@Crypt0s Profile picture

Crypt0s

@Crypt0s

Application security guy who dabbles in radios, networking, protocols…pretty much anything anyone puts in front of me to hack!

Joined July 2009
Similar User
Render Man photo

@ihackedwhat

Sno0ose photo

@sno0ose

n00bz photo

@n00bznet

Erin Jacobs photo

@SecBarbie

jericho photo

@attritionorg

Ian photo

@iiamit

Magen Wu photo

@magen_wu

grecs (at #shmoocon) photo

@grecs

Rafał Łoś 🇵🇱 🇺🇦 photo

@Wh1t3Rabbit

Forgotten photo

@ForgottenSec

Josh Abraham photo

@Jabra

Dr. Wesley McGrew photo

@McGrewSecurity

Biggles McSwole The Zionist Dolphin photo

@DaveMarcus

Robert Weiss photo

@pwcrack

Bruce Potter photo

@gdead

Pinned

Confused about DMR? Fustrated you can't get your hotspot configured? Need some help? Here is a quick tutorial: medium.com/@Crypt0s/how-t… #DMR #hamradio #brandmeister #mmdvm


Crypt0s Reposted

1/12 It has been confirmed that the #Taurus interception was done via “a non-secure line”. Below is my opinion of one way in which it *might* have been done, taking into account the situation and #Russia's previous history. Essentially it involves using #SS7 interception. 🧵

Tweet Image 1

Crypt0s Reposted

Lenovo X1 Carbon Bitlocker Key Sniffing any% Speedrun (42.9 seconds)


Crypt0s Reposted

OST cannot be stopped. Here is a technique we tested internally 9 months ago: blocking EDR telemetry by leveraging the Windows Filtering Platform. Considered it so evil that we didn't publish it that time. It was pointless, now here it is by @netero_1010: github.com/netero1010/EDR…


Crypt0s Reposted

Discovered and exploited an arbitrary file delete vulnerability that lead to SYSTEM level privileges. Thanks to the goat @filip_dragovic

Tweet Image 1

Crypt0s Reposted

interesting recent UAC bypass method zcgonvh.com/post/Advanced_…

Tweet Image 1

The best thing about generative AI is that I hear far far less about Web3 bullshit


Are we really not supposed to double space after a period anymore???????


Very cool explanation of CANbus theft technique

There is no software update, the theft is via 'CAN injection 🚘💉' See kentindell.github.io/2023/04/03/can… for more details.



Crypt0s Reposted

New blog: Obtaining Domain Admin from Azure AD by abusing Cloud Kerberos Trust I teased this a bit during my Windows Hello talks, now found some time to write about this interesting technique. Also contains defenses and detection opportunities. dirkjanm.io/obtaining-doma…


A certificate reseller bypassed the HTTP verification of the ACME cert protocol by using a remote code injection in ACME.sh to write their own When called out they are surprised Pikachu and say they didn’t know what an RCE was before this. 😬

🍿🍿🍿 CA dId NoThInG wRoNg (they built a product around an 0day in a certificate management tool, got caught, and I'm hoping this results in a root CA being incinerated because that would be funny) groups.google.com/a/mozilla.org/…



Crypt0s Reposted
Tweet Image 1

Crypt0s Reposted

I'd be pretty interested see how it fares with my new SDR Bluetooth sniffer and a bladeRF. Can it perform all-channel sniffing in real time? Benchmark with ice9-bluetooth -s -f /dev/urandom github.com/mikeryan/ice9-…


It’s like nobody has ever tried to execute a docker container inside of an existing network namespace before


Crypt0s Reposted

Clean Windows using Linux 😛

Tweet Image 1

Crypt0s Reposted

"Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629)" raelize.com/blog/espressif…


Not for a hot minute tho right? Like part of fuzzing could be the AI can generate the test harness but that’s a far cry from current “coding ability” of AI I’ve seen so far. And web is such a hot mess of different stuff… Maybe in 2-3 years?

Generative AI aided fuzzing will lead to more binary and web exploits. Both defense and offense will benefit from this.



Loading...

Something went wrong.


Something went wrong.