stHackPointer's profile picture. Yet another Red Teamer

Aexyn

@stHackPointer

Yet another Red Teamer

Aexyn 님이 재게시함

Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does github.com/outflanknl/reg…


Aexyn 님이 재게시함

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


Aexyn 님이 재게시함

New attack vector: FileFix. A phishing trick that executes PowerShell straight from your browser no Run dialog, no pop-ups. Just a fake file path + clipboard + File Explorer. Red teamers, this one’s wild. 📽️ PoC + write-up: medium.com/@t3chfalcon/fi…

Great work 👏@mrd0x I'll try to replicate this "FileFix Attack Simulation" 💪



Aexyn 님이 재게시함

No one is likely surprised by this, but it does feed into the narrative of humanity actually dumbing down instead of becoming more intelligent. I have no empirical evidence at hand to support my gut feeling, but ever since the internet in general, I feel like we are dumber.

BREAKING: MIT just completed the first brain scan study of ChatGPT users & the results are terrifying. Turns out, AI isn't making us more productive. It's making us cognitively bankrupt. Here's what 4 months of data revealed: (hint: we've been measuring productivity all wrong)

itsalexvacca's tweet image. BREAKING: MIT just completed the first brain scan study of ChatGPT users & the results are terrifying.

Turns out, AI isn't making us more productive. It's making us cognitively bankrupt.

Here's what 4 months of data revealed:

(hint: we've been measuring productivity all wrong)


Aexyn 님이 재게시함

If you want to know about how helpdesk attacks really look like, @AnthonySecurity published the playbook. Practical read, of what really works - this stuff really works from my personal experience on RTs. You don't need crazy 0 days. Pick up the phone. praetorian.com/blog/helpdesk-…


Aexyn 님이 재게시함

By making minor changes to command-line arguments, it is possible to bypass EDR/AV detections. My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees. Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassing…

Wietze's tweet image. By making minor changes to command-line arguments, it is possible to bypass EDR/AV detections.

My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.

Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassing…

Aexyn 님이 재게시함

In our latest article, @croco_byte and @SScaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav HTTP authentication, enhancing the NTLM and Kerberos relaying capabilities of multicast poisoning attacks! synacktiv.com/publications/t…


Aexyn 님이 재게시함
n00py1's tweet image.

Aexyn 님이 재게시함

NetExec has a new Module: Timeroast🔥 In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective! Implemented by @Disgame_ 1/3🧵

al3x_n3ff's tweet image. NetExec has a new Module: Timeroast🔥

In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective!

Implemented by @Disgame_

1/3🧵

Aexyn 님이 재게시함

Excited to share a tool I've been working on - ShadowHound. ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them

yudasm_'s tweet image. Excited to share a tool I've been working on - ShadowHound.
ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them

Aexyn 님이 재게시함

Interesting Gmail Prv-Esc Exploit you can exploit most organization that use @GoogleWorkspace, and won't be fixed indicated by Google. I found this unintentional when working on SMTP/ DMARC, and accidentally forged my head-of-school's gmail account, bypassed access-control, and…

retr0reg's tweet image. Interesting Gmail Prv-Esc Exploit you can exploit most organization that use @GoogleWorkspace, and won't be fixed indicated by Google. 

I found this unintentional when working on SMTP/ DMARC, and accidentally forged my head-of-school's gmail account, bypassed access-control, and…

Aexyn 님이 재게시함

Aexyn 님이 재게시함

Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems. On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.

nyxgeek's tweet image. Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems.

On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.
nyxgeek's tweet image. Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems.

On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.

Aexyn 님이 재게시함

- How a single "?" can bypass Httpd’s built-in access control and auth. - How unsafe RewriteRules can escape the Web / and access the entire filesys. - How to leverage a piece of code from 1996 to transform an XSS into RCE. Must Read --> (credit link): blog.orange.tw/2024/08/confus…


Aexyn 님이 재게시함

Fun little IOC in impacket-smbserver's Negotiate Protocol Response 🙃

Octoberfest73's tweet image. Fun little IOC in impacket-smbserver's Negotiate Protocol Response 🙃

Aexyn 님이 재게시함

📢 Exciting news: today we announced CrowdStrike Falcon® Complete Next-Gen MDR to stop breaches with unprecedented speed and precision across the entire enterprise attack surface. 🔗 Full details on our blog: crwdstr.ke/6019iR6uv #Cybersecurity #MDR #AI #ThreatIntelligence

CrowdStrike's tweet image. 📢 Exciting news: today we announced CrowdStrike Falcon® Complete Next-Gen MDR to stop breaches with unprecedented speed and precision across the entire enterprise attack surface.

🔗 Full details on our blog: crwdstr.ke/6019iR6uv

#Cybersecurity #MDR #AI #ThreatIntelligence

Aexyn 님이 재게시함

You wouldn't see this with any of our products (just sayin.) 🤷

kaspersky's tweet image. You wouldn't see this with any of our products (just sayin.) 🤷

Aexyn 님이 재게시함

systemd-tmpfiles, deleting /home "systemd-tmpfiles --purge" will delete /home in systemd 256 tested with systemd-tmpfiles --dry-run --purge on @debian

DevuanOrg's tweet image. systemd-tmpfiles, deleting /home
"systemd-tmpfiles --purge" will delete /home in systemd 256
tested with systemd-tmpfiles --dry-run --purge on @debian

Aexyn 님이 재게시함

#Azure AD guests are much bigger problems then most of us think and #LCNC is adding to the problem - @inbarraz presents at #x33fcon #security

x33fcon's tweet image. #Azure AD guests are much bigger problems then most of us think and #LCNC is adding to the problem - @inbarraz presents at #x33fcon #security
x33fcon's tweet image. #Azure AD guests are much bigger problems then most of us think and #LCNC is adding to the problem - @inbarraz presents at #x33fcon #security

Loading...

Something went wrong.


Something went wrong.