Xtrato Profile Banner
James Woolley Profile
James Woolley

@Xtrato

Followers
2K
Following
522
Media
38
Statuses
429

Interested in Network security and Technology

Herefordshire, England
Joined March 2008
Don't wanna be here? Send us removal request.
@Xtrato
James Woolley
24 days
I recently created a VNC honeypot. Many people asked me how I went about setting it up, so I've created a blog post describing the process. You can read about it at:.
Tweet media one
8
60
318
@Xtrato
James Woolley
2 months
The server has been configured to automatically record an established VNC session. It logs the IP address that connected and the time, then saves the recording into a folder that I pull down every few days. A snapshot of the VM is taken, which gets reverted once they disconnect.
3
2
567
@Xtrato
James Woolley
2 months
Most of the other interactions consisted of people connecting, then checking the resources on the server, and for applications like nvidia-smi. (Presumably to see if it can be used to mine crypto). Before disconnecting once they realised it had 1GB of RAM and 1vCPU.
10
18
938
@Xtrato
James Woolley
2 months
I left a server online with VNC wide open to see how it would be interacted with. This is one of the more interesting interactions:
175
380
6K
@Xtrato
James Woolley
8 months
RT @jarrodWattsDev: Someone just won $50,000 by convincing an AI Agent to send all of its funds to them. At 9:00 PM on November 22nd, an A….
0
5K
0
@Xtrato
James Woolley
11 months
Been playing around with analysing IOT firmware. Just had my first successful NAND dump from a BT Smart Hub 2.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
1
10
@Xtrato
James Woolley
1 year
RT @birchb0y: Interesting note on the #xz backdoor: . If you plot Jai Tan's commit history over time, the cluster of offending commits occu….
0
432
0
@Xtrato
James Woolley
1 year
Seen these @DeterTech_UK Armadillos in quite a few places over the past couple of years. I would love to test the security of them! They look really interesting.
Tweet media one
0
0
3
@Xtrato
James Woolley
1 year
Recently started using a T-Beam LORA radio. I live in an area where there aren't any others around. I was very surprised to see just now another one nearby apparently onboard FR1175 to Portugal. Even managed to send a quick message and get a reply. #meshtastic #lora
Tweet media one
Tweet media two
0
0
10
@Xtrato
James Woolley
1 year
RT @Jonas_B_K: ADCS attack paths in BloodHound! 🥳. This blog post breaks down the implementation of the ESC1 requirements and guides you on….
Tweet card summary image
posts.specterops.io
Since Will Schroeder and Lee Christensen published the Certified Pre-Owned whitepaper, the BloodHound Enterprise team at SpecterOps has…
0
119
0
@Xtrato
James Woolley
2 years
Has anyone attempted to dump the firmware off a BT Smart Hub 2?. Im using a CH341A to dump it. Binwalk is reporting "LANCOM firmware loader" but no files to extract. Command output in link below. Im happy to send the firmware dump to anyone who can help.
Tweet media one
Tweet media two
0
0
3
@Xtrato
James Woolley
2 years
RT @techspence: My goto AD toolbelt:. PowerView (custom).PrivescCheck (custom).PingCastle.ScriptSentry.Spray-Passwords (custom).SpoolSample….
0
115
0
@Xtrato
James Woolley
2 years
RT @0xor0ne: Home router (SOHO) hacking.Presentation slides (HITB2023).Credits @NCCGroupInfosec. "Your not so Home Office - SOHO Hacking at….
0
142
0
@Xtrato
James Woolley
2 years
RT @Kostastsale: This is a pretty nice graphic explaining how Kerberos Auth takes place. Useful to have as a reference when you have to e….
0
426
0
@Xtrato
James Woolley
2 years
RT @bltjetpack: After about a year of work in off-hours, S3Scanner has been rewritten in Go! 🎉. Check out the newest version here: https://….
0
30
0
@Xtrato
James Woolley
2 years
RT @NIBunker: Today is the culmination of 13 years of work. I have installed the final piece of operational equipment in the bunker. The Sm….
0
66
0
@Xtrato
James Woolley
2 years
DLL hijacking using cscapi.dll loaded by explorer.exe. It's a very basic example and a good one to try in a lab if new to the DLL hijacking process. I've done a short write-up about it if interested.
ja.meswoolley.co.uk
Once privileged access has been achieved on a target machine the next step tends to be maintaining persistence. If the target is restarted or a new user logs in, you want to maintain access to the...
0
0
0
@Xtrato
James Woolley
2 years
RT @DailyDarkWeb: Penetration-List. A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penet….
0
125
0
@Xtrato
James Woolley
2 years
RT @BushidoToken: 🆕 Blog - Investigating SMS phishing text messages from scratch 🔍. A guide to practice doing some research for budding ana….
0
100
0
@Xtrato
James Woolley
2 years
RT @7h3h4ckv157: BypassAV 🔥📢. This map lists the essential techniques to bypass anti-virus and EDR. #infosec #Hack….
0
116
0