Chris Au (@netero_1010) 's Twitter Profile
Chris Au

@netero_1010

Red teamer, my tools for red teaming: github.com/netero1010, my blog to share offensive security stuff: netero1010-securitylab.com

ID: 1066211423653552128

calendar_today24-11-2018 06:06:27

160 Tweet

1,1K Followers

568 Following

Oliver Lyak (@ly4k_) 's Twitter Profile Photo

The first blog post is here. This one covers the technical details of CVE-2022-26923 (Active Directory Domain Services Elevation of Privilege Vulnerability). The vulnerability was patched as part of the May 2022 Security Updates from Microsoft. research.ifcr.dk/9e098fe298f4

rootsecdev (@rootsecdev) 's Twitter Profile Photo

Have fun everyone Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923) research.ifcr.dk/certifried-act…

James Forshaw (@tiraniddo) 's Twitter Profile Photo

I said I'd write up how you could exploit RBCD using a normal user account if you know the password. So here it is tiraniddo.dev/2022/05/exploi…

DebugPrivilege (@debugprivilege) 's Twitter Profile Photo

I've wrote an article a few months ago about Kerberoasting with OpSec and I came across someone's work who wrote a tool in C# to enumerate accounts with SPNs, while remaining OpSec. Based on my blog post. github.com/Luct0r/KerberO…

Cn33liz (@cneelis) 's Twitter Profile Photo

It's #BOFFriday so time for a new Outflank C2-Tool-Collection update: > Psx - Show detailed process information incl. OPSEC checks. > Psc - Show detailed information from processes with established TCP and RDP connections. github.com/outflanknl/C2-…

Blake (@bmcder02) 's Twitter Profile Photo

Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions. #cybersecurity bmcder.com/blog/a-beggine…

klez (@klezvirus) 's Twitter Profile Photo

[RELEASE] After a little wait, I'm happy to present SilentMoonwalk, a PoC implementation of a TRUE call stack spoofer, result of a joint research on an original technique developed by namazso, done with my friends trickster0 and waldoirc. Enjoy! ;) github.com/klezVirus/Sile…

Brett Hawkins (@h4wkst3r) 's Twitter Profile Photo

Today I am releasing a whitepaper and new tool (ADOKit) as part of my X-Force research I will be presenting at Black Hat #BHEU on Wednesday. Links are below 🔗 Whitepaper: ibm.com/downloads/cas/… Tool: github.com/xforcered/ADOK…

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

Finally, the last release for this year - Brute Ratel v1.8 codename Mirage is here. Various internal updates for evasion such as ETW Kernel telemetry evasion, new unhooking mechanisms for VEH and hardware breakpoints, raw DNS badger and more. Lots of reversing went into this

Finally, the last release for this year - Brute Ratel v1.8 codename Mirage is here. Various internal updates for evasion such as ETW Kernel telemetry evasion, new unhooking mechanisms for VEH and hardware breakpoints, raw DNS badger and more. Lots of reversing went into this
Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

We have all heard about attackers leveraging firewall policies or WFP to block EDRs from communicating with their servers. Today I am releasing a Huntress blog talking about how to mitigate that tampering technique within EDR products: huntress.com/blog/silencing…

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

Our Cyber 5W's next month #DFIR webinar will be about Windows Scheduled Tasks and GhostTask Investigations. #DFIR #Cybersecurity #infosec If you would like to join, please sign-up below (FREE). bit.ly/ghost-task