
Cube0x0
@cube0x0
Followers
12K
Following
6K
Media
58
Statuses
1K
https://t.co/rOLNaoDtZK -founder 🇸🇪
Sverige
Joined November 2017
RT @decoder_it: I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehens….
0
150
0
If you wanna do it in c#, merge this with the og krbrelay https://github[.]com/CICADA8-Research/RemoteKrbRelay.
RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟.
1
5
58
RT @decoder_it: M'm glad to release the tool I have been working hard on the last month: #KrbRelayEx.A Kerberos relay & forwarder for MiTM….
0
231
0
RT @decoder_it: Is Kerberos relaying so limited? I'd say no, thanks to @tiraniddo CredMarshalTargetInfo trick. In this case, I'm relaying….
0
112
0
RT @artem_i_baranov: Red Teaming in the age of EDR: Evasion of Endpoint Detection Through Malware Virtualisation.
0
165
0
RT @Laughing_Mantis: Since I'm 6 drinks in for 20 bucks, let me tell you all about the story of how the first Microsoft Office 2007 vulnera….
0
2K
0
RT @_EthicalChaos_: Time to be terrified. I've just dropped my Okta Terrify tool which I demonstrated as part of my @BSidesCymru talk last….
0
127
0
🔥.
POC for #SilverPotato utilizing Kerberos relay vs SMB ;) Starting from @cube0x0 great krbrelay tool with extra layer of complexity to get the SilverPotato beast working. Still in the rough but will publish soon :-)
0
6
32
RT @tiraniddo: Taking a cue from @D1iv3 and @decoder_it's work on inducing authentication out of remote DCOM I thought I'd quickly write up….
0
49
0
RT @curi0usJack: Interested in red team operations using almost all internal tooling against some of the hardest companies in the world? Lo….
0
43
0
RT @edwardzpeng: #VisualStudio 1-click RCE, No Smartscreen warning, No trust need, No futher interaction need. Just download from internet….
0
54
0