Alibabas 已轉發

Just published a summary of "modern" Windows authentication reflection attacks. Turns out reflection never really died. 😅decoder.cloud/2025/11/24/ref…


Alibabas 已轉發

During my research into COM/DCOM I stumbled upon a vulnerability that deletes the Boot Configuration Data (BCD) in the registry as low privileged user. For this vulnerability CVE-2025-59253 was assigned by Microsoft. warpnet.nl/blog/deleting-…


Remote management software from a major vendor contains a "built-in" Medium -> System escalation on Windows. Vendor calls it intentional. If you are a red teamer and find this during a pentest, note that escalation is easy. Thinking of a short blog post.


Reported a Local Privilege Escalation (LPE) vuln that was fixed by the CPU-Z developers. My name was mentioned in the official CPU-Z release notes: cpuid.com/softwares/cpu-…

0x_alibabas's tweet image. Reported a Local Privilege Escalation (LPE) vuln that was fixed by the CPU-Z developers.

My name was mentioned in the official CPU-Z release notes:
cpuid.com/softwares/cpu-…

Just got a reward for a high vulnerability submitted on @yeswehack -- Code Injection (CWE-94). 🫡 yeswehack.com/hunters/0x-ali… #YesWeRHackers

0x_alibabas's tweet image. Just got a reward for a high vulnerability submitted on @yeswehack -- Code Injection (CWE-94).
🫡 yeswehack.com/hunters/0x-ali… #YesWeRHackers

Alibabas 已轉發

#redteam Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe Github: 2x7EQ13/WSASS Experimental version: Windows 11 24H2 #Blueteam

TwoSevenOneT's tweet image. #redteam 
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam
TwoSevenOneT's tweet image. #redteam 
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam
TwoSevenOneT's tweet image. #redteam 
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam

Alibabas 已轉發

🚨 CALL 4 PAPERS — Bug Bounty Village @ H2HC 2025 🚨 Caçou um bug insano? Tem case real ou técnica nova? Esse é seu palco! Envie sua proposta pelo form: bit.ly/4n4hXf9 #H2HC #BugBountyVillage #Call4Papers #HackerCulture

BugBountyBr's tweet image. 🚨 CALL 4 PAPERS — Bug Bounty Village @ H2HC 2025 🚨

Caçou um bug insano? Tem case real ou técnica nova? Esse é seu palco! 

Envie sua proposta pelo form:
bit.ly/4n4hXf9

#H2HC #BugBountyVillage #Call4Papers #HackerCulture

I've got an arbitrary file (not folder) delete bug on hand. Anyone know the latest privilege escalation techniques on Windows 24H2, since the changes around ::$INDEX_ALLOCATION?


Alibabas 已轉發

🚀Exciting News! Introducing my latest work: Beyond XSS This series of articles aims to introduce front-end security topics, perfect for frontend devs and those intrigued by frontend security. Suitable for all skill levels from beginners to intermediates aszx87410.github.io/beyond-xss/en/


United States 趨勢

Loading...

Something went wrong.


Something went wrong.