binarymoovs Profile Banner
moovs Profile
moovs

@binarymoovs

Followers
27
Following
2K
Media
14
Statuses
3K

Tech - Science - Future - Freedom - CyberSecurity

Joined June 2023
Don't wanna be here? Send us removal request.
@akamai_research
Akamai Security Intelligence Group
5 months
Today we unveil BadSuccessor - a new no-fix Active Directory privilege escalation technique. We will explore the recently introduced dMSA feature, and show how it enables turning a very common, seemingly benign permission, into a full domain take over. https://t.co/k4roTZE36T
3
185
503
@ADAllTheTime
Active Directory Things
7 months
If you need to pinpoint which DC made the change to an AD object/attribute you can use: repadmin /showobjmeta dcname objectDN It's a handy place to start; then go inspect the event logs for that DC to get more detail on whatever you're trying to find out.
0
45
215
@SkipToEndpoint
James Robinson | MVP
7 months
So the new #LAPS Settings are now available via #Intune, but be aware that they all require 24H2 and won't show an error when applying to a device below that, but will apply the default password complexity instead. Make sure the account exists though, or, uhh...
5
38
96
@guyrleech
Guy Leech
7 months
Show immediate child OUs too (New-Object System.DirectoryServices.DirectorySearcher "(&(objectClass=organizationalUnit)(ou=*para*))").FindAll() | % { $_.Path ; ([ADSI]$_.path).Children|Where SchemaClassName -eq "organizationalUnit" | Select
@guyrleech
Guy Leech
7 months
PowerShell 1 liner to find OUs that match a given pattern - AD PS module not required (New-Object System.DirectoryServices.DirectorySearcher "(&(objectClass=organizationalUnit)(ou=*Citrix*))").FindAll()
0
8
34
@sans_isc
SANS.edu Internet Storm Center
7 months
A Tale of Two Phishing Sites https://t.co/R8Uf1PbcaB
0
2
2
@al3x_n3ff
Alex Neff
7 months
The NXCDB of NetExec finally supports the LDAP protocol as well🎉 Long overdue and now finally implemented by @lapinousexy
3
42
218
@BizKellyx
Emilia Jackson
7 months
Need to try @1stphorm 🙌
@FoundersClubUS
The Founders Club
7 months
Wishing I loved anything the way this man loves @1stPhorm
0
5
34
@Officialwhyte22
Winston Ighodaro
7 months
Been working on this tool for a while now. This tool will be valuable to every hacker in the field.🌟 Can't wait to demo this tool to my students😈
1
8
29
@cyber_advising
Cyber Advising
7 months
CVE-2025-24071> Windows Explorer automatically initiates an SMB authentication request when a .library-ms file is extracted from a .rar archive, leading to NTLM hash disclosure. The user does not need to open or execute the file... https://t.co/d1myefHndw
Tweet card summary image
github.com
CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File - 0x6rss/CVE-2025-24071_PoC
4
151
491
@9mm_smg
9mmSMG
7 months
The specs + the prices 😂😂
24
16
242
@M4yFly
Mayfly
7 months
📩 Exchange Exploitation - Part 1 (Without Credentials) Explore Exchange exploitation in Game of Active Directory and learn about attacks without valid credentials. https://t.co/pxXdmD9Pvq
Tweet card summary image
mayfly277.github.io
On GOAD v3 Update: A New Addition appear : EXCHANGE! Huge thanks to aleemladha for his pull request and invaluable help in integrating Exchange into the GOAD lab! I’ve been wanting to write an...
2
56
170
@guyrleech
Guy Leech
7 months
Don't rely on GPO alone to block cmd.exe since it's trivial as a non-admin to edit 1 byte in cmd.exe to make it policy proof, or download already hacked - a technique that has worked for 20+ years so use something else to secure it like @GoIvanti Application Control (trusted
5
20
97
@thehealthb0t
healthbot
7 months
4
73
548