea P@decoder_it

Administrator Protection, introduced in the latest Windows Insider Canary build, is a solid security enhancement... uhh.. really?? can be bypassed with @splinter_code's clever SspiUacBypass tool. Check it out here: github.com/antonioCoco/Ss…

English
1
71
222
28.4K
WHOAMI retweetledi
MalDev Academy
MalDev Academy@MalDevAcademy·
New Module 46: Exploiting EDRs For Evasion - Preventing EDR From Taking Action This module demonstrates a logic vulnerability in an EDR. Setting the "Read-Only" attribute on a malicious file prevents it from being quarantined or deleted. We exploit this vulnerability to successfully execute Mimikatz via Local PE Injection.
MalDev Academy tweet mediaMalDev Academy tweet media
English
4
37
267
15.6K
WHOAMI retweetledi
Nick Powers
Nick Powers@zyn3rgy·
[Tool & Blog release] - smbtakeover, a technique to unbind/rebind port 445 without loading a driver, loading a module into LSASS, or rebooting the target machine. The goal is to ease exploitation of targeted NTLM relay primitives while operating over C2. Github repo is linked at the bottom of the blog post, which provides technical analysis of the technique. posts.specterops.io/relay-your-hea…
English
8
115
267
29.9K
WHOAMI retweetledi
sn🥶vvcr💥sh
sn🥶vvcr💥sh@snovvcrash·
Implementing a session manager is a tons of fun… and pain 😅 Have learned so much about CreateProcess and Logon APIs studying @splinter_code’s RunasCs, a very handy tool once again 🙌🏻
English
3
9
50
5.7K
WHOAMI retweetledi
IAM!ERICA
IAM!ERICA@EricaZelic·
Oldy but goody from one of my favorite researchers, itm4n, about DLL proxying and privilege escalation from implmentations outside of "c:\Program Files" itm4n.github.io/dll-proxying/
English
0
39
120
8K
WHOAMI retweetledi
Andrea P
Andrea P@decoder_it·
As expected, NTLM is now "deprecated." #features-were-no-longer-developing" target="_blank" rel="nofollow noopener">learn.microsoft.com/en-us/windows-… @splinter_code Was wondering what would have happened if we had discovered #LocalPotato after this article🤔
English
1
15
75
7K
WHOAMI retweetledi
Diego Capriotti
Diego Capriotti@naksyn·
One thing I always look for when starting in a network without AD creds is user enumeration with RPC null sessions. impacket SAMR (samrdump) and LSARPC (lookupsid) tools will give you only a small part of the story. Here's my minimal RID cycling script gist.github.com/naksyn/8204c76… that outplayed everything else, enabling me to find some crackable ASREP-roastable DA accounts hiding with RID > 50000 that were unable to be found using other tools. I am using chunks to avoid DoS and getting NT_STATUS_INSUFFICIENT_RESOURCES, ofc you can tweak it according to your YOLO level. there will be a new RPC connection for every chunk, it's a bit better than cycling and using rpcclient every time and always starting RPC connections from scratch. However, RID cycling with rpcclient will generate a ton of STATUS_NO_SUCH_USER responses that are sus, if someone is looking and knows what to look for ofc
Diego Capriotti tweet media
English
4
54
246
22.7K
WHOAMI retweetledi
Lee Chagolla-Christensen
ADCS strikes again (sounds a lot like ESC1). Just as a reminder, despite our recommendation of alerting IT administrators of this very common dangerous misconfiguration (AT A MINIMUM via an event log). Microsoft chose not to include any additional logging in ADCS.
Lee Chagolla-Christensen tweet media
English
4
56
198
56K
WHOAMI retweetledi
Filip Dragovic
Filip Dragovic@filip_dragovic·
So MSRC first say that they cannot reproduce ,now say that no security boundary is crossed. Tested this on few different machines and it was successful on all of them. This is bug in GamingServices , non default service so impact is not high. github.com/Wh04m1001/Gami…
English
13
108
402
98.7K
WHOAMI retweetledi
Andrea P
Andrea P@decoder_it·
I created another variant of our so-loved *potato family, the #FakePotato. But have to wait MSRC response before disclosing, hopefully soon ;)
English
2
11
58
6.2K