HTTP418

97 posts

HTTP418 banner
HTTP418

HTTP418

@HTTP418InfoSec

Breaking stuff and writing about it

加入时间 Nisan 2021
284 关注294 粉丝
HTTP418
HTTP418@HTTP418InfoSec·
For the last few weeks I’ve been trying to build a usable AI Vishing model as cheaply as possible, hopefully my post may help others who are considering doing something similar! http418infosec.com/developing-an-…
English
0
3
6
872
Lampros
Lampros@lampnout·
Reflecting on a recent engagement, I gained new insight on how a standard user can perform searches on Active Directory using native Windows functionality. I was adamant about this functionality and documented it on this post stmxcsr.com/micro/search-a… for future reference
English
3
9
72
6.4K
HTTP418 已转推
Chris Thompson
Chris Thompson@_Mayyhem·
I wrote a script to identify every TAKEOVER and ELEVATE attack in Misconfiguration Manager that can be run with Read-only Analyst privileges or higher in SCCM. Please share with your IT admins, defenders, clients, assessors, and friends in infosec! posts.specterops.io/rooting-out-ri…
English
1
136
342
40.2K
HTTP418 已转推
Cybersecurity and Infrastructure Security Agency
Today the Cyber Safety Review Board released its independent review of the Summer 2023 Microsoft Exchange Online intrusion laying out what led to the intrusion & what industry & gov't can do to ensure an intrusion at this magnitude does not happen again. go.dhs.gov/JRT
Cybersecurity and Infrastructure Security Agency tweet media
English
7
117
251
148.3K
HTTP418 已转推
Justin Elze
Justin Elze@HackingLZ·
Amazon is the new source for OST 🔥🔥
Justin Elze tweet media
English
22
83
625
80.6K
HTTP418
HTTP418@HTTP418InfoSec·
The GoPhish API can be used for some fun and games, my latest post shows how single use phishing links can be made using GoPhish + AWS SES! http418infosec.com/one-time-phish…
English
0
1
2
177
HTTP418 已转推
s1zz
s1zz@s1zzzz·
MachineAccountQuota = 0, preventing you from grabbing NAA creds remotely? DPAPI to the rescue! Ported over NAA Extraction via DPAPI to sccmhunter. h/t: @agsolino & @clavoillotte for SystemDPAPI.py
s1zz tweet medias1zz tweet media
English
5
80
311
67.4K
Chris Thompson
Chris Thompson@_Mayyhem·
You can take over SCCM by granting yourself Full Administrator privileges in the site database all in one go without a SOCKS proxy or waiting for an AdminID by using ntlmrelayx's -q option and nested SQL queries. You can require EPA to prevent this!
Chris Thompson tweet media
English
2
90
285
35.2K
LuemmelSec
LuemmelSec@theluemmel·
@HTTP418InfoSec Really awesome and comprehensive. Thanks. Also like your other blog posts ;)
English
1
0
0
360
HTTP418
HTTP418@HTTP418InfoSec·
I have just written a post (http418infosec.com/offensive-sccm…) summarising the various published SCCM attacks, from PXE enumeration through to Site Takeovers 1/2
English
2
36
89
7.5K
HTTP418 已转推
mr.d0x
mr.d0x@mrd0x·
Didn't have time to talk about the newly released TLDs last week, but here we go. File Archiver In The Browser: Emulating file archive software in the browser with a .zip domain for phishing mrd0x.com/file-archiver-…
English
11
138
368
99K
HTTP418
HTTP418@HTTP418InfoSec·
I've just published a post on how Cypher language can be used to assess & audit an AD environment with some of its more complex features (1/2) http418infosec.com/2023/05/19/blo…
English
1
19
58
4.8K