@ShitSecure Another way is to look for snapshots of a target VM and get the memory .vmem file. After converting the memory dump it should open in WinDbg and extract some secrets with Mimikatz extension.
Welcome to the EU, where the lunatics in Brussels take everything from us. While it was narrowly prevented this time, the next act of pure fascism disguised as safety will come. 1984 in all its glory.
Welcome to the EU, where the lunatics in Brussels take everything from us. While it was narrowly prevented this time, the next act of pure fascism disguised as safety will come. 1984 in all its glory.
My colleague Mathias and I just finished our talk about "Relaying Unprivileged Users to RCE" at @MCTTP_Con. You can find our slides at github.com/svaredteam/tal…
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
#redteam
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam
Best Citrix Breakout ever. You can only download .ica files that provide access to certain local applications but breakout out of these applications is not possible? Just modify the .ica file before starting it and remove The InitialProgram= value -> Full Citrix Session! 🤓
The second book in my “being a professional red teamer requires more than just having kick ass technical tradecraft” series is: “Never Split the Difference” by Chris Voss.
The reason I picked this book is because red teams rarely control the environments they are operating in.…
The first book in my “being a professional red teamer requires more than just having kick ass technical tradecraft” series is: “Thanks for the Feedback” by Douglas Stone & Sheila Heen.
The reason I recommend this book is simple: red teamers spend _a lot_ of time delivering…
I stopped reporting Internet-exposed Citrix Netscaler instances as a vulnerability because dozens of customers argued with me that “it is intended to be exposed directly to the Internet”. I was right all along and will start reporting it again starting today.
I stopped reporting Internet-exposed Citrix Netscaler instances as a vulnerability because dozens of customers argued with me that “it is intended to be exposed directly to the Internet”. I was right all along and will start reporting it again starting today.
“Once you start a Windows machine, it will first attempt to obtain network configuration via DHCPv6 […] due to Windows’ preference for IPv6. […] even if your network does not actively use IPv6.”
This makes poisoning using mitm6 especially dangerous:
resecurity.com/blog/article/m…
Feeling too familiar with using Sysmon? You can use it for #redteam purposes by having it overwrite the #antimalware executable. Just like I did with #windowsdefender
1K Followers 1K FollowingNot Your Regular Security Researcher | Hat off to all security researchers who shared their research | eJPT v2 | Pentest+ | OSCP
14K Followers 1K FollowingTeam @hashcat! Eternal n00b and knowledge seeker! Age is just a number and motivation is the fuel!
Whatever you do in your life, do not forget to be humble.
2 Followers 172 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/k37v4g7kfW
1.1M Followers 309 FollowingNYT Bestselling Author of The 5 Types of Wealth. Gave up a grand slam on ESPN in 2012 and still waiting for it to land. Order my book below 👇
1K Followers 1K FollowingNot Your Regular Security Researcher | Hat off to all security researchers who shared their research | eJPT v2 | Pentest+ | OSCP
13K Followers 493 FollowingWe're determined to make the world a safer place through our-industry recognized managed security services.
Founded by @HackingDave|Sister company @TrustedSec
89K Followers 75 FollowingHi! I'm Dave Plummer. You might remember me from such Windows components as Task Manager, Windows Pinball, Calc, ZIPFolders, Product Activation, etc. Cheers!
102K Followers 147 FollowingA portable multi-tool device in a toy-like body for pentesters and hardware geeks. Buy worldwide here ➡️ https://t.co/n09EKVnqri
2K Followers 674 FollowingCybersec/AI expert | Hacker | Pilot | OSCE3, CISSP, CCNP, CSIE | Better than a thousand hollow words is one word that brings peace | meme magic 🐸
109K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
10K Followers 1K FollowingPenetration Testing, Purple Team, Red Team & Adversary Emulation, Security Posture Review and Training
Let our Offense, Prepare your Defense.
#weareoffensive
25K Followers 27K FollowingA Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP