Pixis

2.6K posts

Pixis banner
Pixis

Pixis

@HackAndDo

Active Directory curious ♥

France شامل ہوئے Temmuz 2014
395 فالونگ8.2K فالوورز
Pixis ری ٹویٹ کیا
Smukx.E
Smukx.E@5mukx·
The purpose of this article is to explain NTLM relay, and to present its limits. en.hackndo.com/ntlm-relay/
Smukx.E tweet media
English
2
31
149
8K
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
If a pentester ignores the password policy and performs password spraying blindly, they may unintentionally lock multiple user accounts. This can disrupt business operations and immediately alert system administrators to suspicious activity. For example, if the policy locks accounts after five failed login attempts, spraying several passwords too quickly across many accounts could trigger a mass lockout event. By reviewing the password policy first, the penetration tester can design a controlled and stealthy spraying strategy. Knowing the lockout threshold allows the tester to limit attempts to safe numbers and space them out over time.
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
13
64
483
28.6K
Callum Stewart
Callum Stewart@stewart_sec·
@sekurlsa_pw @RedHatPentester So from a low priv user you can determine if a PSO exists and which users it applies to but you can’t see the policy details. W/ a DA acct you can see policy details. If I see a PSO I just refuse to spray any users that it applies to unless the client will tell me the details
English
2
0
9
5.6K
Pixis ری ٹویٹ کیا
SafeBreach
SafeBreach@safebreach·
SafeBreach Labs discovered a critical RCE vulnerability in the MS-EVEN RPC protocol that allowed low-privileged domain users to write arbitrary files and run code on remote Windows 11 and Windows Server 2025 computers in the domain. Get the full breakdown: hubs.ly/Q043PMZ-0
SafeBreach tweet media
English
3
27
54
7.1K
Pixis ری ٹویٹ کیا
Sean Metcalf
Sean Metcalf@PyroTek3·
In Active Directory, there is a method that’s been around for many years which changes the password last set date but not the actual password. This is what I call a “fake password change” since the account appears to have a recent password when scanning for old passwords based on password last set, but the underlying password hasn’t actually changed. I spoke about this in my 2015 @BSidesCharm talk which was my first conference talk. More details including step-by-step screenshots are here: adsecurity.org/?p=4969 Why does this happen? There are times where service account (or admin accounts) need to have password changes, but someone doesn’t want to do the work to change them. The ability to fake a password change requires modify rights on the pwdLastSet attribute which provides the ability to check/uncheck the setting “User must change password at next logon”. This setting is enabled when you want the user to change their own password when they logon. How does this work? This is simple to do when you have rights on the target account (in this example the password last changed in August 2025). We open up Active Directory Users and Computers (ADUC), double-click on the target account to open up the account properties and then click on the Account tab. From here we check the box for “User must change password at next logon” and click Apply. The PasswordLastSet date is now blank. Which makes it seem like the account has never had a password set. We continue with our process where we uncheck the box for “User must change password at next logon” we checked and then click Apply. After performing this action, the password change date has now been set to the current date and time even though the password itself hasn’t been changed since August 2025. We have successfully faked a password change! Why does this happen? This happens because the “User must change password at next logon” option is used to force a user to change their password at next logon. With it checked, Active Directory is waiting for the user to attempt to logon which is when the user is directed to change their password. During this time the PasswordLastSet value is blank since it is waiting for a new password. Once the user changes their password, the checkbox is effectively removed and the current date and time are set for the user’s passwordlastset property (technically this is the “pwdlastset” attribute, but the AD PowerShell cmdlets use that property). An attacker could use this technique for an account with an old password they discover and have control of the account (with the ability to flip this bit). This would show that the password changed without it actually changing. Detect fake Active Directory password changes at scale I wrote a PowerShell script that will scan either the Active Directory Admins or All Users in the domain to see if there’s a fake password change that has been performed on them. github.com/PyroTek3/Activ…
Sean Metcalf tweet mediaSean Metcalf tweet mediaSean Metcalf tweet media
English
6
156
981
97.4K
Pixis ری ٹویٹ کیا
Co11ateral
Co11ateral@co11ateral·
How Hackers Defeat Microsoft’s 2026 NTLM Patch As Microsoft moves away from NTLM auth in favor of Kerberos, we published an article showing several ways attackers can abuse Kerberos to move laterally The new patch won’t prevent lateral movement. It will mainly complicate things for those who relied heavily on NTLM. You still need to secure systems. That's why we provided recommendations on how to better secure your systems against these techniques hackers-arise.com/digital-forens… @three_cube @_aircorridor @DI0256 #dfir #blueteam #redteam #pentesting #apt #ThreatHunting
Co11ateral tweet media
English
1
73
293
15.7K
Pixis ری ٹویٹ کیا
Or Yair
Or Yair@oryair1999·
New blog & exploit about CVE-2025-29969 - RCE by Yarin Aharoni @safebreach Labs. Findings allow: ---- * Checking arbitrary paths existence (unfixed!). * Writing files remotely (RCE). ---- On ALL Windows & Windows Server computers in the domain! Repo - github.com/SafeBreach-Lab…
English
1
34
97
6.5K
Pixis
Pixis@HackAndDo·
Un beau travail de R&D de la part d'un collègue sur Keeper Forcefield, extension d'un password manager ayant pour objectif de limiter l'accès à sa mémoire aux attaquants qui tenteraient d'extraire les credz. Forcefield a depuis été mis à jour corriger les faiblesses identifiées.
Login Sécurité@LoginSecurite

L'utilisation de gestionnaires de mots de passe est une pratique courante et recommandée pour des raisons de sécurité. ⚠️ Une de ses limitations ? La compromission d'un poste de travail peut entraîner le vol des secrets du gestionnaire.

Français
0
3
9
3.2K
Pixis
Pixis@HackAndDo·
@DanielLubel Really glad you liked it, go relay some stuff, long live ntlm relay ✨
English
0
0
3
424
Pixis ری ٹویٹ کیا
Hack'n Speak
Hack'n Speak@hacknspeak·
🎙️🇫🇷 Nouvel épisode du podcast Hack'n Speak accompagné de Denis Germain alias Zwindler 🔥 Pour la première fois dans le podcast, on aborde Kubernetes et la sécurité d'une infra kube ! 🏴‍☠️ Encore merci à Denis pour son retour d'expérience 💪 creators.spotify.com/pod/profile/ha…
Français
0
5
14
2.4K
Pixis ری ٹویٹ کیا
Logan Goins
Logan Goins@_logangoins·
I ended up quickly modifying ntlmrelayx to support these changes so that relays to LDAP are possible again, thanks y'all for your hard work on figuring this out! You can find the changes here: github.com/logangoins/imp…
RedTeam Pentesting@RedTeamPT

🚀Our tool keycred for KeyCredentialLinks and Shadow Credential attacks now works with updated domain controllers again! It turns out, Microsoft violated their own specs. Try it out: github.com/RedTeamPentest…

English
0
32
86
8.3K
Pixis ری ٹویٹ کیا
Andrea P
Andrea P@decoder_it·
Lots of recent posts on NTLM reflection → AD compromise. To be clear: real fix is CVE-2025-54918, not CVE-2025-33073. Until Oct 2025, any user could own a 2025 domain if DCs ran Print Spooler. shorturl.at/4WpRh
English
1
55
195
12.3K
Pixis ری ٹویٹ کیا
n00py
n00py@n00py1·
NTLM reflection attacks can be used to compromise Active Directory domains even with SMB signing if systems aren’t fully patched depthsecurity.com/blog/using-ntl…
English
4
118
373
23.8K
Pixis ری ٹویٹ کیا
Secorizon
Secorizon@secorizon·
Soon you will understand how it was possible to find that kind of bug: github.com/lgandx/PoC/blo… on the most fuzzed authentication protocol ever.
English
2
13
46
5K
Pixis ری ٹویٹ کیا
Secorizon
Secorizon@secorizon·
Today at Secorizon we released CCrawlDNS v1.0 an open source passive reconnaissance tool using Common Crawl dataset. This tool is specifically designed for pentesters looking to passively map subdomains of a given target. github.com/lgandx/CCrawlD…
English
0
1
16
1.1K
Pixis ری ٹویٹ کیا
Secorizon
Secorizon@secorizon·
Today Secorizon is releasing OffByWon, an advanced network protocol fuzzing framework. This tool allows you to bring chaos to drivers, servers, parsers. A minimal demo client performing a complete fuzzable LDAP NTLM authentication is included. Several advanced functionalities are included in this framework such as BER/ASN tag scan -> byte bruteforce (0-255)/tag, deltas len +1/-1|+2/-2|etc, array overflow builder, combined fuzzing: structured + byte flip, blind fuzzing: truncate/add/switch/etc bytes at random offsets, etc Happy fuzzing! github.com/secorizon/OffB…
Secorizon tweet mediaSecorizon tweet mediaSecorizon tweet mediaSecorizon tweet media
English
2
49
150
11K