NULLKrypt3rs Profile
NULLKrypt3rs

@NULLKrypt3rs

Followers
94
Following
117
Media
5
Statuses
34

CTF Team || IIIT-Allahabad

Allahabad, India
Joined November 2018
Don't wanna be here? Send us removal request.
@dez_
Joe Desimone
3 years
Added a new technique in Patriot to identify suspicious CONTEXT structures used in the rop/callback chains of foliage, #nighthawk, #brc4, gargoyle, etc. https://t.co/QsYoHFlrgu
3
26
81
@httpvoid0x2f
HTTPVoid
4 years
Thread - Confluence Blind OGNL Injection analysis from our limited java knowledge. From vulnerable sink to becoming admin of the confluence instance. #CVE-2022-26134. Tested on latest vulnerable version 7.18.0.
3
151
449
@bohops
bohops
4 years
This PowerShell one-liner will open a visible IE browser in Windows 11: $(new-object -com internetexplorer.application).Visible=$true
@aaaddress1
adr
4 years
as M$ said, IE should be totally removed from Win11 & redirect to M$ Edge. Fun Fact: attackers still can launch IE on Win11 by COM interface {0002DF01-0000-0000-C000-000000000046}
1
43
152
@imranHudaA
Imran Huda(Ahhad)
4 years
Interesting account takeover of the day. The site was hosting their https://t.co/i5o2oc49ez on amazonaws While resetting my password I have noticed that the host was getting passed in json body
12
71
289
@AlmondOffSec
Almond OffSec
4 years
No PKINIT? No problem! Thanks to team members Yannick and @lowercase_drm, you now have a way to (ab)use your ill-earned ADCS certificates even when domain controllers do not support PKINIT https://t.co/bE70PblkYq
2
98
183
@_nwodtuhs
Charlie Bromberg « Shutdown »
4 years
Here are the slides for my talk « Delegating Kerberos to bypass Kerberos delegation limitation » 😈 at @1ns0mn1h4ck #INS22 https://t.co/fI76XQQmk0
16
233
596
@yarden_shafir
Yarden Shafir
4 years
Trying to learn security research and getting overwhelmed by all the details? I just published a guide showing my process for step-by-step analysis of a security feature: https://t.co/7k87w8DhFh
21
574
2K
@FrenchYeti
FrenchYeti
4 years
New Interruptor 0.1 release 🔥 add Follow Thread 🥳, Kernel API constants usable by their names into hooks🥰, configurable output, smart modules/interrupts filtering https://t.co/eulUNxq9kR
0
13
45
@podalirius_
Rémi GASCOU (Podalirius)
4 years
[#thread 🧵] Last week in #Microsoft #PatchTuesday, a critical vulnerability was patched that theoretically allows attackers to achieve Remote Code Execution on a target #IIS server (CVE-2022-21907). I'll explain how it works in this thread ⬇️
3
38
126
@podalirius_
Rémi GASCOU (Podalirius)
4 years
I'm proud to present a new tool, #LDAPmonitor! With this you can monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! Lots of authentication types are supported, and output can be saved to a file. https://t.co/XJf5QKTLQy
Tweet card summary image
github.com
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! - GitHub - p0dalirius/LDAPmonitor: Monitor creation, deletion and changes to LDAP objects ...
12
191
478
@AbhishekKarle3
Abhishek Karle
4 years
My recent Bounties 🤑
2
2
67
@Synacktiv
Synacktiv
4 years
Takeover an entire domain by resetting passwords! We detailed how to exploit CVE-2021-40539 on ManageEngine ADSelfService Plus in this blogpost https://t.co/craR84dtvv @acervoise - @tiyeuse
Tweet card summary image
synacktiv.com
How to exploit CVE-2021-40539 on ManageEngine ADSelfService Plus
0
56
141
@Nikhith_
Nikhith
4 years
Revisiting an old bug which paid off really well during a previous Red Team op. The good old Microsoft Exchange unauthenticated email relay. This was particularly impactful. Here's why: 🌶️Unauthenticated 🌶️No phishing infra needed 🌶️Emails land directly in user's inbox (1/4)
2
9
37
@_RastaMouse
Rasta Mouse
4 years
@l42Y_ Works fine for me.
1
1
2
@InfoSecComm
InfoSec Community
5 years
New Write-up on InfoSec Write-ups publication : "Finding My First Bug: HTTP Request Smuggling" #bugbounty #bugbountywriteup #bugbountytips
1
45
166
@NULLKrypt3rs
NULLKrypt3rs
5 years
b00t2root CTF ended! Hearty congratulations to team @ByteForc3, @Zh3r00 and @0x90r00t for bagging the top three positions! We would also like to thank our esteemed sponsors @offsectraining @vector35 for sponsoring the prizes. Adieu guys! See you all next year :)
0
3
16
@NULLKrypt3rs
NULLKrypt3rs
5 years
15+ hrs into the CTF and we are seeing some intense competition here :P If you havent registered yet shoot here: https://t.co/91rNoi2tIt #boot2r00tctf2020
0
5
12
@hintIIITA
Hack In The North
5 years
Hola folks, With Hacka-demic in close sight, we are glad to announce the prizes and goodies awaiting the winners. Hoping the poll has added flavors to your curiosity on the possible themes, we are more than excited to witness your take on our themes. (1/2)
1
15
30