_nickzer0's profile picture. Red teamer @hsbc 💻/ F1 enthusiast 🏎️/ Brazilian Jiu Jitsu ragdoll 🥋

Nick Pėarce

@_nickzer0

Red teamer @hsbc 💻/ F1 enthusiast 🏎️/ Brazilian Jiu Jitsu ragdoll 🥋

Nick Pėarce reposted

Thanks to everyone that came to my talk (and wished my older son happy birthday with me) @defcon . Still not vanned, still pwning bad guys ! #defcon32

evstykas's tweet image. Thanks to everyone that came to my talk (and wished my older son happy birthday with me) @defcon . Still not vanned, still pwning bad guys ! #defcon32

Verifying myself: I am nickzer0 on Keybase.io. vy_8I_8Ku3qq_JL_mcRpeAHKbrxfFimyNFCH / keybase.io/nickzer0/sigs/…


Nick Pėarce reposted

Been prepping the POC for my potential talk at DEF CON this year (if accepted). A side affect of this is that I now have the ability to do direct instant Secure DNS updates to AD DNS over port 53 using any authenticated account, yay.

_EthicalChaos_'s tweet image. Been prepping the POC for my potential talk at DEF CON this year (if accepted).  A side affect of this is that I now have the ability to do direct instant Secure DNS updates to AD DNS over port 53 using any authenticated account, yay.
_EthicalChaos_'s tweet image. Been prepping the POC for my potential talk at DEF CON this year (if accepted).  A side affect of this is that I now have the ability to do direct instant Secure DNS updates to AD DNS over port 53 using any authenticated account, yay.

Nick Pėarce reposted

I finally had some time to port Adam Chester's (@_xpn_) amazing research on requesting and unobfuscating NAA credentials from Python into SharpSCCM.

_Mayyhem's tweet image. I finally had some time to port Adam Chester's (@_xpn_) amazing research on requesting and unobfuscating NAA credentials from Python into SharpSCCM.

Red Teamers everywhere:

_nickzer0's tweet image. Red Teamers everywhere:

You must avoid at all costs the idea that you can manage learning several skills at a time. You need to develop your powers of concentration and understand that trying to multitask will be the death of the process.



Nick Pėarce reposted

As promised folks. New blog post and PIVert tool release for ADCS and living off the land.

This post is unavailable.

Trevor's courses are the best I've found for learning Go, go go go!

5 Day Sale! Get my courses at the BEST price Udemy allows me to offer. Use coupon code: AGSL22. This code is valid until August 27, 2022 7:00 AM PDT. Working with React and Go (Golang) udemy.com/course/working… #udemy #udemycoupon #udemy_coupon #react #go #golang

tsawler's tweet image. 5 Day Sale! Get my courses at the BEST price Udemy allows me to offer. Use coupon code: AGSL22. This code is valid until August 27, 2022 7:00 AM PDT. 

Working with React and Go (Golang)
udemy.com/course/working…

#udemy #udemycoupon #udemy_coupon #react #go #golang


Nick Pėarce reposted

New blog: "Abusing forgotten permissions on computer objects in Active Directory". The post is a dive into permissions that are set when you pre-create computer accounts the wrong way, why BloodHound missed those and how to abuse, fix, or monitor for this. dirkjanm.io/abusing-forgot…


Nick Pėarce reposted

Not written in a while had this in drafts for a few months(writing a bit each weekend) but finished it off today blog.zsec.uk/azure-fundamen… going to write up a few other parts, probably on some other Azure technologies as I continue my learning path. #RedTeam #BlueTeam


Nick Pėarce reposted

Extremely excited to announce that I will be doing a talk about my adventures hacking bootloaders in mobile devices at the Qualcomm Product Security Summit! #qpss22


Nick Pėarce reposted

I'm going to <semi> live tweet this Internal Penetration Test. Calling the company Acme Important notes: Assumed Breach (Already have a Debian based image, no creds, but solely for the sake of having tools locally) Landing in the SWIFT gateway network Flags: DA/SWIFT 1/x


🔥

[#HackTip ⚒] So, you’ve got a DA but feel like missing some plaintext credz or other valuable info in the infrastructure? Inspecting sensitive users’ habits by shadow monitoring their RDP sessions may set you on the right path 👀 #ad #pentest #rdp #shadow

snovvcrash's tweet image. [#HackTip ⚒] So, you’ve got a DA but feel like missing some plaintext credz or other valuable info in the infrastructure? Inspecting sensitive users’ habits by shadow monitoring their RDP sessions may set you on the right path 👀

#ad #pentest #rdp #shadow


Google just leaked Russias nudes 😂

Google Maps has stopped hiding Russia’s secret military & strategic facilities. Allowing anyone in the public to view. Open sourcing all secret Russian installations: including ICBMs, command posts and more with a resolution of 0.5m per pixel.

jon96179496's tweet image. Google Maps has stopped hiding  Russia’s secret military &amp;amp; strategic facilities. Allowing anyone in the public to view. 

Open sourcing all secret Russian installations: including ICBMs, command posts and more with a resolution of 0.5m per pixel.
jon96179496's tweet image. Google Maps has stopped hiding  Russia’s secret military &amp;amp; strategic facilities. Allowing anyone in the public to view. 

Open sourcing all secret Russian installations: including ICBMs, command posts and more with a resolution of 0.5m per pixel.
jon96179496's tweet image. Google Maps has stopped hiding  Russia’s secret military &amp;amp; strategic facilities. Allowing anyone in the public to view. 

Open sourcing all secret Russian installations: including ICBMs, command posts and more with a resolution of 0.5m per pixel.
jon96179496's tweet image. Google Maps has stopped hiding  Russia’s secret military &amp;amp; strategic facilities. Allowing anyone in the public to view. 

Open sourcing all secret Russian installations: including ICBMs, command posts and more with a resolution of 0.5m per pixel.


Loading...

Something went wrong.


Something went wrong.