tde_sec's profile picture. CTI

Tom E

@tde_sec

CTI

Joined April 2021
Similar User
CorbridgeMax's profile picture. Head of Adversary Simulation @ JUMPSEC

@CorbridgeMax

namazso's profile picture. prompt engineer for c++ compilers

@namazso

JUMPSEC's profile picture. JUMPSEC leading provider of #cybersecurity services. We are on a mission to enable effective cyber security. Discover our industry-leading research @JumpsecLabs

@JUMPSEC

shubakki's profile picture. 18yo | sillyware R&D and computer wizardry

@shubakki

d_tranman's profile picture. salsa sultan, verde villain, condiment connoisseur
Adversary Services Intern @xforce
oscp crto crtl
ex:  @NationalCCDC+@wrccdc & @globalcptc @calpolyswift

@d_tranman

zodiacon's profile picture. Developer, trainer, author and (sometimes) speaker.
Founder at @trainsec academy.

@zodiacon

0xthirteen's profile picture. Working to become smarter everyday. Adversary Simulation Service Architect @SpecterOps. Coffee Brew Teamer

@0xthirteen

djhohnstein's profile picture. IBM X-Force Red
@djhohnstein@infosec.exchange

@djhohnstein

anthemtotheego's profile picture. Adversary Simulation @ X-Force Red | Head of Capability R&D | Implant Dev | Work In Progress | Thoughts My Own | https://t.co/eNspx7jLvm

@anthemtotheego

__mez0__'s profile picture. 👽 UNC1194 🔥 Targeted Ops @TrustedSec 🤖 Dev @preemptdev

"purveyors of the prettiest log files"

@__mez0__

peterwintrsmith's profile picture. Security researcher & implant developer @mdseclabs; developing SAST @wsastsupport; malware, code analysis, appsec, cryptography. Trying to follow Christ.

@peterwintrsmith

j0hn__f's profile picture. CyberSecurity | Lab539 and HPCsec | HPC | Supercomputers | TCDO | formerly MWRlabs & Jumpsec | @j0hn_f@infosec.exchange

@j0hn__f

Weasel_Sec's profile picture. RedTeam | PurpleTeam | PenTest | Chef . Views are mines 🇬🇧🇸🇬

@Weasel_Sec

0xLegacyy's profile picture. Lover of frogs, specialising in defence evasion, CTF addict. 22y/o

@0xLegacyy

wle702's profile picture. sysadmin | network engineer | veteran
python | powershell
hack the 🌎
fuck Windows

@wle702

Tom E Reposted

I'm speaking at BSides London tomorrow morning @HackingDave but I have a feeling people may be thinking they are coming to see you 🤣. I'm forever disappointing people whenever I join a new Discord server or do an event! 😊

Cyb3rC3lt's tweet image. I'm speaking at BSides London tomorrow morning @HackingDave but I have a feeling people may be thinking they are coming to see you 🤣.

I'm forever disappointing people whenever I join a new Discord server or do an event! 😊

Tom E Reposted

In his latest blog, @chudyPB covers a pre-auth Arbitrary File Deletion vulnerability he discovered in the SolarWinds Access Rights Manager (ARM). It may not sound exciting, but it can lead to an LPE on domain-joined Windows machines. Read the details at zerodayinitiative.com/blog/2024/12/1…


Tom E Reposted

Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph 😃


Tom E Reposted

Unauthenticated Remote Code Execution (RCE) on Domain Controllers (DC). It does not get worse than that. Probably will be included in #ransomware campaigns. Any technical analysis of CVE-2024-49112 published? CC: @gentilkiwi @harmj0y @_wald0

TalBeerySec's tweet image. Unauthenticated Remote Code Execution (RCE) on Domain Controllers (DC).
It does not get worse than that. Probably will be included in #ransomware campaigns.
Any technical analysis of CVE-2024-49112 published? 
CC: @gentilkiwi @harmj0y @_wald0

Tom E Reposted

I am excited to share with you my latest research - "DCOM Upload & Execute" An advanced lateral movement technique to upload and execute custom payloads on remote targets Forget about PSEXEC and dive in! deepinstinct.com/blog/forget-ps… github.com/deepinstinct/D…


Tom E Reposted

Gotta love 0-day. Gonna be a wild night! Cleo software CVE-2024-50623 is being actively exploited in-the-wild and fully-patched systems running 5.8.0.21 are still exploitable. 💥 Dropped some details to Reddit: reddit.com/r/sysadmin/com… Blog coming soon. ⚡

KyleHanslovan's tweet image. Gotta love 0-day. Gonna be a wild night! Cleo software CVE-2024-50623 is being actively exploited in-the-wild and fully-patched systems running 5.8.0.21 are still exploitable. 💥

Dropped some details to Reddit: reddit.com/r/sysadmin/com…

Blog coming soon. ⚡

Tom E Reposted

👀 we’ve watched APTs recently ravage lawful interception systems, and wanted our own capabilities… Join us on a journey today into Mitel’s MiCollab - that originally started to reproduce CVE-2024-35286, and quickly unravelled into more… labs.watchtowr.com/where-theres-s…


Tom E Reposted

But you know what's even better? KrbRelay also works from a low privileged users perspective! 🔥🔥🔥

ShitSecure's tweet image. But you know what's even better? KrbRelay also works from a low privileged users perspective! 🔥🔥🔥

Finally I was finally able to reproduce RemotePotat0 from @splinter_code and @decoder_it which still works perfectly fine when relaying against SMB and choosing the correct CLSID :-) Only LDAP relaying it patched and not possible anymore. Super late but ¯\_(ツ)_/ ¯🤪

ShitSecure's tweet image. Finally I was finally able to reproduce RemotePotat0 from @splinter_code and @decoder_it   which still works perfectly fine when relaying against SMB and choosing the correct CLSID :-) Only LDAP relaying it patched and not possible anymore.

Super late but ¯\_(ツ)_/ ¯🤪
ShitSecure's tweet image. Finally I was finally able to reproduce RemotePotat0 from @splinter_code and @decoder_it   which still works perfectly fine when relaying against SMB and choosing the correct CLSID :-) Only LDAP relaying it patched and not possible anymore.

Super late but ¯\_(ツ)_/ ¯🤪


Tom E Reposted

This week is a foray into the world of disaster recovery, and the reasons that often prevent organisations from creating and battle hardening their Business Continuity Plans (BCPs): labs.jumpsec.com/bcp-as-easy-as…


Tom E Reposted

🔥 Initial Access Guild registration is now open! 🔥 Offensive Engineers, let us unite in a trusted, vetted community! I invite you to a curated closed Discord server, where ideas can be exchanged safely. ☢️ binary-offensive.com/guild ☢️ See you inside fellow Breacher!

mariuszbit's tweet image. 🔥 Initial Access Guild registration is now open! 🔥

Offensive Engineers, let us unite in a trusted, vetted community!

I invite you to a curated closed Discord server, where ideas can be exchanged safely.

☢️ binary-offensive.com/guild ☢️

See you inside fellow Breacher!

A day in the life of my job: “this will never work” *works*


Tom E Reposted

Anyone else spot that linpeas.sh is looking to extract information from your system? This site is not linked to the original author's version of Linpeas by the way.

Cyb3rC3lt's tweet image. Anyone else spot that linpeas.sh is looking to extract information from your system? 

This site is not linked to the original author's version of Linpeas by the way.

Tom E Reposted

Oh, you didn't know? Cool kids are now relaying Kerberos over SMB 😏 Check out our latest blogpost by @hugow_vincent to discover how to perform this attack: synacktiv.com/publications/r…


Tom E Reposted

It’s always awesome when we (@CISAGov) gets to release a red team report that we worked on, and today is another one of those days! Go check out our latest report and hopefully you can apply some of the same lessons to your environment! cisa.gov/news-events/cy…


Tom E Reposted

in today's 'no way, is it real?' we found out that Palo Alto's PAN-OS CVE-2024-0012 and CVE-2024-9474 were the equivalents of saying 'turn off auth and give me a shell'. Enjoy! labs.watchtowr.com/pots-and-pans-…


Tom E Reposted

hop skip jump over to our latest blog post - analysing Fortinet's FortiJump CVE-2024-47575, FortiJump-Higher (we love this name😄) and beyond (PoC included) labs.watchtowr.com/hop-skip-forti…


Tom E Reposted

Back by popular demand, I wrote a second part blog post on the many defense mechanisms phishing kits are using to avoid detection. This second part dives deep on one specific strategy - preventing detection of commonly cloned login pages e.g. Microsoft pushsecurity.com/blog/how-aitm-…


Tom E Reposted

On related note, did you know, that 7z (running as admin), can browse to "PhysicalDrive0" (so \\.\PhysicalDrive0\3.Basic data partition.ntfs\Windows\System32\config\) and copy file from there? SAM is not locked, AV/EDR don't seem to give a damn :)

rnmx123's tweet image. On related note, did you know, that 7z (running as admin), can browse to "PhysicalDrive0" (so \\.\PhysicalDrive0\3.Basic data partition.ntfs\Windows\System32\config\) and copy file from there? SAM is not locked, AV/EDR don't seem to give a damn :)

Hey @l4p0lis, remember bashing our heads against a wall trying to develop that BOF and wondering how anyone ever did it? We could’ve done with this back then, looks awesome

So @freefirex2 has been working hard and this should be live in the next 30-45 days.

HackingLZ's tweet image. So @freefirex2 has been working hard and this should be live in the next 30-45 days.


Loading...

Something went wrong.


Something went wrong.