psycep_'s profile picture. @Mandiant Red Teamer / Something something views are my own

Jacob Paullus

@psycep_

@Mandiant Red Teamer / Something something views are my own

Jacob Paullus reposted

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 ibm.com/think/x-force/…


Jacob Paullus reposted

Publishing a new blog and tool tomorrow 👀


The tool is release ready, someone give me motivation to write a blog


Planning a new blog+tool release, stay tuned 👀


ANOTHA ONE ☝️ check out our latest @Mandiant blog, showcasing the terrifying Browser-in-the-Middle techniques of the modern social engineer cloud.google.com/blog/topics/th…


Our blog on CVE-2023-6080 is here 💥 check it out! We detail the discovery and exploitation process, going from low privilege to SYSTEM 😎 cloud.google.com/blog/topics/th…


T-Minus two weeks until my first Mandiant blog as the principal author drops as well 🥳 (Detailing the discovery of CVE-2023-6080)

Contributed to my first Mandiant blog on web applications, check it out! Officially on my way to becoming a certified web boy (pls no) 🕸️🕸️ cloud.google.com/blog/topics/th…



Contributed to my first Mandiant blog on web applications, check it out! Officially on my way to becoming a certified web boy (pls no) 🕸️🕸️ cloud.google.com/blog/topics/th…


Jacob Paullus reposted

Excited to finally share some details of my favorite CVE, discovered with @psycep_ (definitely give him a follow)! This one’s a fun local privilege escalation vulnerability in Lakeside Software’s SysTrack LsiAgent Installer – CVE-2023-6080 🤜🤛 github.com/mandiant/Vulne…


A long time in the making, my first credited CVE! cve.org/CVERecord?id=C… w/ @AndrewOliveau and Jake Rawlins


It got delayed :’(

My first Mandiant blog drops Thursday 🥳



My first Mandiant blog drops Thursday 🥳


Disclosed my first 0-day today (with @AndrewOliveau)


Jacob Paullus reposted

Another option is to run “openssl s_client -connect <DC>:636 -showcerts -debug” and look for the CA server tied to the domain controller.

Wanna blindly check if the ADCS web enroll is installed on a domain ? Bruteforce the /certenroll endpoint without the trailing/ on all webservers. If you hit the ADCS web enroll you will get a location: /certenroll/ header in the response. Now enjoy blind ntlmrelayx ESC8👀👀👀

Defte_'s tweet image. Wanna blindly check if the ADCS web enroll is installed on a domain ? Bruteforce  the /certenroll endpoint without the trailing/ on all webservers. If you hit the ADCS web enroll you will get a location: /certenroll/ header in the response. Now enjoy blind ntlmrelayx ESC8👀👀👀


United States Trends

Loading...

Something went wrong.


Something went wrong.