Oddvar Moe (@oddvarmoe) 's Twitter Profile
Oddvar Moe

@oddvarmoe

Red Teamer @TrustedSec | MS MVP | Speaker | Security Researcher | Blogger | Total n00b & always learning | UNC1194 | Tinkerer | Gamer

I try to inspire!

ID: 370060032

linkhttps://oddvar.moe calendar_today08-09-2011 11:53:46

11,11K Tweet

19,19K Followers

1,1K Following

Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

Your #MDT shares might be spilling secrets like a drunk uncle at a wedding. 🍷💬 In my latest post for TrustedSec, I dig into how Red Teamers can extract creds from MDT shares — and why your MDT deployment server might need a security makeover. Read all about it here:

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
EvilMog® @mog.evil.af (@evil_mog) 's Twitter Profile Photo

I'm doing a talk at BSidesLV on this, but I'm dropping the research early, discovered this in 2022, and releasing now for awareness, how to decrypt F5 Service Account Passwords Standalone tool github.com/evilmog/F5-Dec…

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Looks like Microsoft added such a "lsof" feature to fsutil.exe file queryProcessesUsing in Windows 11 24H2. 🥳 It uses the same Vista-old syscall I am using in my PowerShell script. The choice is yours :) BTW I have created my script literally one month before 24H2 release. 😎

Looks like Microsoft added such a "lsof" feature to fsutil.exe file queryProcessesUsing in Windows 11 24H2. 🥳
It uses the same Vista-old syscall I am using in my PowerShell script. The choice is yours :)
BTW I have created my script literally one month before 24H2 release. 😎
Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

18-year-old Oddvar would’ve been really jealous. I feel like I’m in the best shape of my life right now. I just had a slow jog trip without too much effort. Slowly but steady stronger and better each day.

18-year-old Oddvar would’ve been really jealous. I feel like I’m in the best shape of my life right now. I just had a slow jog trip without too much effort. Slowly but steady stronger and better each day.
Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

🔎Hunting for REMINST folders? You can query AD for the servers that is running Windows Deployment Services (WDS). Use ADExplorer as below or do a LDAP Query: (&(objectclass=connectionPoint)(cn=*-Remote-Installation-Services))

🔎Hunting for REMINST folders?
You can query AD for the servers that is running Windows Deployment Services (WDS). 

Use ADExplorer as below or do a LDAP Query: 
(&(objectclass=connectionPoint)(cn=*-Remote-Installation-Services))
Offensive X (@theoffensivex) 's Twitter Profile Photo

OffensiveX 2025 is getting close. If you’ve got a ticket—or grab one by May 31—you’re in the running to attend Oddvar Moe 's training for free. UAC bypasses, LOLBAS abuse, real tactics from one of the best in Windows security. Secure your spot: offensivex.org/register.php

OffensiveX 2025 is getting close.  If you’ve got a ticket—or grab one by May 31—you’re in the running to attend <a href="/Oddvarmoe/">Oddvar Moe</a> 's training for free.  

UAC bypasses, LOLBAS abuse, real tactics from one of the best in Windows security.  

Secure your spot: offensivex.org/register.php
/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Ever wonder what a single registry setting can lead to in red team ops? @oddvarmoe is sharing a wild story at #x33fcon about how a tiny Outlook tweak became a powerful C2 framework used against huge companies. Get ready for some real-world insights! Talk details:

Ever wonder what a single registry setting can lead to in red team ops? @oddvarmoe is sharing a wild story at #x33fcon about how a tiny Outlook tweak became a powerful C2 framework used against huge companies. Get ready for some real-world insights!

Talk details:
nyxgeek (@nyxgeek) 's Twitter Profile Photo

Ever wonder if two companies are secretly working together? You might be able to find out! Azure user enumeration includes guest accounts. This means that if you have a list of email addresses, you can easily check to see if they exist in a specific Azure tenant.

Ever wonder if two companies are secretly working together? You might be able to find out!

Azure user enumeration includes guest accounts. This means that if you have a list of email addresses, you can easily check to see if they exist in a specific Azure tenant.
TrustedSec (@trustedsec) 's Twitter Profile Photo

As AI evolves with MCP, can a new “dog” learn old tricks? James 🏴󠁧󠁢󠁷󠁬󠁳󠁿 tests Claude AI’s ability to craft phishing pretexts—and just how much effort it takes to pull them off. Read it now! trustedsec.com/blog/teaching-…

Wietze (@wietze) 's Twitter Profile Photo

#HuntingTipOfTheDay: You have probably heard of .bash_profile and .zshrc, but are you familiar with PowerShell's version of it? Attackers might use this for persistence; monitor modifications of profiles by unexpected processes, and analyse existing files for anomalies.

#HuntingTipOfTheDay: You have probably heard of .bash_profile and .zshrc, but are you familiar with PowerShell's version of it? Attackers might use this for persistence; monitor modifications of profiles by unexpected processes, and analyse existing files for anomalies.
TrustedSec (@trustedsec) 's Twitter Profile Photo

Verbose error messages might be useful, but they can reveal too much. In our latest blog, nyxgeek shows how a now-fixed #Azure logging bug could have allowed attackers to confirm valid passwords, despite failed logins. Read now! trustedsec.com/blog/full-disc…

Melvin langvik (@flangvik) 's Twitter Profile Photo

New video out! Showcasing how to use QRuicble to potentially evade QR‑code‑specific phishing detections, in a very KISS fashion (Keep it simple, stupid!)

New video out! Showcasing how to use QRuicble to potentially evade QR‑code‑specific phishing detections, in a very KISS fashion (Keep it simple, stupid!)
TrustedSec (@trustedsec) 's Twitter Profile Photo

This Thursday at 12:45 pm, Principal Security Consultant Oddvar Moe will be speaking at /ˈziːf-kɒn/ in Gdynia, Poland. Catch his talk "Red Team Chronicles: A C2 Story - Outlook's One-Setting Wonder " if you'll be there. x33fcon.com/#!conference.md

This Thursday at 12:45 pm, Principal Security Consultant <a href="/Oddvarmoe/">Oddvar Moe</a> will be speaking at <a href="/x33fcon/">/ˈziːf-kɒn/</a> in Gdynia, Poland. Catch his talk "Red Team Chronicles: A C2 Story - Outlook's One-Setting Wonder " if you'll be there. x33fcon.com/#!conference.md