😈 [ Elastic Security Labs @elasticseclabs ]
Dive deep into malware detection with the latest article by John Uhlmann: "Call Stacks: No More Free Passes for Malware." Discover how call stacks provide vital insights into malware behavior. Read more:
🔗 https://www.elastic.co/security-labs/call-stacks-no-more-free-passes-for-malware/
🐥 [ tweet ]
Dive deep into malware detection with the latest article by John Uhlmann: "Call Stacks: No More Free Passes for Malware." Discover how call stacks provide vital insights into malware behavior. Read more:
🔗 https://www.elastic.co/security-labs/call-stacks-no-more-free-passes-for-malware/
🐥 [ tweet ]
👍3🔥2
😈 [ SpecterOps @SpecterOps ]
Introducing the BloodHound Query Library!
📚 https://queries.specterops.io/
@martinsohndk & @joeydreijer explore the new collection of Cypher queries designed to help BloodHound users to unlock the full potential of the BloodHound platform by creating an open query ecosystem.
🔗 https://specterops.io/blog/2025/06/17/introducing-the-bloodhound-query-library/
🐥 [ tweet ]
Introducing the BloodHound Query Library!
📚 https://queries.specterops.io/
@martinsohndk & @joeydreijer explore the new collection of Cypher queries designed to help BloodHound users to unlock the full potential of the BloodHound platform by creating an open query ecosystem.
🔗 https://specterops.io/blog/2025/06/17/introducing-the-bloodhound-query-library/
🐥 [ tweet ]
🔥11
😈 [ Alex Neff @al3x_n3ff ]
Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable.
This allows you to request service tickets for any account with a set SPN🔥
NetExec now has a native implementation of this technique, thanks to Azox
🐥 [ tweet ]
Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable.
This allows you to request service tickets for any account with a set SPN🔥
NetExec now has a native implementation of this technique, thanks to Azox
🐥 [ tweet ]
🔥17🥱6👍2
😈 [ Adam Chester 🏴☠️ @_xpn_ ]
My second blog post of the month is up. Nothing too crazy, this time I’m looking at the upcoming Windows Administrator Protection feature… How it works, what continues to work, and some reversing. Check it out (or not I’m not your mum!)
🔗 https://specterops.io/blog/2025/06/18/administrator-protection/
🐥 [ tweet ]
My second blog post of the month is up. Nothing too crazy, this time I’m looking at the upcoming Windows Administrator Protection feature… How it works, what continues to work, and some reversing. Check it out (or not I’m not your mum!)
🔗 https://specterops.io/blog/2025/06/18/administrator-protection/
🐥 [ tweet ]
👍4🤔1
Успейте подать заявку на Pentest Award 2025 до 30 июня!
Это отраслевая награда для специалистов по тестированию на проникновение, которая проводится уже в третий раз. Основная задача премии — выделить лучших специалистов и показать их вклад в развитие российского пентеста.
Участие бесплатное, финалисты получат технику apple и максимальный почет сообщества этичных хакеров. Церемония награждения будет проходить 1 августа в Москве.
Заявка на премию — это рассказ о лучшем проекте в свободной форме. Не нужно раскрывать эксплоиты, любые шаги в цепочке эксплуатации могут быть полностью анонимны, а детали могут быть скрыты, важно отразить сам подход и идею.
Подать заявку и узнать больше информации можно на сайте — https://award.awillix.ru/
Это отраслевая награда для специалистов по тестированию на проникновение, которая проводится уже в третий раз. Основная задача премии — выделить лучших специалистов и показать их вклад в развитие российского пентеста.
Участие бесплатное, финалисты получат технику apple и максимальный почет сообщества этичных хакеров. Церемония награждения будет проходить 1 августа в Москве.
Заявка на премию — это рассказ о лучшем проекте в свободной форме. Не нужно раскрывать эксплоиты, любые шаги в цепочке эксплуатации могут быть полностью анонимны, а детали могут быть скрыты, важно отразить сам подход и идею.
Подать заявку и узнать больше информации можно на сайте — https://award.awillix.ru/
🔥7🍌4👍1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Alex Neff @al3x_n3ff ]
Releasing a side project of mine: wsuks - automating the WSUS mitm attack🔥
🔗 https://github.com/NeffIsBack/wsuks
TL;DR:
🐥 [ tweet ]
Releasing a side project of mine: wsuks - automating the WSUS mitm attack🔥
🔗 https://github.com/NeffIsBack/wsuks
TL;DR:
If the Windows Server Update Service (WSUS) is configured to use HTTP instead of HTTPS, it's possible to take control of any Windows machine on your local network.
🐥 [ tweet ]
🔥15👍3🤔1
😈 [ Andrew @4ndr3w6S ]
Happy to finally share a new blog with @exploitph on our work revisiting the Kerberos Diamond Ticket.
✅
✅
🆕 Forge a diamond service ticket using an ST
We finally gave it a proper cut 💎
🔗 https://www.huntress.com/blog/recutting-the-kerberos-diamond-ticket
🐥 [ tweet ]
Happy to finally share a new blog with @exploitph on our work revisiting the Kerberos Diamond Ticket.
✅
/opsec for a more genuine flow✅
/ldap to populate the PAC🆕 Forge a diamond service ticket using an ST
We finally gave it a proper cut 💎
🔗 https://www.huntress.com/blog/recutting-the-kerberos-diamond-ticket
🐥 [ tweet ]
🔥4
😈 [ Charlie Bromberg « Shutdown » @_nwodtuhs ]
Python alternative to Mimikatz
🔗 https://github.com/ShutdownRepo/dcshadow
🐥 [ tweet ]
Python alternative to Mimikatz
lsadump::dcshadow:🔗 https://github.com/ShutdownRepo/dcshadow
🐥 [ tweet ]
👍4🤔3🥱2
😈 [ TrustedSec @TrustedSec ]
Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @Oddvarmoe reveals a practical guide to repurposing Chrome Remote Desktop on red team operations. Read it now!
🔗 https://trustedsec.com/blog/abusing-chrome-remote-desktop-on-red-team-operations-a-practical-guide
🐥 [ tweet ]
Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @Oddvarmoe reveals a practical guide to repurposing Chrome Remote Desktop on red team operations. Read it now!
🔗 https://trustedsec.com/blog/abusing-chrome-remote-desktop-on-red-team-operations-a-practical-guide
🐥 [ tweet ]
👍8🥱5🔥2
😈 [ Dave Cossa @G0ldenGunSec ]
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence.
🔗 https://www.ibm.com/think/x-force/identifying-abusing-azure-arc-for-hybrid-escalation-persistence
🐥 [ tweet ]
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence.
🔗 https://www.ibm.com/think/x-force/identifying-abusing-azure-arc-for-hybrid-escalation-persistence
🐥 [ tweet ]
🔥8
This media is not supported in your browser
VIEW IN TELEGRAM