James Forshaw (@tiraniddo) 's Twitter Profile
James Forshaw

@tiraniddo

Security researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]

ID: 58304160

linkhttps://www.tiraniddo.dev calendar_today19-07-2009 21:51:28

6,6K Tweet

49,49K Followers

343 Following

Natalie Silvanovich (@natashenka) 's Twitter Profile Photo

Looking forward to sharing what Iโ€™ve learned from 10 years of Project Zero at Black Hat tomorrow 11:20, Oceanside A See you there!

Tao Yan (@ga1ois) 's Twitter Profile Photo

We finished our presentation at #BHUSA and the slides were published here: i.blackhat.com/BH-US-24/Preseโ€ฆ, you can also find the latest slides and demo here: github.com/ga1ois/BlackHaโ€ฆ, enjoy, especially for our new "field confusion" V8 sbx escape technique : ) Edouard Bochin Black Hat

No Starch Press (@nostarch) 's Twitter Profile Photo

Find us today at DEF CON in Vendor Area East at Booth 29! Our author signings start with Tim Arnold (Black Hat Python, 2nd Edition) at 11:30am and James Forshaw (Windows Security Internals) at 12:30pm. Full author signing schedule + map: nostarch.com/defcon

James Forshaw (@tiraniddo) 's Twitter Profile Photo

Just to remind people I'll be signing copies of my book at 12:30 at Defcon today at the No Starch Press vendor area. See nostarch.com/defcon for details.

No Starch Press (@nostarch) 's Twitter Profile Photo

A big thank you to everyone who visited us at DEF CON! It's also not too late to shop our #DEFCON32 website sale. Get 32% off site-wide nostarch.com with code DC32. Ends 8/14 at midnight PT.

James Forshaw (@tiraniddo) 's Twitter Profile Photo

It seems amazing to me that MS have spent years talking about this feature and have not fixed well known public bypasses. My similar Kerberos trick probably works tiraniddo.dev/2022/03/bypassโ€ฆ as does googleprojectzero.blogspot.com/2019/12/callinโ€ฆ if you accept a prompt :)

Johnathan Norman (@spoofyroot) 's Twitter Profile Photo

The new account type for services finally landed in WIP. Now when running Windows Protected Print (WPP) the service will run as "Restricted Service" and no longer SYSTEM. There will be a SYSTEM process, but it basically just launches the worker.

The new account type for services finally landed in WIP. Now when running Windows Protected Print (WPP) the service will run as "Restricted Service" and no longer SYSTEM. There will be a SYSTEM process, but it basically just launches the worker.
James Forshaw (@tiraniddo) 's Twitter Profile Photo

Put up the slides for my Microsoft BlueHat 2024 presentation on improvements to OleView.NET github.com/tyranid/infoseโ€ฆ You can also grab v1.15 of OleView.NET from the PS Gallery which has the new features to generate proxy clients on the fly.

No Starch Press (@nostarch) 's Twitter Profile Photo

BOO! Our Halloween flash sale is haunting nostarch.com for 24 hours only. Load up on books and merch, then use code HALLOW33N at checkout to save 31%. Warning: This offer creeps away at midnight PT!

Tim Willis (@itswillis) 's Twitter Profile Photo

Project Zero Blogpost recap for the month: googleprojectzero.blogspot.com/2024/10/the-wiโ€ฆ โ€” j00ru//vx doing another deep dive into the Windows Registry googleprojectzero.blogspot.com/2024/10/effectโ€ฆ โ€” Nick Galloway's dav1d fuzzing case study (new) googleprojectzero.blogspot.com/2024/10/from-nโ€ฆ โ€” an update on using LLMs to find vulns Enjoy! ๐ŸŽ‰

Clement Rouault (@hakril) 's Twitter Profile Photo

In our search for new forensic artifacts at ExaTrack, we sometimes deep dive into Windows Internals. This one is about COM and interacting with remote objects using a custom python LRPC Client. STUBborn: Activate and call DCOM objects without proxy: blog.exatrack.com/STUBborn/

Tim Willis (@itswillis) 's Twitter Profile Photo

Finding 0day is not the most impactful thing that Project Zero does ๐Ÿ˜ฒ โ€” it's sharing knowledge ๐Ÿง . One part of that sharing is our tooling work to help other devs and reserachers. Today's installment, James Forshaw's updated OleView.NET๐Ÿ‘ Blog: googleprojectzero.blogspot.com/2024/12/windowโ€ฆ

Seth Jenkins (@__sethjenkins) 's Twitter Profile Photo

My blog post is now live alongside Amnesty International 's joint release, providing remarkable insight into an ITW exploitation campaign! googleprojectzero.blogspot.com/2024/12/qualcoโ€ฆ Turns out that you can find out quite a bit with just some kernel stacktraces ;) From Amnesty: securitylab.amnesty.org/latest/2024/12โ€ฆ

Tim Willis (@itswillis) 's Twitter Profile Photo

If you've ever wondered if one can determine a vuln from just the kernel panic logs, Seth Jenkins (feat. Jann Horn - [email protected] & Benoรฎt) have something to share: googleprojectzero.blogspot.com/2024/12/qualcoโ€ฆ Great to collaborate with Amnesty International, find vulns and get them fixed: securitylab.amnesty.org/latest/2024/12โ€ฆ

Tim Willis (@itswillis) 's Twitter Profile Photo

Two new posts from James Forshaw today: googleprojectzero.blogspot.com/2025/01/windowโ€ฆ on reviving a memory trapping primitive from his 2021 post. googleprojectzero.blogspot.com/2025/01/windowโ€ฆ where he shares a bug class and demonstrates how you can get a COM object trapped in a more privileged process. Happy Reading! ๐Ÿ“š

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

James Forshaw and his ๐Ÿผ panda kicks-off Day 2 Off-By-One Conference 2025 with ๐ˆ๐Ÿ ๐ฒ๐จ๐ฎ ๐๐จ๐ง'๐ญ ๐œ๐š๐ซ๐ž ๐š๐›๐จ๐ฎ๐ญ ๐š ๐ฏ๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ, ๐ฐ๐ก๐ฒ ๐ฌ๐ก๐จ๐ฎ๐ฅ๐ ๐ˆ? Full house yo!

<a href="/tiraniddo/">James Forshaw</a>  and his ๐Ÿผ panda kicks-off Day 2 <a href="/offbyoneconf/">Off-By-One Conference</a>  2025 with ๐ˆ๐Ÿ ๐ฒ๐จ๐ฎ ๐๐จ๐ง'๐ญ ๐œ๐š๐ซ๐ž ๐š๐›๐จ๐ฎ๐ญ ๐š ๐ฏ๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ, ๐ฐ๐ก๐ฒ ๐ฌ๐ก๐จ๐ฎ๐ฅ๐ ๐ˆ? 
Full house yo!
Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

More goodies!! James Forshaw , Keynote Speaker at Off-By-One Conference books are available at No Starch Press . Use our conference discount code ๐Ž๐…๐…๐๐˜๐Ÿ‘๐ŸŽ to enjoy a 30% on James books! nostarch.com/networkprotocoโ€ฆ nostarch.com/windows-securiโ€ฆ

More goodies!! <a href="/tiraniddo/">James Forshaw</a> , Keynote Speaker at <a href="/offbyoneconf/">Off-By-One Conference</a> books are available at <a href="/nostarch/">No Starch Press</a> . Use our conference discount code ๐Ž๐…๐…๐๐˜๐Ÿ‘๐ŸŽ to enjoy a 30% on James books!
nostarch.com/networkprotocoโ€ฆ
nostarch.com/windows-securiโ€ฆ
Yuval Gordon (@yug0rd) 's Twitter Profile Photo

๐Ÿš€ We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it ๐Ÿคทโ€โ™‚๏ธ Read Here - akamai.com/blog/security-โ€ฆ

๐Ÿš€ We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it ๐Ÿคทโ€โ™‚๏ธ
Read Here - akamai.com/blog/security-โ€ฆ