alien keric (@alienkeric) 's Twitter Profile
alien keric

@alienkeric

CRTA |CEH |nerd ๐Ÿ‘จโ€๐Ÿ’ป |CTF player|member at @urchinsec_ & @5h4d0wbr0k3r5

ID: 1520545995393806341

linkhttps://hackmd.io/@alienX/H1HJ8-cjh calendar_today30-04-2022 23:31:12

1,1K Tweet

1,1K Followers

1,1K Following

0xdf (@0xdf_) 's Twitter Profile Photo

BigBang from Hack The Box starts off with a very tricky vuln chaining a file read in a WordPress plugin to a buffer overflow in Glibc to get RCE. Then there's Grafana and an Android APK. 0xdf.gitlab.io/2025/05/03/htbโ€ฆ

ippsec (@ippsec) 's Twitter Profile Photo

#HackTheBox BigBang Video is up! And it shows something I didn't know was possible, getting RCE on a file_get_contents call within PHP. It is patched as of PHP 8.3.8 (~June 2024) but I'm sure there are unpatched webservers out there. youtube.com/watch?v=Xta6fGโ€ฆ

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

A new module has been merged into NetExec: change-password๐Ÿ”ฅ Accounts with STATUS_PASSWORD_EXPIRED aren't a problem anymore, just reset their password. You can also abuse ForceChangePassword to reset another user's password. Made by FaganAfandiyev, Mehmetcan TOPAL and me

A new module has been merged into NetExec: change-password๐Ÿ”ฅ

Accounts with STATUS_PASSWORD_EXPIRED aren't a problem anymore, just reset their password.
You can also abuse ForceChangePassword to reset another user's password.

Made by <a href="/kriyosthearcane/">FaganAfandiyev</a>, <a href="/mehmetcanterman/">Mehmetcan TOPAL</a> and me
Jack Rhysider ๐Ÿดโ€โ˜ ๏ธ (@jackrhysider) 's Twitter Profile Photo

๐Ÿ’ฅNew Ep 158: "MalwareTech"๐Ÿ’ฅ ๐Ÿ‘€ He finally tells all. You're not going to believe it. I've been waiting for this one for a long time. I'm so happy it's finally here. darknetdiaries.com/episode/158

๐Ÿ’ฅNew Ep 158: "MalwareTech"๐Ÿ’ฅ

๐Ÿ‘€ He finally tells all.

You're not going to believe it. I've been waiting for this one for a long time. I'm so happy it's finally here.

darknetdiaries.com/episode/158
alien keric (@alienkeric) 's Twitter Profile Photo

piece of cake ๐Ÿฐ. Easy box are always 1-2 steps and ur in, the same with root just few steps and ur done. Used my military technique to get the flag ๐Ÿ˜, I was bored with that cleanup script.

piece of cake ๐Ÿฐ. Easy box are always 1-2 steps and ur in, the same with root just few steps and ur done. Used my military technique to get the flag ๐Ÿ˜, I was bored with that cleanup script.
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

Looks can be deceiving ๐Ÿ˜ถโ€๐ŸŒซ๏ธ 2 new labs are coming to the #HackTheBox platforms this week! ๐Ÿ”ต Trojan, a Sherlock where you analyze the different pieces of evidence to extract IOCs and reconstruct the phases of the infection, created by MrManj ๐Ÿ”ด Puppy, an #HTB Seasons Machine

Looks can be deceiving ๐Ÿ˜ถโ€๐ŸŒซ๏ธ
2 new labs are coming to the #HackTheBox platforms this week!
๐Ÿ”ต Trojan, a Sherlock where you analyze the different pieces of evidence to extract IOCs and reconstruct the phases of the infection, created by MrManj
๐Ÿ”ด Puppy, an #HTB Seasons Machine
Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

A new NetExec module just got merged: eventlog_creds๐Ÿ”ฅ It parses Windows Event ID 4688 logs (from "Audit Process Creation") to extract credentials from CMD and PowerShell commands. E.g. "net user username password /add" will be detected. Made by Lodos2005

A new NetExec module just got merged: eventlog_creds๐Ÿ”ฅ

It parses Windows Event ID 4688 logs (from "Audit Process Creation") to extract credentials from CMD and PowerShell commands. E.g. "net user username password /add" will be detected. Made by <a href="/lodos2005/">Lodos2005</a>
urchinsec (@urchinsec_) 's Twitter Profile Photo

We have just released our official writeup for the UrchinSec DTS Finals CTF challenge: ๐Ÿ”ฅ hackmd.io/@urchinsec/urcโ€ฆ

Berry Your Network ๐Ÿ‘จ๐Ÿพโ€๐Ÿ’ป๐Ÿ–ค๐ŸŒน (@abdulmalik_ttg) 's Twitter Profile Photo

Things I need right now; A congratulations email or I just might lose it (Not Spams). A 2-5k$ a month role An offensive security role that I'll actually love and will learn so much on.

alien keric (@alienkeric) 's Twitter Profile Photo

Well this was very interesting machine for the weekend, but with my opinion this was supposed atleast to be medium ๐Ÿ˜. anyway Ggs #htb #fluffy #urchinsec

Well this was very interesting machine for the weekend, but with my opinion this was supposed atleast to be medium ๐Ÿ˜. anyway Ggs #htb #fluffy #urchinsec
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

๐Ÿšจ OSCP GIVEAWAY ALERT๐Ÿšจ Weโ€™re giving away 3 OSCP vouchers to supercharge your pentesting journey โ€“ proudly sponsored by OffSec ! ๐Ÿ’ฅ๐Ÿ™Œ To enter: 1.โœ… Follow Us 2.๐Ÿ” Retweet this post 3.โค๏ธ Like this post 4.๐Ÿ’ฌ Reply with your funniest cybersecurity meme ๐ŸŽฏ Weโ€™ll pick 3

๐Ÿšจ OSCP GIVEAWAY ALERT๐Ÿšจ

Weโ€™re giving away 3 OSCP vouchers to supercharge your pentesting journey โ€“ proudly sponsored by <a href="/offsectraining/">OffSec</a> ! ๐Ÿ’ฅ๐Ÿ™Œ

To enter:
1.โœ… Follow Us
2.๐Ÿ” Retweet this post
3.โค๏ธ Like this post
4.๐Ÿ’ฌ Reply with your funniest cybersecurity meme

๐ŸŽฏ Weโ€™ll pick 3
OffSec (@offsectraining) 's Twitter Profile Photo

๐Ÿ”โฌ†๏ธ Ready to level up your PEN-200 skills? Join us for our next #OffSecLive session where weโ€™ll walk through the PG Practice Apex machine, step by step. From information gathering to public exploits, fixing code, and tackling password attacks, this session is packed with

๐Ÿ”โฌ†๏ธ Ready to level up your PEN-200 skills? 

Join us for our next #OffSecLive session where weโ€™ll walk through the PG Practice Apex machine, step by step.

From information gathering to public exploits, fixing code, and tackling password attacks, this session is packed with
nich0laus ๐ŸŽญ (@nicl4ssic) 's Twitter Profile Photo

"Quitting is not a solution. Phishing is the solution." ๐Ÿ˜‚๐Ÿ˜‚๐Ÿซต cc Tahaa Farooq alien keric urchinsec I just pwned Sorcery on Hack The Box! hackthebox.com/achievement/maโ€ฆ #HackTheBox #htb #CyberSecurity #EthicalHacking #InfoSec #PenTesting

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

How to find the Entra ID sync server - A new NetExec module๐Ÿ”Ž Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server. Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server๐Ÿš€

How to find the Entra ID sync server - A new NetExec module๐Ÿ”Ž

Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server.
Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server๐Ÿš€