Tomasz Czyz (@0xc00be) 's Twitter Profile
Tomasz Czyz

@0xc00be

Security Expert | Maniac Troubleshooter | RED&BLUE | BTL1, OSCP OSWP MCSE MCSA etc... 🇳🇴🇭🇺🇵🇱🇬🇧

ID: 730057275205926912

calendar_today10-05-2016 15:29:53

210 Tweet

112 Followers

177 Following

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

What a bug! 🐛 - nothing visibly changes on a server, - GPO stops processing on all clients, - weird/cryptic log entries. Repro: 1. add 1024 chars at the beginning of the GPT.INI file, 2. observe admin brain melting. Spaces are ok! Reason: gpsvc reads only first 1024 chars 😅

What a bug! 🐛
- nothing visibly changes on a server,
- GPO stops processing on all clients,
- weird/cryptic log entries.
Repro: 
1. add 1024 chars at the beginning of the GPT.INI file,
2. observe admin brain melting.
Spaces are ok!
Reason: gpsvc reads only first 1024 chars 😅
Tomasz Czyz (@0xc00be) 's Twitter Profile Photo

Researching vulnerabilities in big, popular solutions is much more complex than finding XSS or path traversal on small websites.* *Not applicable to Checkpoint products. 😜

Dave W Plummer (@davepl1968) 's Twitter Profile Photo

How we did this in the old days: When I was on Windows, this was the type of thing that greeted you every morning. Every. Single. Morning. You see, we all had a secondary "debug" PC, and each night we'd run NTStress on all of them, and all the lab machines. NTStress would

How we did this in the old days:
When I was on Windows, this was the type of thing that greeted you every morning.  Every.  Single.  Morning.

You see, we all had a secondary "debug" PC, and each night we'd run NTStress on all of them, and all the lab machines.  NTStress would
Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

This is something I am really excited to talk about and finally release. It is a tool we have been using and developing for the last 3 years that we are releasing. Hope you join us on our webinar

farmpoet (@f4rmpoet) 's Twitter Profile Photo

It's time to take a closer look at CVE-2024-38063 (Windows TCPIP RCE). I usually don't post partial analysis but since most available info is unreliable I'll do my best to try and shed some light. This time I'll focus on my workflow and thought process as we go. 🧵

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Fancy DLL sideloading? Add built-in licensingdiag.exe to your toolbox. It will load everything listed under Windows NT\CurrentVersion\LicensingDiag and then call exported InitializeCollector() function. BTW have they heard about REG_EXPAND_SZ?

Fancy DLL sideloading? Add built-in licensingdiag.exe to your toolbox. It will load everything listed under Windows NT\CurrentVersion\LicensingDiag and then call exported InitializeCollector() function. 
BTW have they heard about REG_EXPAND_SZ?
Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

Not sure if this is useful but created a script to dump certificate template information to a text file from an ADExplorer dump using ADExplorersnapshot.py. Created a PR to the project here: github.com/c3c/ADExplorer…

Tomasz Czyz (@0xc00be) 's Twitter Profile Photo

What happened to #ChatGPT 4o and image generation? It's not possible to get an image without text on it. Even if I explicitly state that image can't contain any letters, words, text, captions etc. Is there any secret prompt to force it not to put text on the generated images?

herrcore (@herrcore) 's Twitter Profile Photo

Chinese rj45 USB adapter malware??? Our line-by-line code analysis of the "malware" and a reasonable explanation for its strange delivery (part 1)

Tomasz Czyz (@0xc00be) 's Twitter Profile Photo

I had a huge collection of diverse cables and adapters, gathered over a few years, which I kept in case I would need any of them in the future. Last week, I decided to throw them out because of the space they were taking up. Today, I found myself needing one of them 🤦‍♂️

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

After my latest newsletter issue, diversenok reached out to me with an interesting observation: a password can be encrypted and still functions identically to a cleartext one in CreateProcessWithLogonW(). 😮 This brought up two intriguing questions: 1. How can I decrypt

After my latest newsletter issue, <a href="/diversenok_zero/">diversenok</a> reached out to me with an interesting observation: a password can be encrypted and still functions identically to a cleartext one in CreateProcessWithLogonW(). 😮

This brought up two intriguing questions:
1. How can I decrypt