Charles Shirer (@bsdbandit) 's Twitter Profile
Charles Shirer

@bsdbandit

A Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP

ID: 18647774

calendar_today05-01-2009 21:48:50

10,10K Tweet

24,24K Followers

26,26K Following

SAERXCIT (@saerxcit) 's Twitter Profile Photo

Mayfly mpgn If it's using the machine account then maybe it's possible to just tgtdeleg + s4u2self? This way you don't have to rely on another vuln (absence of LDAP signing/CB) for the full chain

NOBANDWIDTH (@n0bandw1dth) 's Twitter Profile Photo

๐Ÿ“ข SHOW ANNOUNCEMENT ๐Ÿšจ Iโ€™m excited to announce that Iโ€™ll be performing at The Conduit in Orlando, FL on May 17th! Tickets are available now at the link below: conduitfl.com/tm-event/nobanโ€ฆ

๐Ÿ“ข SHOW ANNOUNCEMENT ๐Ÿšจ
Iโ€™m excited to announce that Iโ€™ll be performing at The Conduit in Orlando, FL on May 17th!

Tickets are available now at the link below:
conduitfl.com/tm-event/nobanโ€ฆ
Katie Paxton-Fear (@insiderphd) 's Twitter Profile Photo

This is an IMPRESSIVELY good pdf password dictionary brute forcer, got a password in literally milliseconds, if you're doing recon this is ๐Ÿ‘Œ github.com/mufeedvh/pdfrip

Steve Borosh (@rvrsh3ll) 's Twitter Profile Photo

In-case you missed the webcast, here's the GitHub link github.com/rvrsh3ll/Bolthโ€ฆ. Blog post coming soon! One of my fav bits we talked about was using this to have your C2 call to 127.0.0.1:port or even adding dev tunnels to the ClickOnce. Many options. Modify to taste ๐Ÿง‘โ€๐Ÿณ

chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement ๐Ÿ˜Ž. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/โ€ฆ

Sarah Young (@_sarahyo) 's Twitter Profile Photo

Okay so this is HUGE - our amazing AI red team have open sourced their AI red team labs so you can set up your own training! aka.ms/AIRTlabs Ram Shankar Siva Kumar

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

FindGPPPasswords A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts. meterpreter.org/findgpppassworโ€ฆ

DirectoryRanger (@directoryranger) 's Twitter Profile Photo

Active Directory Hardening Series Part 1 Disabling NTLMv1 techcommunity.microsoft.com/blog/coreinfraโ€ฆ Part 2 Removing SMBv1 techcommunity.microsoft.com/blog/coreinfraโ€ฆ Part 3 Enforcing LDAP Signing techcommunity.microsoft.com/blog/coreinfraโ€ฆ Part 4 Enforcing AES for Kerberos techcommunity.microsoft.com/blog/coreinfraโ€ฆ

TrustedSec (@trustedsec) 's Twitter Profile Photo

Get ready for the new episode of Security Noise next week! We chat with Sean Metcalf about securing #ActiveDirectory, Entra, DS, and that messy space in between. Listen wherever you get your #podcasts!

Get ready for the new episode of Security Noise next week! We chat with <a href="/PyroTek3/">Sean Metcalf</a> about securing #ActiveDirectory, Entra, DS, and that messy space in between. Listen wherever you get your #podcasts!
Jason Haddix (@jhaddix) 's Twitter Profile Photo

The first step to finding a crit in bug bounty is looking for one. Just start. Use the app. And ask critical questions to yourself.

TrustedSec (@trustedsec) 's Twitter Profile Photo

Thinking about a career change? Our experts are here to help. In this session, theyโ€™ll cover different roles in InfoSec, what employers are looking for, and practical ways to build the skills you need. Register now so you can stand out from the crowd! trustedsec.zoom.us/webinar/registโ€ฆ

Thinking about a career change? Our experts are here to help. In this session, theyโ€™ll cover different roles in InfoSec, what employers are looking for, and practical ways to build the skills you need. Register now so you can stand out from the crowd! trustedsec.zoom.us/webinar/registโ€ฆ
Harshad shah (@harshad_hacker) 's Twitter Profile Photo

๐—ถ๐—ข๐—ฆ ๐—”๐—ฝ๐—ฝ ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜‚๐˜€๐—ถ๐—ป๐—ด ๐—ถ๐—ข๐—ฆ ๐Ÿญ๐Ÿด.๐Ÿฑ โฒ ๐—ก๐—ผ ๐—ฅ๐—ผ๐—ผ๐˜๐—ฒ๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€, ๐—ก๐—ผ ๐—˜๐—บ๐˜‚๐—น๐—ฎ๐˜๐—ผ๐—ฟ โณ Hacking #iOS Application using ๐—ฅ๐—ฒ๐—ฎ๐—น ๐—ถ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜€. ๐—ช๐—ฒ ๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ต๐—ฒ ๐—ฝ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—™๐—ฟ๐—ถ๐—ฑ๐—ฎ ๐Ÿญ๐Ÿณ.๐Ÿฌ.๐Ÿณ ๐˜๐—ผ ๐˜‚๐—ป๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ

nyxgeek (@nyxgeek) 's Twitter Profile Photo

Ever wonder if two companies are secretly working together? You might be able to find out! Azure user enumeration includes guest accounts. This means that if you have a list of email addresses, you can easily check to see if they exist in a specific Azure tenant.

Ever wonder if two companies are secretly working together? You might be able to find out!

Azure user enumeration includes guest accounts. This means that if you have a list of email addresses, you can easily check to see if they exist in a specific Azure tenant.