@[email protected] (inactive)

5.2K posts

@edermi@infosec.exchange (inactive)

@[email protected] (inactive)

@michael_eder_

account inactive, goto mastodon if you want to follow me

Munich เข้าร่วม Temmuz 2014
577 กำลังติดตาม975 ผู้ติดตาม
@edermi@infosec.exchange (inactive)
@[email protected] (inactive)@michael_eder_·
Took me two grok requests to return to default (or at least something that looks like it) See you over in the sane part of the internet!
English
0
1
0
43
@[email protected] (inactive) รีทวีตแล้ว
Aurélien Chalot
Aurélien Chalot@Defte_·
Anyone know if Microsoft silently patch the Shadow Creds attack recently ? Looks like a computer object cannot write its own attribute anymore :D
English
11
30
133
43.3K
@[email protected] (inactive) รีทวีตแล้ว
Mandiant (part of Google Cloud)
Net-NTLMv1 is outdated, insecure, and must go. 🛑 To help defenders prove the risk and accelerate deprecation, we’ve released a comprehensive dataset of rainbow tables. See how easily these keys can be recovered, and secure your environment. Read more: bit.ly/4qpV6MJ
Mandiant (part of Google Cloud) tweet media
English
3
85
282
44K
@[email protected] (inactive) รีทวีตแล้ว
@[email protected] (inactive) รีทวีตแล้ว
SpecterOps
SpecterOps@SpecterOps·
SCCM attack paths are messy until you can see them. 👀 ConfigManBearPig from @_Mayyhem extends BloodHound with SCCM nodes + edges using OpenGraph, plus queries to surface hierarchy takeovers and escalation paths. Check it out! ghst.ly/4svbcWO
English
1
42
136
11.1K
@[email protected] (inactive) รีทวีตแล้ว
Yuval Avrahami
Yuval Avrahami@yuvalavra·
We hacked the AWS JavaScript SDK, a core library powering the entire @AWScloud ecosystem - including the AWS Console itself 🤯 How did we do it? Just two missing characters was all it took. This is the story of #CodeBreach 🧵👇
Yuval Avrahami tweet media
English
160
857
7.4K
1.3M
@[email protected] (inactive) รีทวีตแล้ว
Ricardo Ruiz
Ricardo Ruiz@RicardoJoseRF·
I just released SAMDump, a tool that extracts SAM and SYSTEM files via Volume Shadow Copy (VSS) API with optional exfiltration (local save or network transfer) and XOR obfuscation. Plus, it uses NT APIs for file operations github.com/ricardojoserf/…
English
0
42
120
6.5K
@[email protected] (inactive) รีทวีตแล้ว
Secorizon
Secorizon@secorizon·
Responder now supports much more LDAP authentications, the LDAP rogue server has been rewritten to support SASL mechanisms. You'll see a lot of these on your screens :)
Secorizon tweet media
English
3
47
198
14.2K
@[email protected] (inactive) รีทวีตแล้ว
mpgn
mpgn@mpgn_x64·
New Windows AD Lab "Pirates of the Caribbean" themed lab is live ! 🔥 🔷NTLMv1/RBCD 🔷GMSA & MSSQL Impersonation 🔷Kerberos Delegation 🔷NTDS Forensics Build on VMware, VirtualBox, or Ludus. Thanks @mael91620 for the help! Full treasure here⬇️ github.com/Pennyw0rth/Net…
English
2
102
391
23.6K
@[email protected] (inactive) รีทวีตแล้ว
Alex Neff
Alex Neff@al3x_n3ff·
We suggest assigning such vulnerable templates the new ESC number 17 (ESC17) to help identify and mitigate these risks. You can read our blog post here: blog.digitrace.de/2026/01/using-… 2/2🧵
English
2
69
191
12.1K
@[email protected] (inactive) รีทวีตแล้ว
Alex Neff
Alex Neff@al3x_n3ff·
Using ADCS to Attack HTTPS-Enabled WSUS Clients: @cookieTheft and I have extended the research by @Coontzy1 on WSUS attacks and explored how to leverage misconfigured ADCS templates to gain code execution on HTTPS-enabled WSUS clients. 1/2🧵
Alex Neff tweet media
English
2
79
290
25.8K
@[email protected] (inactive) รีทวีตแล้ว
Alex Neff
Alex Neff@al3x_n3ff·
Enumerate DNS zones that allow unauthenticated updates using NetExec🔥 Adding or updating DNS entries without authentication can give attackers a huge advantage. Thanks to @toffyrak such DNS zones can now be enumerated using NetExec🚀
Alex Neff tweet media
English
2
72
361
25K
@[email protected] (inactive) รีทวีตแล้ว
Alex Neff
Alex Neff@al3x_n3ff·
NetExec now extracts even more secrets from the NTDS.dit🚀 With the new --history and --kerberos-keys flags, NetExec will also dump the password history and the AES/DES keys for Kerberos auth from the NTDS.dit🔑 Implemented by @kriyosthearcane, azoxlpf and me.
Alex Neff tweet media
English
7
94
440
17.5K
@[email protected] (inactive) รีทวีตแล้ว
Alex Neff
Alex Neff@al3x_n3ff·
Dump DPAPI credentials via WinRM with NetExec🔥 A lot of sensitive data is stored in Windows DPAPI, such as the login credentials used in scheduled tasks. Thanks to tiagomanunes this is now also possible via WinRM!
Alex Neff tweet media
English
3
58
251
11.4K
@[email protected] (inactive) รีทวีตแล้ว
Alex Neff
Alex Neff@al3x_n3ff·
Dumping juicy secrets from SAM/LSA is always nice right? I've added an implementation for the --sam and --lsa flags to the MSSQL protocol of NetExec🚀 No need for manual registry hive extraction anymore!
Alex Neff tweet media
English
9
64
315
12.8K
@[email protected] (inactive) รีทวีตแล้ว
RedTeam Pentesting
RedTeam Pentesting@RedTeamPT·
🚨8 months after public disclosure, @RHEL @AlmaLinux @rocky_linux are still vulnerable for a Ghostscript RCE with a reliable public exploit (CVE-2025-27835 and others)! It can be triggered by opening LibreOffice docs or through a server that uses ImageMagick for file conversion!
English
2
17
66
6K