Arris Huijgen

237 posts

Arris Huijgen banner
Arris Huijgen

Arris Huijgen

@bitsadmin

Windows Offensive Security Enthusiast 🤠 Blog: https://t.co/CAwdjs2rKS GitHub: https://t.co/YG2YOxfosm

Amsterdam, The Netherlands 加入时间 Mart 2016
107 关注1.7K 粉丝
Arris Huijgen 已转推
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿@_EthicalChaos_·
Small updated to DRSAT just pushed that will also allow Group Policy Editor and Certificate Authority / Templates MMC snap-ins work over a TCP only SOCKS connection. github.com/CCob/DRSAT
English
4
62
156
14.7K
Arris Huijgen
Arris Huijgen@bitsadmin·
🔎 Inspecting ACLs and file hashes using the Get-Acl and Get-FileHash cmdlets.
Arris Huijgen tweet media
English
1
0
1
215
Arris Huijgen
Arris Huijgen@bitsadmin·
Because the last release of #NoPowerShell was 2 years ago and to celebrate the repo has 999 stars, I just merged DEV ➡️ MASTER and published Release 1.50 containing over 60 offensive cmdlets! 🥳 github.com/bitsadmin/nopo… See examples of some of the cmdlets below 👇
English
1
46
141
8.3K
Stephan Berger
Stephan Berger@malmoeb·
During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands such as 'vssadmin list shadows', and may trigger alerts based on their use. However, by leveraging the "Previous Versions" feature in Windows (see screenshot), attackers can select a snapshot, view its properties, and enter the '@ GMT' path directly in Explorer. This allows them to browse the snapshot's contents without needing to use the command line. Because this technique doesn't rely on typical shadow copy commands, it may evade detection by your EDR or SIEM solution. You might want to test it in your environment to identify and close this potential detection gap 🦸‍♂️🦸‍♀️
Stephan Berger tweet media
English
23
234
980
74.7K
Arris Huijgen 已转推
Yuval Gordon
Yuval Gordon@YuG0rd·
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…
Yuval Gordon tweet media
English
22
371
878
166.8K
Arris Huijgen 已转推
Yehuda Smirnov
Yehuda Smirnov@yudasm_·
What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution? We explored process injection using nothing but thread context. Full write-up + PoCs: blog.fndsec.net/2025/05/16/the…
English
6
75
222
13.8K
Arris Huijgen 已转推
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Blogpost from my colleague about what’s still possible with recently published COM/DCOM toolings, Cross Session Activation and Kerberos relaying 🔥 r-tec.net/r-tec-blog-win…
English
3
111
306
26K
Arris Huijgen 已转推
Atsika
Atsika@_atsika·
ProxyBlob is alive ! We’ve open-sourced our stealthy reverse SOCKS proxy over Azure Blob Storage that can help you operate in restricted environments 🔒 🌐 github.com/quarkslab/prox… Blog post for more details right below ⬇️
quarkslab@quarkslab

Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure. Check out @_atsika's article on how it came to exist after an assumed breach mission ⤵️ 👉 blog.quarkslab.com/proxyblobing-i…

English
3
45
113
9.1K
Arris Huijgen 已转推
Andrea P
Andrea P@decoder_it·
I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…
English
2
150
351
19.6K
Arris Huijgen 已转推
Airbus Security Lab
Airbus Security Lab@AirbusSecLab·
We’re glad to announce we released Soxy!🚀 A Rust-powered suite of services for Citrix, VMware Horizon & Windows RDP. Red teams & pentesters can use it to pivot for deeper access. Get the tool and more details: 🔗 github.com/airbus-seclab/…
English
0
61
148
7.5K
Arris Huijgen 已转推
Neodyme
Neodyme@Neodyme·
Your laptop was stolen. It’s running Windows 11, fully up-to-date, device encryption (BitLocker) and Secure Boot enabled. Your data is safe, right? Think again! This software-only attack grabs your encryption key. Following up on our #38C3 talk: neodyme.io/blog/bitlocker…
English
2
29
85
5.9K