Eloy @[email protected]

40 posts

Eloy @zer1t0@defcon.social banner
Eloy @zer1t0@defcon.social

@zer1t0

Moved to @[email protected] @hackliza, vegan

@[email protected] Katılım Temmuz 2016
65 Takip Edilen1.1K Takipçiler
Eloy @zer1t0@defcon.social
I was playing with code injection to read processes keyrings on Linux. I've wrote a new tool, keydump, and showing how we can use it to extract cleartext credentials from sssd. Not an easy exploitable scenario, but I hope you like the article!! hackliza.gal/en/posts/keydu…
English
0
7
16
1K
Eloy @zer1t0@defcon.social
Recently I've working with Azure from Linux, but found it a limited for hacking, so I'm improving it with my "extensions". My favorite is az-login-with-token, to inject an Access or Refresh Token in the token cache, and using them from Azure Cli. gitlab.com/Zer1t0/aze
English
0
3
12
1.1K
Eloy @zer1t0@defcon.social
I've been playing and implementing HellsGate technique for learning, but found cumbersome to use 2 procedures (HellsGate and HellDescent) for using syscalls, so implemented zsyscall to use syscall in one step. gitlab.com/Zer1t0/zsyscall
English
0
20
58
7.3K
Eloy @zer1t0@defcon.social
Been working in @devo_Inc for a month and get fired on a layoff. Wonder why they hire me if they know this was coming. Quite unprofessional. Had to reject offers to accept this one 😡. And how they will offer a good security product firing security people?
English
0
7
7
0
Eloy @zer1t0@defcon.social
I've playing with AWS security, and found the resources/perms enumeration tools quite limited, so developed github.com/zer1t0/awsenum with service filtering and recursion (e.g, automatically check S3 buckets you have access). It is still incomplete, but hope you find it useful.
English
0
63
172
0
John wood
John wood@haxisac·
@Zer1t0 @mvelazco I have a somewhat stupid question, but hey I ask it anyway, is there a solution to find out which computers are on which to activate the internet connection and which ones do not?
English
1
0
0
0
Eloy @zer1t0@defcon.social
@theluemmel @g3rzi Wow, I've checking and you are right. First, the NTLM hashes* are NT hashes and now this. Why is terminology so complicated sometimes? I'll work to fix that. Thank you 😀 (*And NetNTLM hashes are NTLM hashes)
English
1
0
3
0
LuemmelSec
LuemmelSec@theluemmel·
@Zer1t0 @g3rzi Wow this is awesome. Thank you so much for sharing. I have a minor complaint regarding the Ticket Types: You refer to TGSs (Ticket Granting Service) as a kind of ticket. The TGS in fact is a part of the KDC which issues Service Tickets. What you mean are simply Service Tickets.
English
1
0
1
0
Eloy @zer1t0@defcon.social
@kildonan5 Sure, you can create Silver tickets or performing a RBCD attack to get Administrative privileges. What I mean is that the account itself doesn't have those privileges (which may be counter-intuitive), you need some kind of attack to get them. I take note for comment it. Thanks
English
0
0
1
0
Maximus
Maximus@gladiatx0r·
@Zer1t0 Great writeup. Minor point, in DC account you write " This computer account is used by the SYSTEM local account to interact with the domain, but not locally, thus, this account has no administrative privileges in the machine." but dont forget silver tickets = admin privs
English
1
0
0
0
pwntools
pwntools@pwntools·
@Zer1t0 Can you create a pull request against the main Pwntools repository so that we can track this and hopefully get it merged at some point?
English
1
0
0
0
Eloy @zer1t0@defcon.social
A year ago I implement a heap examination module for @pwntools that finally was not merged cause my lack of time. If anyone is interested in continuing the project I would like to let you know that there is a lot of code in my branch. github.com/Gallopsled/pwn…
English
1
0
3
0