Crypt0s Profile Banner
Crypt0s Profile
Crypt0s

@Crypt0s

Followers
2K
Following
1K
Media
424
Statuses
9K

Application security guy who dabbles in radios, networking, protocols…pretty much anything anyone puts in front of me to hack!

Maryland, USA
Joined July 2009
Don't wanna be here? Send us removal request.
@Crypt0s
Crypt0s
7 years
Confused about DMR? Fustrated you can't get your hotspot configured? Need some help? Here is a quick tutorial: https://t.co/lELU5HxNE9 #DMR #hamradio #brandmeister #mmdvm
Tweet card summary image
medium.com
What Is DMR?
1
1
3
@mcdaidc
Cathal Mc Daid
2 years
1/12 It has been confirmed that the #Taurus interception was done via “a non-secure line”. Below is my opinion of one way in which it *might* have been done, taking into account the situation and #Russia's previous history. Essentially it involves using #SS7 interception. 🧵
11
106
332
@ghidraninja
stacksmashing
2 years
Lenovo X1 Carbon Bitlocker Key Sniffing any% Speedrun (42.9 seconds)
60
821
4K
@an0n_r0
an0n
2 years
OST cannot be stopped. Here is a technique we tested internally 9 months ago: blocking EDR telemetry by leveraging the Windows Filtering Platform. Considered it so evil that we didn't publish it that time. It was pointless, now here it is by @netero_1010:
Tweet card summary image
github.com
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server. - netero1010/EDRSilencer
12
271
872
@s1zzzz
s1zz
2 years
Discovered and exploited an arbitrary file delete vulnerability that lead to SYSTEM level privileges. Thanks to the goat @filip_dragovic.
7
29
158
@Crypt0s
Crypt0s
2 years
0
0
1
@SBousseaden
Samir
3 years
interesting recent UAC bypass method https://t.co/dbgCqFlna8
2
70
213
@Crypt0s
Crypt0s
3 years
The best thing about generative AI is that I hear far far less about Web3 bullshit
0
0
3
@Crypt0s
Crypt0s
3 years
Are we really not supposed to double space after a period anymore???????
3
0
1
@Crypt0s
Crypt0s
3 years
Very cool explanation of CANbus theft technique
0
0
0
@_dirkjan
Dirk-jan
3 years
New blog: Obtaining Domain Admin from Azure AD by abusing Cloud Kerberos Trust I teased this a bit during my Windows Hello talks, now found some time to write about this interesting technique. Also contains defenses and detection opportunities. https://t.co/KSPVRm5iGo
dirkjanm.io
Many modern enterprises operate in a hybrid environment, where Active Directory is used together with Azure Active Directory. In most cases, identities will be synchronized from the on-premises...
8
330
776
@Crypt0s
Crypt0s
3 years
A certificate reseller bypassed the HTTP verification of the ACME cert protocol by using a remote code injection in https://t.co/IaPJptnCBU to write their own When called out they are surprised Pikachu and say they didn’t know what an RCE was before this. 😬
@ryancdotorg
Ryan Castellucci
3 years
🍿🍿🍿 CA dId NoThInG wRoNg (they built a product around an 0day in a certificate management tool, got caught, and I'm hoping this results in a root CA being incinerated because that would be funny) https://t.co/EeMslOmee5
0
0
0
@netcapgirl
sophie
3 years
29
873
7K
@mpeg4codec
Mike Ryan
3 years
@cybergibbons I'd be pretty interested see how it fares with my new SDR Bluetooth sniffer and a bladeRF. Can it perform all-channel sniffing in real time? Benchmark with ice9-bluetooth -s -f /dev/urandom
Tweet card summary image
github.com
Wireshark-compatible all-channel BLE sniffer for bladeRF, with wideband Bluetooth sniffing for HackRF and USRP - mikeryan/ice9-bluetooth-sniffer
1
1
3
@Crypt0s
Crypt0s
3 years
It’s like nobody has ever tried to execute a docker container inside of an existing network namespace before
0
0
0
@Itsfoss
It's FOSS
3 years
Clean Windows using Linux 😛
36
127
1K
@Crypt0s
Crypt0s
3 years
It isn’t likely that they have some sort of Uber-leet exploit in the radio or the encryption itself - these radios aren’t likely hardened against an attacker dumping the radio contents, including any encryption keys. Reprogramming radios in the field is hard, so stolen keys last
0
0
0
@Crypt0s
Crypt0s
3 years
Great thread on the 300+ drones lost a day figure being generated as an approximation from UKR staff. They buried another lede here though! “Russian EW is…achieving real time interception and decryption of Ukr Motorola 256-bit encrypted…comms” RU stole and dumped radios!
@Jack_Watling
Jack Watling
3 years
Today my colleague Nick Reynolds and I published ‘Meatgrinder: Russian Tactics in the Second Year of Its Invasion of Ukraine https://t.co/CAaeGBtDBZ In which we report that the AFU are losing 10,000 UAVs a month. 2/17
1
0
0
@d0tslash
KF
3 years
"Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629)"
2
3
6
@Crypt0s
Crypt0s
3 years
Not for a hot minute tho right? Like part of fuzzing could be the AI can generate the test harness but that’s a far cry from current “coding ability” of AI I’ve seen so far. And web is such a hot mess of different stuff… Maybe in 2-3 years?
@Jhaddix
JS0N Haddix
3 years
Generative AI aided fuzzing will lead to more binary and web exploits. Both defense and offense will benefit from this.
0
0
0