an0n_r0 Profile Banner
an0n Profile
an0n

@an0n_r0

Followers
13K
Following
10K
Media
316
Statuses
2K

CRT(E|O|L) | OSCP | @RingZer0_CTF 1st (for 2yrs) | HackTheBox Top10 | RPISEC MBE | Flare-On completer | GoogleCTF writeup winner | SSD research | Math MSc |🇭🇺

Joined October 2018
Don't wanna be here? Send us removal request.
@an0n_r0
an0n
4 days
RT @HackingLZ: Now that there are tons of these and I can never find them when I need them, thanks @Oddvarmoe for showing me all the LOLS….
lolol.farm
Living Off the Living Off the Lands
0
45
0
@an0n_r0
an0n
9 days
RT @_l0gg: Blog for ToolShell.Disclaimer: The content of this blog is provided for educational and informational purposes only. https://t.c….
0
82
0
@an0n_r0
an0n
12 days
RT @codewhitesec: We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to p….
0
160
0
@an0n_r0
an0n
24 days
Found this by @ddiwakr. While the project is absolutely in a PoC state, test runs were almost successful. C2 channel over Zoom API. I like the idea. :)
Tweet media one
1
23
96
@an0n_r0
an0n
26 days
RT @mpgn_x64: Wanna see something cool about RDP and NetExec ?
Tweet media one
0
167
0
@an0n_r0
an0n
29 days
RT @TrustedSec: Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @….
Tweet card summary image
trustedsec.com
0
85
0
@an0n_r0
an0n
2 months
RT @RedTeamPT: 🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live:. 🪞 The Reflective Kerberos Relay Attack - Remo….
Tweet card summary image
blog.redteam-pentesting.de
It is a sad truth in IT security that some vulnerabilities never quite want to die and time and time again, vulnerabilities that have long been fixed get revived and come right back at you. While...
0
177
0
@an0n_r0
an0n
2 months
Played with copilot for offensive coding. Tbh it is disappointing. If I asked sth for low-level the produced code is totally false and uncompilable. It was easier to use legacy (but still awesome) stuff like Donut, +polished my loader from lasy year. Still good in some scenarios.
Tweet media one
3
6
91
@an0n_r0
an0n
2 months
RT @ACEResponder: How the new Bad Successor dMSA domain takeover attack works. #ThreatHunting #DFIR
0
78
0
@an0n_r0
an0n
2 months
RT @the_yellow_fall: Critical 0-Day (CVSS 9.8) in Fortinet Products Actively Exploited. A critical Fortinet zero-day (CVE-2025-32756, CVSS….
Tweet card summary image
securityexpress.info
A critical Fortinet zero-day (CVE-2025-32756, CVSS 9.8) is being actively exploited, allowing unauthenticated RCE. PoC available, patch immediately.
0
133
0
@an0n_r0
an0n
2 months
RT @theluemmel: Took @akamai_research's script for BadSuccessor and improved it a bit. - runs from non domain joined systems.- works in fo….
0
115
0
@an0n_r0
an0n
2 months
RT @Octoberfest73: Can’t win. Try to do the right thing and get told to fuck off by Microsoft, so you open source it WITH detection logic a….
0
9
0
@an0n_r0
an0n
3 months
RT @HackingLZ: If you want to be a successful red teamer in 2025, do you have to be able to code(This includes with or without the assistan….
0
5
0
@an0n_r0
an0n
3 months
RT @bl4sty: ok ok fine, for old time's sake .
Tweet media one
0
71
0
@an0n_r0
an0n
3 months
One more thing about my Hikvision journey: extracted the plaintext camera passwords from the NVR by MitM (actually connected to the NVR using a camera IP) and by downgrading the default HTTP digest authentication to basic using these RTSP server replies.
Tweet card summary image
gist.github.com
RTSP client responses for forcing HTTP Basic authentication - fake_rtsp_server.py
@an0n_r0
an0n
3 months
Thanks @HikvisionHQ, resetting your basic NVR device admin password (even with physical access) requires hardware hacking. I don't see any realistic threat that you are protecting your customers against, but anyway, I like it. 🙂
Tweet media one
1
4
7
@an0n_r0
an0n
3 months
One last note about the TFTP download: the NVR uses relative path (filename without leading /), so a map file might be needed (if the TFTP server requires absolute paths).
0
1
2
@an0n_r0
an0n
3 months
The colors of the USB TTL wires are (ordered):. - black: GND.- red: power (must NOT be connected!).- white: RX (data to USB).- green: TX (data from USB). The connection should be (TX<->RX, GND<->GND):. - JST yellow <-> USB white.- JST black <-> USB green.- JST red <-> USB black.
1
2
1
@an0n_r0
an0n
3 months
The wiring of the JST-ZH connector according to the picture below:. - white: power (must NOT be connected!!!).- yellow: TX (data out from the NVR).- black: RX (data into the NVR).- red: GND (ground, it is required for reliable operation)
Tweet media one
Tweet media two
1
0
0