
BlackWasp
@BlWasp_
Followers
2K
Following
10K
Media
40
Statuses
888
Pentester and Red Team technical leader at Advens | Microsoft MVP
Joined August 2016
I'v recently updated my Active Directory cheatsheets. I'v added attacks regarding krbjack, GPOditty, SCCM, RODC pivoting, External Trust non-transitivity bypass, DES attacks, and others. If interested :.- AD : - AD Python :
5
162
481
I have just finished an update on WDSFinder, right before my rump at @WineRump : WDSFinder now supports LDAPS with Channel Binding, and LDAP with Session Signing enforced!.The code may also prove useful for those trying to use these protocols in Rust.✌️.
github.com
This new version adds the capability to authenticate and request LDAP when Session Signing is Enforced. Additionally, LDAPS is now also supported, even with Channel Binding set to Always.
0
3
27
RT @C5pider: Introducing Havoc Professional: A Lethal Presence. We’re excited to share a first look at Havoc Professional, a next-generatio….
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
0
185
0
Additionally, I have coded a little tool to automate the detection of these shares:
github.com
A simple tool to identify WDS servers in Active Directory - BlWasp/WDSFinder
1
4
34
Some weeks ago, @TrustedSec has posted a really interesting blog post about the MDT shares, and credentials that can be found inside. But one question remained unanswered: where are they? I have tried to answer this question:.
5
43
135
Currently, if this patch is not deployed in an Active Directory, anyone with a user account is able to takeover any assets, except for DC, by default!.
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d.
0
1
6
I've just completed the @MalDevAcademy Malware Development Course. The course presents modern techniques for bypassing security solutions, low-level development and evasion. I would totally recommend this course to Red Team operators requiring a high level of discretion!.
0
3
21
RT @_nwodtuhs: Kerberos relay on The Hacker Recipes, brought to you by @BlWasp_ 💪
thehacker.recipes
MITRE ATT&CK™ Sub-technique T1557.001
0
58
0
Following the recent @Synacktiv 's article about abusing WebClient authentications from multicast poisoning, I have made a quick PR on Responder to simplify the setup:
github.com
Hello! In this recent article, Synacktiv demonstrated that during multicast poisoning, depending on the error code returned by the SMB server at the end of the authentication process, it was possib...
0
25
80
RT @pentest_swissky: Make Bloodhound Cool Again: Migrating Custom Queries from Legacy BloodHound to BloodHound CE.
medium.com
We love the new Bloodhound version, it is faster, prettier, and more robust. However, due to the lack of many custom queries, we often…
0
31
0
RT @al3x_n3ff: This looks off to you? Yeah. In the default configuration, NFS exposes THE ENTIRE FILE SYSTEM and not only the exported d….
0
87
0
RT @Synacktiv: In our latest article, @l4x4 revisits the secretsdump implementation, offering an alternative avoiding reg save and eliminat….
synacktiv.com
LSA Secrets: revisiting secretsdump
0
149
0
RT @Synacktiv: Following the release of IPSpinner last week, now is the time to unveil CaptainCredz! Perform advanced, fine-grained passwor….
github.com
CaptainCredz is a modular and discreet password-spraying tool. - synacktiv/captaincredz
0
62
0