ret2src

778 posts

ret2src banner
ret2src

ret2src

@ret2src

Breaker of Stuff | Injector of 0x41 | Discoverer of Dumb Things | Creator of Glitches. Dropping shells since 0x7DC.

加入时间 Temmuz 2021
1K 关注358 粉丝
ret2src 已转推
Logan D
Logan D@relay_royalty·
Introducing RelayKing. github.com/depthsecurity/… Blog: depthsecurity.com/blog/introduci… Automatically identify relay attack paths. No longer will you be left to manually detect a comprehensive inventory of all the relaying vectors on your engagements. It will detect signing/EPA settings on all protocols you specify, NTLM reflection CVEs, and WebDav WebClient presence. Then, produce a comprehensive report of the relaying vectors on the network in your preferred output format. This ensures that you report ALL vulnerable instances easily, without the need for manual patching together of results from various tools. Ideal usage is with a set of low-privilege AD credentials, but it also supports unauthenticated scanning (with far less coverage). See GitHub and the blog post for more details. Please note that there ARE bugs. The LDAP(S) detection has been annoying but SHOULD be mostly solid. If you get suspicious results from it, please report an issue on GitHub with the config RelayKing reported, versus the actual one. Enjoy!
English
3
86
213
18.1K
ret2src 已转推
𝅙
𝅙@joaovarelas·
@ShitSecure Another way is to look for snapshots of a target VM and get the memory .vmem file. After converting the memory dump it should open in WinDbg and extract some secrets with Mimikatz extension.
English
1
1
26
1.9K
ret2src
ret2src@ret2src·
Welcome to the EU, where the lunatics in Brussels take everything from us. While it was narrowly prevented this time, the next act of pure fascism disguised as safety will come. 1984 in all its glory.
Jack Rhysider 🏴‍☠️@JackRhysider

EU's Chat Control proposal is to effectively ban end to end encryption since it demands that governments can read all msgs. I find this to be not only insane, but feasibly impossible. Breaking the whole internet. Yet it got voted on last week, and just narrowly stopped. Whew!

English
0
0
0
119
ret2src
ret2src@ret2src·
@VNchocoTaco When have the insides of Apple products become so ugly? Looks like a cheap Android phone, some parts don’t even seem to be straight. Is this the company so obsessed about details and perfection?
English
0
0
2
384
ShrimpApplePro 🍤 ずっと真夜中でいいのに
iPhone 17 pro teardown This year it is even easier to replace battery, the battery is now glued to the midframe and can be detached. You unscrew the midframe, the battery come out with it. The vapor chamber is on the midframe, connect the motherboard to the rest of the phone
ShrimpApplePro 🍤 ずっと真夜中でいいのに tweet mediaShrimpApplePro 🍤 ずっと真夜中でいいのに tweet mediaShrimpApplePro 🍤 ずっと真夜中でいいのに tweet mediaShrimpApplePro 🍤 ずっと真夜中でいいのに tweet media
English
36
160
2.1K
259.5K
ret2src 已转推
Daniel
Daniel@0x64616e·
My colleague Mathias and I just finished our talk about "Relaying Unprivileged Users to RCE" at @MCTTP_Con. You can find our slides at github.com/svaredteam/tal…
Daniel tweet media
English
3
15
69
4.3K
Nick VanGilder
Nick VanGilder@nickvangilder·
Microsoft: After extensive deliberation, Microsoft has decided to not participate in the evaluation this year. This decision allows us to focus all our resources on the Secure Future Initiative and on delivering product innovation to our customers. (techcommunity.microsoft.com/blog/microsoft…’s-participation-in-mitre-attck®-evaluations-enterprise-2025/4422639) S1: This decision was reached after a thorough review internally and is being made so that we can prioritize our product and engineering resources on customer-focused initiatives while accelerating our platform roadmap. (sentinelone.com/blog/sentinelo…) Palo Alto: After thoughtful evaluation of our priorities, we have decided to adjust the focus of our engineering and testing resources and will not be participating in this year’s MITRE evaluation. This decision enables us to further accelerate critical platform innovations that directly address our customers' most pressing security challenges and respond even faster to the evolving threat landscape. (paloaltonetworks.com/blog/security-…)
English
4
5
20
29.8K
ret2src 已转推
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
903
3.2K
472.8K
ret2src
ret2src@ret2src·
@techspence @Abdulmalik_TTG Will you still be reporting ESC1, even without a PoC? In our reports, we use a special tag called “inconclusive” for such cases.
English
2
0
2
55
spencer
spencer@techspence·
@Abdulmalik_TTG Couldn’t figure it out, and my engagement ended on Friday :-/
English
2
0
2
113
spencer
spencer@techspence·
Has anyone seen this error when attemptin to abuse an ESC1? "KRB_AP_ERR_USER_TO_USER_REQUIRED"
English
10
2
28
5.9K
ret2src 已转推
Two Seven One Three
Two Seven One Three@TwoSevenOneT·
#redteam Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe Github: 2x7EQ13/WSASS Experimental version: Windows 11 24H2 #Blueteam
Two Seven One Three tweet mediaTwo Seven One Three tweet mediaTwo Seven One Three tweet media
English
13
168
671
50.4K
ret2src 已转推
rekdt
rekdt@rekdt·
So embarrassing
rekdt tweet media
English
34
75
1.2K
49.1K
ret2src 已转推
blasty
blasty@bl4sty·
the jump scare of the morning award goes to @J0R1AN (it even adapts to different native calculators using UA-based OS detection :))
English
4
16
161
29.9K
ret2src
ret2src@ret2src·
@vysecurity LinkedIn is a huge cesspool of ass kissers. Can’t stand more than three of the BS posts on there before I feel a strong urge to close the app again.
English
0
0
0
55
Vincent Yiu
Vincent Yiu@vysecurity·
Man FML, every time I go on LinkedIn. It makes me realise how dumb it is.
Vincent Yiu tweet media
English
2
0
5
1.7K
ret2src 已转推
Chris Power
Chris Power@typecraft_dev·
The memes are on point today
Chris Power tweet media
English
39
175
2.9K
179.9K