wwwGeneral

146 posts

wwwGeneral

wwwGeneral

@wwwGeneralFR

Pentester @Holiseum Part-Time Teacher @ESIEEParis Staff @HackDayfr CTF Player Active Directory breaker Blog : https://t.co/tzZUgyKrpa

C:\Windows\System32 Katılım Mayıs 2022
137 Takip Edilen23 Takipçiler
wwwGeneral retweetledi
Secorizon
Secorizon@secorizon·
Responder now supports much more LDAP authentications, the LDAP rogue server has been rewritten to support SASL mechanisms. You'll see a lot of these on your screens :)
Secorizon tweet media
English
3
48
198
14.1K
vx-underground
vx-underground@vxunderground·
Big giveaway. - (x3) Certified Red Team Expert (CRTE) - (x3) Certified by Altered Security Red Team Professional for Azure (CARTP) - (x10) Malware Analysis for Hedgehogs Bundle CTRE and CARTP sponsored by @nikhil_mitt Malware Analysis sponsored by @struppigel Leave a comment below on what you'd like. Winners chosen in 24 hours.
vx-underground tweet media
English
1.7K
126
1.5K
111.2K
Alex Neff
Alex Neff@al3x_n3ff·
Dumping the NTDS.dit from disk - A new NetExec module💾 Isn't it super annoying when AV blocks your access to the SAM/SYSTEM hives? The new "ntds_dump_raw" module made by @0xcc00 parses the disk image directly, allowing you to extract the NTDS.dit or SAM database🚀
Alex Neff tweet media
English
12
169
667
61K
wwwGeneral retweetledi
mpgn
mpgn@mpgn_x64·
Wanna see something cool about RDP and NetExec ?
mpgn tweet media
English
20
179
965
117.2K
wwwGeneral
wwwGeneral@wwwGeneralFR·
@techspence If you close you eyes during the pentest maybe you will not see them xD
English
0
0
0
47
spencer
spencer@techspence·
Internal pentest findings that shouldn't exist in 2025... - credentials on file shares/sharepoint/dms - local admin password reuse - kerberoastable domain admins - ADCS Misconfigs - spooler running on DCs - lack of powershell restrictions - EDR missing on hosts
English
32
70
576
89.6K
wwwGeneral retweetledi
Pixis
Pixis@HackAndDo·
I'm not sure everyone realizes it, but as it stands, if you have an Active Directory with default configurations, any machine (except DCs) that hasn't applied the June 10 patch can be compromised by any domain user.
Synacktiv@Synacktiv

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. synacktiv.com/publications/n…

English
5
101
428
56.3K
wwwGeneral retweetledi
Synacktiv
Synacktiv@Synacktiv·
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. synacktiv.com/publications/n…
English
5
258
599
209.4K
wwwGeneral retweetledi
PT SWARM
PT SWARM@ptswarm·
⚠️ We’ve reproduced CVE-2025-49113 in Roundcube. This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization. If you're running Roundcube — update immediately!
English
7
114
516
49.8K
wwwGeneral retweetledi
ACE Responder
ACE Responder@ACEResponder·
How the new Bad Successor dMSA domain takeover attack works. #ThreatHunting #DFIR
English
1
78
259
13.5K
wwwGeneral retweetledi
Logan Goins
Logan Goins@_logangoins·
I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…
English
7
170
438
33.2K
mpgn
mpgn@mpgn_x64·
Based on the research of Akamai, I made a new module on netexec to find every principal that can perform a BadSuccessor attack and the OUs where it holds the required permissions 🔥 github.com/Pennyw0rth/Net…
mpgn tweet media
Yuval Gordon@YuG0rd

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

English
4
120
426
31.6K
wwwGeneral retweetledi
WitherOrNot
WitherOrNot@witherornot1337·
Improved bypass for Windows 11 OOBE: 1. Shift-F10 2. start ms-cxh:localonly Only required on Home and Pro editions.
English
111
1.5K
8.7K
726.5K