ConsciousHacker's profile picture. Adversary Simulation @ IBM's X-Force Red.

Chris Spehn

@ConsciousHacker

Adversary Simulation @ IBM's X-Force Red.

置頂

Today I'm releasing WFH Dridex, another approach to automatically identify and validate DLL sideloading opportunities inspired by the Dridex loader. I also submitted a pull request to @Wietze's HijackLibs project with 507 entries from C:\Windows\System32. github.com/ConsciousHacke…

ConsciousHacker's tweet image. Today I'm releasing WFH Dridex, another approach to automatically identify and validate DLL sideloading opportunities inspired by the Dridex loader. I also submitted a pull request to @Wietze's HijackLibs project with 507 entries from C:\Windows\System32.

github.com/ConsciousHacke…

Chris Spehn 已轉發

🔥Fire research by the team! Great talk on compromising cloud AI providers via a GPU kernel 0day by Valentina Palmiotti (@chompie1337) & Samuel Lovejoy (@_dinolover38) youtube.com/watch?v=Lvz2_Z…

retBandit's tweet card. HEXACON 2025 - CUDA de Grâce by Valentina Palmiotti & Samuel Lovejoy

youtube.com

YouTube

HEXACON 2025 - CUDA de Grâce by Valentina Palmiotti & Samuel Lovejoy


Chris Spehn 已轉發

Wish I could RT this 100x. There is no such thing as messing up with this stuff 👏🏼 Just delete the VM and start over with more knowledge than you did before

I am happy that you like my writeup! You should definitely try this challenge, you gonna learn a lot. And if you mess up, what is the harm? You can start over again. Just be patient with it and with yourself. The next #FlareOn13 is going to be next autumn



Chris Spehn 已轉發

#MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. We're releasing a management tool and rule repository in YAML format to share new rules with the community. medium.com/falconforce/mi…

olafhartong's tweet image. #MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. 

We're releasing a management tool and rule repository in YAML format to share new rules with the community.

medium.com/falconforce/mi…

Chris Spehn 已轉發

SCCM’s AdminService uses Entra tokens without confirming the UPN exists in AD. A crafted synced UPN can let an attacker impersonate the site server. Microsoft now requires on-prem SID matching (CVE-2025-59501). Great deep dive by @unsigned_sh0rt! ghst.ly/43wTzLx

SpecterOps's tweet image. SCCM’s AdminService uses Entra tokens without confirming the UPN exists in AD. A crafted synced UPN can let an attacker impersonate the site server. Microsoft now requires on-prem SID matching (CVE-2025-59501). 

Great deep dive by @unsigned_sh0rt!

ghst.ly/43wTzLx

Chris Spehn 已轉發

Seeing a lot of bad takes on Anthropic's incident report. A lot of people are missing the point; offensive cyber capabilities in current models are a side-effect of being trained on coding datasets. As frontier model labs and private groups start to shift to tuning current models…

retBandit's tweet image. Seeing a lot of bad takes on Anthropic's incident report. A lot of people are missing the point; offensive cyber capabilities in current models are a side-effect of being trained on coding datasets. As frontier model labs and private groups start to shift to tuning current models…

Chris Spehn 已轉發

Released my first blog post today: specterops.io/blog/2025/11/1… And released SecretHound, a BloodHound OpenGraph extension for secrets: github.com/C0KERNEL/Secre…


Don't even bother reading the "full report" from Anthropic. Word salad.


Chris Spehn 已轉發

If you're into serious red teaming with a crazy skilled team we've got a US based opening! ibmglobal.avature.net/en_US/careers/…


SANS has made it a PITA, but results from local model(s) solve rate so far. We'll see how far we can go.

ConsciousHacker's tweet image. SANS has made it a PITA, but results from local model(s) solve rate so far. We'll see how far we can go.

Chris Spehn 已轉發

An Introduction into Stack Spoofing - dtsec.us/2023-09-15-Sta…


Chris Spehn 已轉發

Venom C2 tool drop! 🐍 During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. Some had EDR so we didn't want anything off-the-shelf. The server, agent, and client were made…

0xBoku's tweet image. Venom C2 tool drop! 🐍

During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. 

Some had EDR so we didn't want anything off-the-shelf.
The server, agent, and client were made…

Chris Spehn 已轉發

I bypassed user approvals and achieved RCE in VS Code Copilot by flipping 4 bits. Find out how: jro.sg/CVEs/copilot/ Thanks to @msftsecresponse for rapidly triaging and patching this vulnerability.


Chris Spehn 已轉發

''Decrypting credentials from SCCM site servers configured for high availability | IBM'' #infosec #pentest #redteam #blueteam ibm.com/think/x-force/…


Gollum should be the official name for GLM


Chris Spehn 已轉發

Any Canadian friends with strong red team backgrounds looking for an AdvSim spot? ibmglobal.avature.net/en_US/careers/…


Chris Spehn 已轉發

I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 specterops.io/blog/2025/10/3…


Chris Spehn 已轉發

New blog - Offsec Evals: Growing Up In The Dark Forest Caught up in the fervor of greenfield research at @OffensiveAIcon , we all agreed we were going to put out evals and benchmarks and push the field forward. On day two of the con, I got a question I've been thinking about…

shncldwll's tweet image. New blog - Offsec Evals: Growing Up In The Dark Forest

Caught up in the fervor of greenfield research at @OffensiveAIcon , we all agreed we were going to put out evals and benchmarks and push the field forward.

On day two of the con, I got a question I've been thinking about…

Chris Spehn 已轉發

Resurrected exclusively for recent cloud outages and events...

In case you were wondering...

bohops's tweet image. In case you were wondering...


Loading...

Something went wrong.


Something went wrong.