G0ldenGunSec Profile Banner
Dave Cossa Profile
Dave Cossa

@G0ldenGunSec

Followers
2K
Following
3K
Media
17
Statuses
845

Adversary Simulation @xforce/ Frequent reader of the first page of Google results / Occasional reader of the second page of Google results

USA
Joined September 2017
Don't wanna be here? Send us removal request.
@G0ldenGunSec
Dave Cossa
5 months
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence.
Tweet card summary image
ibm.com
Explore how Azure Arc can be identified in environments, misconfigurations in deployment can allow for privilege escalation, an overprovisioned Service Principal can be used for code execution and...
7
84
190
@catc0n
Caitlin Condon
6 days
Our initial access team has a deep dive blog out this week on creating .NET serialization gadgets by hand (or, alternatively, just using the new .NET deserialization library in VulnCheck's open-source go-exploit framework for your exploit dev needs)
Tweet card summary image
vulncheck.com
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
0
39
100
@knavesec
Ellis Springe
7 days
Come join the team! Long-term operations with some of the best in the world with guaranteed development time. This kind of opportunity doesn't come around often šŸ˜€
@passthehashbrwn
Josh
7 days
If you're into serious red teaming with a crazy skilled team we've got a US based opening!
0
1
2
@passthehashbrwn
Josh
7 days
If you're into serious red teaming with a crazy skilled team we've got a US based opening!
ibmglobal.avature.net
3
35
135
@DebugPrivilege
DebugPrivilege
12 days
As a fun side project - I’ve started tracking vendors whose guides ask customers to create ESC1-style certificate templates, leaving an entire environment exposed šŸ˜…
Tweet card summary image
medium.com
This post isn’t about vendor-bashing. With attacks against Active Directory Certificate Services (ADCS) increasing, I want to show how…
5
39
140
@0xBoku
Bobby Cooke
11 days
Venom C2 tool drop! šŸ During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. Some had EDR so we didn't want anything off-the-shelf. The server, agent, and client were made
10
90
421
@capt_red_beardz
Patrick Fussell
15 days
Any Canadian friends with strong red team backgrounds looking for an AdvSim spot? https://t.co/Ba8V6QcYoP
ibmglobal.avature.net
1
12
43
@JimSycurity
Jim Sykora
18 days
AdminSDHolder is kinda my jam. I wrote the e-book on it. If you work with Activity Directory, I highly recommend you give this a skim, or at least check the spoilers in the blog.
@SpecterOps
SpecterOps
18 days
AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 @JimSycurity went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ā¤µļø https://t.co/Vo9XksEfmn
2
34
195
@unsigned_sh0rt
Garrett
19 days
Microsoft (kinda) deprecated DES in SCCM which caused some of the policy related tradecraft to break. The HTTP module in SCCMHunter and mssqlkaren have been updated to support AES-256. Thanks to @Blurbdust for helping get the fix into pxethief (which I stole from, ofc).
1
11
40
@incendiumrockz
incendiumrocks
19 days
Today, I am releasing the COM-Fuzzer. Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. https://t.co/RBVXP01UK4
Tweet card summary image
github.com
Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopeful...
4
60
205
@TrustedSec
TrustedSec
22 days
Forget common backdoors — a DLL hijack in Windows Narrator can grant SYSTEM-level persistence at login. In our new blog, @Oddvarmoe shows how attackers abuse accessibility features and what defenders should monitor. Read now!
Tweet card summary image
trustedsec.com
2
72
196
@bohops
bohops
24 days
Last month, @d_tranman and I gave a talk @MCTTP_Con called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: https://t.co/1KNln1ldzF Recording should be released soon.
Tweet card summary image
github.com
Slides and resources from MCTTP 2025 Talk. Contribute to bohops/COM-to-the-Darkside development by creating an account on GitHub.
1
80
251
@SpecterOps
SpecterOps
26 days
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ā¤µļø
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
310
653
@decoder_it
Andrea P
29 days
Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used. Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.
4
85
283
@ShitSecure
S3cur3Th1sSh1t
30 days
Remotely enable the EFS service for Win11 systems? No problem with rpcping. Just worked for me from remote with a low privileged user. 🧐
@TrustedSec
TrustedSec
1 month
Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services. In our new blog, @freefirex2 breaks down the types of service triggers that exist and how they can be activated with little to no code required.
2
44
213
@_logangoins
Logan Goins
30 days
I feel like @YuG0rd's briefly mentioned new dMSA account takeover mechanism in his last blog didn't get enough attention. A new account takeover mechanism is on the horizon. I wrote a blog detailing it, releasing with a new BOF I wrote called BadTakeover https://t.co/fyUkDYKAeP
Tweet card summary image
specterops.io
After Microsoft patched Yuval Gordon’s BadSuccessor privilege escalation technique, BadSuccessor returned with another blog from Yuval, briefly mentioning to the community that attackers can still...
3
44
107
@TrustedSec
TrustedSec
1 month
Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services. In our new blog, @freefirex2 breaks down the types of service triggers that exist and how they can be activated with little to no code required.
Tweet card summary image
trustedsec.com
Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services like Remote Registry and EFS. Learn how they…
2
61
159
@G0ldenGunSec
Dave Cossa
1 month
tooling link is kinda buried at the end of the blog. Standalone decryption POC: https://t.co/4vDuHiYFKS Integration into existing "decryptcredentials" method in SQLRecon: https://t.co/0lVAWOxufk (will also be merged into main SQLRecon)
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
0
3
17
@G0ldenGunSec
Dave Cossa
1 month
Ever been on an SCCM site server and *this* close to a DA pw that you couldn't decrypt for some reason? Check out my new blog looking at encryption in use within SCCM sites configured for High Availability and accompanying tooling to recover passwords:
Tweet card summary image
ibm.com
Follow IBM X-Force as they work out the secrets to decrypting credentials vaulted by Microsoft’s System Center Configuration Manager (SCCM).
3
59
141
@dreadnode
dreadnode
1 month
Can we eliminate the C2 server entirely and create truly autonomous malware? On the Dreadnode blog, Principal Security Researcher @0xdab0 details how we developed an entirely local, C2-less malware that can autonomously discover and exploit one type of privilege escalation
9
104
342
@retBandit
Chris Thompson
1 month
Getting some downtime in EU post-@OffensiveAIcon . Thank you to all the community, sponsors, co-organizers, and speakers that helped make it such as amazing first year! A few more days to relax, then it’s back to the grind, exciting things coming!
0
5
24