SergeantMemory's profile picture.

@SergeantMemory

™ reposted

How I Fumbled $430,000 By Selling Too Soon I thought I was a genius when I turned $1K into $15K selling BNB at $30. Then it soared to $860… I missed out on $430K. The regret is real, but the lesson is bigger. Want to avoid my mistake? Read on 🧵


™ reposted

Based on the research of Akamai, I made a new module on netexec to find every principal that can perform a BadSuccessor attack and the OUs where it holds the required permissions 🔥 github.com/Pennyw0rth/Net…

mpgn_x64's tweet image. Based on the research of Akamai, I made a new module on netexec to find every principal that can perform a BadSuccessor attack and the OUs where it holds the required permissions 🔥

github.com/Pennyw0rth/Net…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

YuG0rd's tweet image. 🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…


™ reposted

ADCS attack paths in BloodHound! 🥳 This blog post breaks down the implementation of the ESC1 requirements and guides you on effectively leveraging BloodHound to identify attack paths that include ESC1 privileges. posts.specterops.io/adcs-attack-pa…


™ reposted

"Pentesting with Secure LDAP and LDAP Channel Binding" #infosec #pentest #redteam rootsecdev.medium.com/pentesting-wit…

CyberWarship's tweet image. "Pentesting with Secure LDAP and LDAP Channel Binding"

#infosec #pentest #redteam 
rootsecdev.medium.com/pentesting-wit…

™ reposted

The first version of an SMTP smuggling scanner is now available at github.com/The-Login/SMTP…. More tools to come! Feedback is much appreciated!


™ reposted

Merry Christmas, here is my gift to you 🎁 I'm releasing "Internal All The Things", which contains all my cheatsheets and methodologies for Active Directory, Internal Pentests and Cloud Assessments 🎅 swisskyrepo.github.io/InternalAllThe…


™ reposted

Do you store your "DNS dynamic update registration credentials" in a DHCP? Cute, it means I have a new tool for you 😁😈 Enjoy the DHCP Server DNS Password Stealer. The C source code, and the compiled exe, as usual: github.com/gtworek/PSBits…

0gtweet's tweet image. Do you store your "DNS dynamic update registration credentials" in a DHCP? 
Cute, it means I have a new tool for you 😁😈 
Enjoy the DHCP Server DNS Password Stealer. The C source code, and the compiled exe, as usual: github.com/gtworek/PSBits…

™ reposted

Got initial access to the azure cloud via token theft? Wondering what to do? Step 1: Roadrecon github.com/dirkjanm/ROADt… Commands: roadrecon auth —access-token roadrecon gather Bonus: extract conditional access policies roadrecon plugin policies -f caps.html Run GUI:…


™ reposted

"Infecting SSH Public Keys with backdoors" #infosec #pentest #redteam blog.thc.org/infecting-ssh-…

CyberWarship's tweet image. "Infecting SSH Public Keys with backdoors"

#infosec #pentest #redteam 
blog.thc.org/infecting-ssh-…

™ reposted

I was a little bit uncertain about expired AD passwords, but fortunately @n00py1 has a great blogpost about it: n00py.io/2021/09/resett… TL;DR: whether the password is MUST_CHANGE or EXPIRED, usually doesn't matter, you need to be able to change it remotely in different ways.

an0n_r0's tweet image. I was a little bit uncertain about expired AD passwords, but fortunately @n00py1 has a great blogpost about it: n00py.io/2021/09/resett… TL;DR: whether the password is MUST_CHANGE or EXPIRED, usually doesn't matter, you need to be able to change it remotely in different ways.

™ reposted

It's been quiet for a while around bloodhound Python, however I'm happy to share that I am now maintaining the project at my personal GitHub. The latest version fixes many bugs/issues, also thanks to the many PRs that were submitted (thanks all!). github.com/dirkjanm/blood…


™ reposted

"Most common Active Directory misconfigurations and default settings that put your organization at risk" #infosec #pentest #redteam blog.nviso.eu/2023/10/26/mos…

CyberWarship's tweet image. "Most common Active Directory misconfigurations and default settings that put your organization at risk"

#infosec #pentest #redteam 
blog.nviso.eu/2023/10/26/mos…

™ reposted

New tool by @Prepouce_ and @hackoura for local privilege escalation on a Windows machine, from a service account to NT SYSTEM. Should work on any recent versions of Windows. Watch out the explanatory blog: blog.hackvens.fr/articles/Coerc… And the tool : github.com/hackvens/Coerc…


™ reposted

You can do drop the mic and rbdc as per @n00py1 blog n00py.io/2022/10/practi…


™ reposted

My team just released a Kubernetes attack path tool named KubeHound! Release blog post (with examples) securitylabs.datadoghq.com/articles/kubeh… Website / docs: kubehound.io :D Should be able to handle large k8s env! Feedback welcome!


™ reposted

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. github.com/S1ckB0y1337/Ac…


™ reposted

New blog: Understanding Red to Be Better at Blue: Navigating New CrackMapExec Updates ✅Keeping up with the red team ✅Breaking down CME’s new key features ✅From code to behavioural hunting & detections ✅Illustrations with examples buff.ly/47Xm6KF


United States Trends

Loading...

Something went wrong.


Something went wrong.