Gabriel
@_theVIVI
Followers
1K
Following
10K
Media
157
Statuses
3K
Security Engineer | Gamer
Nairobi, Kenya
Joined April 2013
Ladies and gentlemen - here is a Notepad* RCE you've always wondered whether it was possible. https://t.co/BIJtHdcPOZ *Well, the modern, AI-powered one.. Who could have thought that with more features you bring more bugs.
8
88
642
Non-malware schizos asking about why the Notepad++ malware payload was so interesting. Okay, we'll discuss it without getting too schizo. First, Rapid7 (and other various Cyber Threat Intelligence vendors) seem to generally attribute the Notepad++ compromise to Chinese APT
33
189
2K
There are two main password attacks leveraged by adversaries; one is called Password Spraying and the other is called Kerberoasting. This post focuses on identifying accounts that may be targeted for Kerberoasting and how to harden the environment against Kerberoasting.
9
76
360
‼️🚨 BREAKING: Notepad++ Hijacked by Chinese State-Sponsored Hackers Traffic from targeted users were selectively redirected to malicious update servers.
52
246
2K
A small rant: The State of Art in Red Team is whatever you want to believe
x-c3ll.github.io
a rant about Red Teaming.
17
91
349
New from @KingOfTheNOPs + @senderend: azureBlob, a Mythic C2 profile that uses Azure Blob Storage as transport.Supported Agents: 🐍 Medusa 🪽 Pegasus (new test agent) ❤️ Your fav agent (with simple integration guide) https://t.co/0jNpt5978o 🧵: 1/2
2
49
166
We published a new tool named PrefetchFileParser that enumerates and parses Windows Prefetch files (.pf) for extracting execution history. This tool can be utilized for both offensive and defensive purposes (see the README). https://t.co/Jnn6RWBL8Z
1
70
363
@Defte_ Update: Thanks to @RedTeamPT, I created a pull request for ntlmrelayx to reflect the new requirements: https://t.co/g42CHDxQdB Now Shadow Creds are working again 😀
5
82
281
Introducing RelayKing. https://t.co/EiVApPiXzi Blog: https://t.co/0Vi6WxyAYq Automatically identify relay attack paths. No longer will you be left to manually detect a comprehensive inventory of all the relaying vectors on your engagements. It will detect signing/EPA
depthsecurity.com
If you’re anything like me and/or an offensive security professional, you’re probably very, very familiar with NTLM relaying attacks against Active Directory environments. NTLM relay attacks are...
3
85
210
I can't believe Microsoft killed one of my favorite labs in my Entra ID training 😭. The Azure CLI and Azure PowerShell are no longer FOCI clients. On a serious note: good for security!
6
28
117
Excited to disclose my research allowing RCE in Kubernetes It allows running arbitrary commands in EVERY pod in a cluster using a commonly granted "read only" RBAC permission. This is not logged and and allows for trivial Pod breakout. Unfortunately, this will NOT be patched.
46
379
3K
I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 https://t.co/2e2DBIndcU
specterops.io
ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.
3
97
231
What an episode 🙌🏾
0
0
1
Adversaries weaponizing signed drivers as EDR killers? This is exactly why we built #loldrivers. wsftprm.sys (CVE-2023-52271) - legitimately signed, terminates AV/EDR via kernel access, NOT on MS blocklist. https://t.co/eM4F3uGXfb We've tracked it since Sept 2024. Defenders
loldrivers.io
wsftprm.sys Description Northwave Cyber Security contributed this driver based on in-house research. The driver has a CVSSv3 score of 6.1, indicating a antivirus killer impact. This vulnerability...
3
34
122
Net-NTLMv1 is outdated, insecure, and must go. 🛑 To help defenders prove the risk and accelerate deprecation, we’ve released a comprehensive dataset of rainbow tables. See how easily these keys can be recovered, and secure your environment. Read more: https://t.co/g4gjEAhCiv
3
85
284