Jonas Vestberg Profile
Jonas Vestberg

@bugch3ck

Followers
2K
Following
5K
Media
467
Statuses
6K

Privilege Escalation Engineer Principal Consultant @ Reversec (formerly WithSecure Consulting)

@bugch3ck.bsky.social
Joined August 2011
Don't wanna be here? Send us removal request.
@dis0rder_0x00
dis0rder
16 days
Today I share my first ever blogpost and give u another tool drop. I'll show you how to delegate your C2s HTTP-traffic to chromium-based browsers, using the Chrome DevTools Protocol. Blog: https://t.co/FOvN65z01S GitHub Repo with library for you to use:
github.com
Using Chromium-based browsers as a proxy for C2 traffic. - dis0rder0x00/stillepost
3
37
130
@bugch3ck
Jonas Vestberg
19 days
Holy smoke batman I found an enterprise software that bundles Remcom 🙈
0
0
0
@_RastaMouse
Rasta Mouse
24 days
Managed to get RTO II out in time for everyone to enjoy the Black Friday sale, so have at it.
@_ZeroPointSec
Zero-Point Security
24 days
Not a drill, I repeat, this is not a drill. https://t.co/6TPpGcmLTi
7
24
199
@bugch3ck
Jonas Vestberg
24 days
Checks calendar, it's not April 1st. 🥳
@_ZeroPointSec
Zero-Point Security
24 days
Not a drill, I repeat, this is not a drill. https://t.co/6TPpGcmLTi
0
0
0
@ShitSecure
S3cur3Th1sSh1t
26 days
My Troopers talk about Cross Session Activation attacks is now available on YouTube: https://t.co/in6neSYbMa 🙌 Lateral Movement in the context of logged in user sessions 🔥🔥@WEareTROOPERS thanks for the opportunity and event! 🙃
2
30
125
@yo_yo_yo_jbo
Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️
27 days
This blogpost is interesting - has Windows internals, my own novel solution to a problem red teamers have had for a while, EDR bypasses, debugging and much more. Spoofing command lines on Windows and solving the problem of length limitations: https://t.co/4R5FCfNvsV
2
47
161
@_CobaltStrike
Cobalt Strike
28 days
Cobalt Strike 4.12 is LIVE, complete with a new look for the GUI! Additionally, we're introducing: - A REST API - User Defined Command and Control (UDC2) - New process injection options - New UAC bypasses - and more! Check out the release blog for details. https://t.co/o80AbK9U8E
4
29
94
@sekurlsa_pw
🕳
28 days
Install all SysInternal tools on Windows machines with command line alias: winget install --id Microsoft.Sysinternals.Suite Or use the good old: https://t.co/N7YIXIEEC8
1
26
126
@Oddvarmoe
Oddvar Moe
1 month
Just learned something wild — maybe everyone else already knew… In Edge/Chrome, you can bypass the HTTPS security warning by typing: 👉 thisisunsafe No button, no prompt. Just type it. Instantly skips the warning and loads the site. 🤯 Great write-up explaining it here:
30
139
1K
@SpecterOps
SpecterOps
1 month
SCCM’s AdminService uses Entra tokens without confirming the UPN exists in AD. A crafted synced UPN can let an attacker impersonate the site server. Microsoft now requires on-prem SID matching (CVE-2025-59501). Great deep dive by @unsigned_sh0rt! https://t.co/FGAHfaXHsY
0
66
173
@lcamtuf
lcamtuf
1 month
Me: I want to have more friends Tech companies:
57
3K
36K
@tomwarren
Tom Warren
1 month
Microsoft is adding Sysmon directly into Windows. The Sysinternals utility will make it easier for security teams to detect and respond to threats
Tweet card summary image
theverge.com
Sysmon was first released in 2014 as a utility for security analysis into the Windows Event Log. Built by Microsoft technical fellow Mark Russinovich with assistance from Thomas Garnier, Sysmon is...
13
81
467
@Octoberfest73
Octoberfest7
1 month
Section 10/12 of the UDRL/Sleepmask course is finally complete. By far the most complicated / longest to write. Super excited to finish this out and get it into people's hands!
4
23
143
@masebond_
Mas Bond
1 month
Closing the Friedge
162
91
227
@LAripping
Leo Tsaousis
2 months
My #DEFCON33 @cloudvillage_dc talk is now on YouTube! 🎥 Featuring a global scavenger hunt game, hidden Easter eggs from Greece, and a Prowler module that never happened. See y'all next year for the three-peat! https://t.co/y4Qgve0Jdl
1
1
7
@bugch3ck
Jonas Vestberg
1 month
Hi @msftsecresponse ! I'm pretty sure you do not consider lateral movement techniques that require admin access on the target to be a vulnerability right?
0
0
2
@0x534c
Steven Lim
2 months
SilentButDeadly is a powerful tool for red teamers and security researchers. It uses Windows Filtering Platform (WFP) to block cloud connectivity of EDR/AV software—like SentinelOne and Windows Defender—without terminating processes, enabling stealthy network isolation for
Tweet card summary image
github.com
SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo...
1
66
251
@whokilleddb
db
2 months
Actually yes - and what the function does what it says - so you can do things like: https://t.co/TRSuK0xzhw No weird VirtualAlloc calls or locating functions involved!
@owengsmt
carved4
2 months
@whokilleddb i think it calls mscoree!GetProcessExecutableHeap under the hood
1
34
205
@whokilleddb
db
2 months
I might be DUMB but I was today years old when I found out that when the CLR allocates memory for IL, it has RWX permissions which means you can do this:
4
13
120