dhn (@dhn_) 's Twitter Profile
dhn

@dhn_

By the power of truth, I, while living, have conquered the universe - /OS(C(P|E)|EE)/ - Tweets are my own! - Red teamer @codewhitesec | @[email protected]

ID: 36424458

linkhttps://zer0-day.pw calendar_today29-04-2009 17:56:06

274 Tweet

738 Followers

324 Following

TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-23-755|CVE-2023-32175] (0Day) VIPRE Antivirus Plus Link Following Local Privilege Escalation Vulnerability (CVSS 7.8; Credit: dhn) zerodayinitiative.com/advisories/ZDI…

Pedro Ribeiro (@pedrib1337) 's Twitter Profile Photo

A detailed two part video showing how we found a DNS parsing vulnerability and wrote a remote root exploit for it🤌 Part 1: Finding the vulnerability via "fuzzing" and reverse engineering with Ghidra 👾 youtube.com/watch?v=xWoQ-E… Part 2: Understanding vulnerability constraints and

A detailed two part video showing how we found a DNS parsing vulnerability and wrote a remote root exploit for it🤌

Part 1: Finding the vulnerability via "fuzzing" and reverse engineering with Ghidra 👾
youtube.com/watch?v=xWoQ-E…

Part 2: Understanding vulnerability constraints and
Roman H. (@_romanh_) 's Twitter Profile Photo

Participated in CODE WHITE GmbH's challenge "Kurts Maultaschenfabrikle" for the first time, thanks for this amazing CTF and the swag box! And yes, the logo on the bottle light's up :p #maultaschenfabrikle #ctf

Participated in <a href="/codewhitesec/">CODE WHITE GmbH</a>'s challenge "Kurts Maultaschenfabrikle" for the first time, thanks for this amazing CTF and the swag box!
And yes, the logo on the bottle light's up :p

#maultaschenfabrikle #ctf
dhn (@dhn_) 's Twitter Profile Photo

Sometimes, the Certsrv endpoint of a CA is configured to run on TCP port 443. Worth checking for ESC8 even though the most common reason for binding the endpoint to 443 is EPA. Certipy's check was only on TCP port 80; the PR will include both ports. github.com/ly4k/Certipy/p…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Today, CODE WHITE turns 10 🥳 Over the past decade, we've hacked our way through 120+ large corporations' defenses, caused headaches for Blue Teams and disclosed numerous 0days to vendors. Proudly grown from a few motivated hackers in 2014 to an established team of 50+ today 💪

Today, CODE WHITE turns 10 🥳 Over the past decade, we've hacked our way through 120+ large corporations' defenses, caused headaches for Blue Teams and disclosed numerous 0days to vendors. Proudly grown from a few motivated hackers in 2014 to an established team of 50+ today 💪
CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We've received insider information from a reliable source that Kurts Maultaschenfabrikle will be expanding and securing their IT in the coming weeks. So either act fast and get ahead on apply-if-you-can.com or wait for the new challenges. Or better yet, do both 🤓

esjay (@esj4y) 's Twitter Profile Photo

First part which covers the bug and finishes off with code allowing us for a controlled overflow in the Paged Pool is up: 3sjay.github.io/2024/09/08/Win…

esjay (@esj4y) 's Twitter Profile Photo

Finally, the second part of the blog post where we go from Windows Paged Pool Overflow to SYSTEM shell starting from Low Integrity 3sjay.github.io/2024/09/20/Win… have a great weekend everyone ;)

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

BeanBeat has been aquired by Kurts Maultaschenfabrikle! You don't know what that means? Head over to apply-if-you-can.com to find out in challenges that, without exception, stem from real-world vulns #uncompromisingRealism #finestHacking

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Ever wondered how Kurts Maultaschenfabrikle got hacked in 2023? The full story, all technical details, out now ;-) apply-if-you-can.com/walkthrough/20…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-de…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan

Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan
CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun 🤘 and #applyIfYouCan

CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun 🤘 and #applyIfYouCan
CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own Markus Wulftange who loves converting n-days to 0-days code-white.com/blog/wsus-cve-…