Snowscan

374 posts

Snowscan banner
Snowscan

Snowscan

@snowscan

Load "$",8; Red Team

Canada Entrou em Ocak 2009
424 Seguindo6.2K Seguidores
Snowscan retweetou
SpecterOps
SpecterOps@SpecterOps·
Relayed NTLM creds are powerful, if you can use them. @senderend shows why browsers fail through ntlmrelayx SOCKS and introduces ghostsurf to make NTLM-authenticated web apps accessible. Read more ⤵️ ghst.ly/4tnJOtx
English
2
91
272
17.5K
Étienne Ducharme
Étienne Ducharme@b13bs_·
Didn't see much noise around this, but is IP rotation through AWS API Gateway now being detected and blocked? I never had an issue with Fireprox before, but I'm definitely hitting some walls now. This might be why Flareprox and OmniProx were released in the past few months.
English
2
0
2
343
Snowscan retweetou
Snowscan retweetou
SkelSec
SkelSec@SkelSec·
#pypykatz new version 0.6.11 is out on github and pip. Big thanks to all awesome contributors!! Besides the fixes, the two important things in this version: - Kerberos aes keys extraction is now supported - !!!!Windows 24H2 support is here!!!!! github.com/skelsec/pypyka…
English
5
52
143
14.6K
Snowscan retweetou
NetSPI
NetSPI@NetSPI·
Introducing PowerHuntShares 2.0 Release! NetSPI VP of Research @_nullbind introduces new insights, charts, graphs, & LLM capabilities that can be used to map the relationships & risks being exposed through the network shares: ow.ly/6Rjo50U7tNr
English
3
35
107
15.8K
Snowscan
Snowscan@snowscan·
@Bell Is this a standard fiber cabling installation? Running the fiber over my neighbor's driveway?
Snowscan tweet media
English
0
0
0
38
Snowscan retweetou
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
CcmPwn is equipped with various modules. The “exec” module runs an AppDomainManager Injection payload for every logged-in user. The “coerce” module coerces SMB/HTTP authentications, which can then be used for password cracking or relay attacks. 👇 github.com/mandiant/CcmPwn
English
0
18
69
4.7K
Snowscan retweetou
adamm
adamm@adamsimuntis·
Found a flaw in NetBSD's utmp_update allowing injection of ASCII escape sequences into utmpx logs, leading to unexpected terminal emulator behavior and utmpx database integrity concerns. ftp.netbsd.org/pub/NetBSD/sec… #NetBSD #Security
English
1
14
20
6.6K
Snowscan retweetou
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Struggeling to get those precious certificates with #certipy and AD CS instances that do not support web enrollment and do not expose CertSvc via RPC? @qtc_de has you covered and added functionality to use DCOM instead of good old RPC #redteaming github.com/ly4k/Certipy/p…
English
3
70
152
13.6K
Outflank
Outflank@OutflankNL·
New BOF released to our OST customers: Coercer Coercer triggers a novel and non-public coercion method that forces SMB authentication from the computer account on workstations. From there on, you can for example relay to ADCS for generating a computer certificate.
GIF
English
1
33
133
20.7K
Snowscan retweetou
Dirk-jan
Dirk-jan@_dirkjan·
It's been quiet for a while around bloodhound Python, however I'm happy to share that I am now maintaining the project at my personal GitHub. The latest version fixes many bugs/issues, also thanks to the many PRs that were submitted (thanks all!). github.com/dirkjanm/blood…
English
11
199
627
60.8K
Antonio Cocomazzi
Antonio Cocomazzi@splinter_code·
Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe 👇
Antonio Cocomazzi tweet media
English
25
307
1.1K
259.3K
Snowscan
Snowscan@snowscan·
@splinter_code I think this only works if the service start type is not disabled, otherwise triggers are inactive.
English
1
0
6
3.1K
reversebrain
reversebrain@reversebrain·
Just finished my OSED exam. Finger crossed for the report submission 👀
English
1
0
10
1.8K
Snowscan
Snowscan@snowscan·
Did Bethesda hire the Microsoft UX team to work on Starfield? This is so shit. Really disappointed with the game so far.
English
0
0
5
2.1K