Memory_before's profile picture. Hey👋 , XiaoliChan is here

XiaoliChan

@Memory_before

Hey👋 , XiaoliChan is here

XiaoliChan reposted

ADCSDevilCOM 📍 A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB…


XiaoliChan reposted

Small update on "printerbugnew:" added a description of how to exploit CVE-2025-54918: DCs running 2025 allow reflection RPC->LDAPS - from a standard user to DA before patch😃 github.com/decoder-it/pri…


XiaoliChan reposted

Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. research.google/resources/data… Dataset is available for download at: ▪️console.cloud.google.com/storage/browse… [Login required] ▪️gs://net-ntlmv1-tables

sekurlsa_pw's tweet image. Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. 
research.google/resources/data…
Dataset is available for download at:
▪️console.cloud.google.com/storage/browse… [Login required]
▪️gs://net-ntlmv1-tables

XiaoliChan reposted

Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used. Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.

decoder_it's tweet image. Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used.
Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.
decoder_it's tweet image. Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used.
Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.

XiaoliChan reposted

The watchTowr team has broken down the Oracle EBS unauth RCE exploit chain (tagged as CVE-2025-61882). Important to note: it is not one vulnerability, but multiple chained together. As always, we'll share more soon.

watchtowrcyber's tweet image. The watchTowr team has broken down the Oracle EBS unauth RCE exploit chain (tagged as CVE-2025-61882).

Important to note: it is not one vulnerability, but multiple chained together. 

As always, we'll share more soon.

XiaoliChan reposted

LOLBASline - a PowerShell tool designed to assess the presence and execution capabilities of Living Off The Land Binaries and Scripts (LOLBAS) on Windows systems. github.com/magicsword-io/…


XiaoliChan reposted

Bypassing EDR to dump LSA secrets orangecyberdefense.com/global/blog/cy…

5mukx's tweet image. Bypassing EDR to dump LSA secrets

orangecyberdefense.com/global/blog/cy…
5mukx's tweet image. Bypassing EDR to dump LSA secrets

orangecyberdefense.com/global/blog/cy…

XiaoliChan reposted

Writeup from @mael91620 is now available 🎉 From coerce into SPN less RBDC, gmsa decryption, dpapi, constraint delegation w/t protocol transition​ to ntds dissection ! 😈 Congrats to the one who solved it 🥇@rayanlecat 🥈@_bluesheet & 🐊 🥉@_sans23 ➡️github.com/mael91620/Barb…

I can confirm there will be a Windows Active Directory lab at @_barbhack_ 🏴‍☠️ This is an insane lab for the time allowed, be prepare and make sure your tools are up to date ! 🎯👿



XiaoliChan reposted

Did you know that Entra ID SIDs start S-1-12-1 whereas (legacy?) AD domain and local normal accounts start S-1-5-21 ?

guyrleech's tweet image. Did you know that Entra ID SIDs start S-1-12-1 whereas (legacy?) AD domain and local normal accounts start S-1-5-21 ?

XiaoliChan reposted

Dive into PEB Walk in Malware Analysis fareedfauzi.github.io/2024/07/13/PEB…

5mukx's tweet image. Dive into PEB Walk in Malware Analysis

fareedfauzi.github.io/2024/07/13/PEB…

XiaoliChan reposted

From NTLM relay to Kerberos relay: Everything you need to know decoder.cloud/2025/04/24/fro…

5mukx's tweet image. From NTLM relay to Kerberos relay: Everything you need to know

decoder.cloud/2025/04/24/fro…

XiaoliChan reposted

Made some changes to SoaPy to allow ADWS recon to be ingested into @Tw1sm 's BOFHound offline for upload to BloodHound. A blog detailing an operational perspective of ADWS collection from Linux with BloodHound is coming soon. For now, the changes are here: github.com/logangoins/Soa…


XiaoliChan reposted

This is so much! 🔥🔥😎 Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth is done which could be relayed to LDAP without Signing enabled. Or relayed to ADCS for a certificate. github.com/warpnet/MS-RPC…


XiaoliChan reposted

Wanna see something cool about RDP and NetExec ?

mpgn_x64's tweet image. Wanna see something cool about RDP and NetExec ?

XiaoliChan reposted

Onboard yourself - PaloAlto Global Protect edition: 1. Become local admin 2. Export device cert from original workstation 3. Import cert in your VM 4. Login with user creds 5. Enjoy EDR-free testing :)

0x64616e's tweet image. Onboard yourself - PaloAlto Global Protect edition:
1. Become local admin
2. Export device cert from original workstation
3. Import cert in your VM
4. Login with user creds
5. Enjoy EDR-free testing :)
0x64616e's tweet image. Onboard yourself - PaloAlto Global Protect edition:
1. Become local admin
2. Export device cert from original workstation
3. Import cert in your VM
4. Login with user creds
5. Enjoy EDR-free testing :)

XiaoliChan reposted

updated my ADCS cheatsheet seriotonctf.github.io/ADCS-Attacks-w…


XiaoliChan reposted

Doppelganger: An Advanced LSASS Dumper with Process Cloning labs.yarix.com/2025/06/doppel…


XiaoliChan reposted

NtSockets: An Improved Version of HTTP File Downloader using NtCreateFile and NtDeviceIoControlFile Code: github.com/Whitecat18/Rus… #poc #bypass #winsockets #rust

5mukx's tweet image. NtSockets: An Improved Version of HTTP File Downloader using NtCreateFile and NtDeviceIoControlFile

Code: github.com/Whitecat18/Rus…

#poc #bypass #winsockets #rust

Loading...

Something went wrong.


Something went wrong.