emanuelduss Profile Banner
@emanuelduss@infosec.exchange Profile

@emanuelduss

Followers
866
Following
8K
Media
194
Statuses
2K

IT security. Linux & network protocols. Pentesting web applications, networks & AD infrastructures. Mostly technical stuff here. @[email protected]

Switzerland
Joined September 2009
Don't wanna be here? Send us removal request.
@thezdi
Trend Zero Day Initiative
2 years
Collision – Compass Security was able to execute their stack overflow attack against the Synology BC500. However, the exploit they used was previously known. They still earn $3,750 and 0.75 Master of Pwn points. #Pwn2Own
1
10
43
@compasssecurity
Compass Security
2 years
SecAnalyst Sylvain Heiniger (@sploutchy) loves NTLM relay. Dive into his latest blog post to learn how it can be used against Microsoft SQL servers. Discover misconfigurations in your infrastructure and fortify your defenses today. 🛡️ #MSSQL #NTLMrelay https://t.co/xur8aAZDOq
2
41
72
@compasssecurity
Compass Security
2 years
📡 Discover MQTT Fundamentals & Security in IoT in @MischaBachmann ’s blog post! Explore CVE-2023-28366, a memory leak in Eclipse Mosquitto. #MQTT #IoTSecurity #CVE2023 https://t.co/WVqcETMUkI
0
3
10
@compasssecurity
Compass Security
2 years
Security analyst @emanuelduss refreshed our hacking tools #cheatsheet for our security trainings, and it's now packed with info on Active Directory: https://t.co/wBTzt0KKaG 🔒 #security #pentest #tools
0
5
18
@compasssecurity
Compass Security
2 years
Discover how a strange workstation behavior exposed alarming vulnerabilities! We uncovered 2 privilege escalation bugs in Lenovo update functionality. Read the blog post for a fascinating journey down the rabbit hole. 🔐 #Cybersecurity #PrivilegeEscalation https://t.co/9dvAnbDYqY
0
6
12
@compasssecurity
Compass Security
2 years
Compass Security identified a #vulnerability in ThinkPad Hybrid USB-C with USB-A Dock Firmware Update Tool. https://t.co/BsjPaFzlhZ
compass-security.com
Compass Security identified a vulnerability in ThinkPad Hybrid with USB-A Dock Firmware Update Tool.
1
10
20
@compasssecurity
Compass Security
3 years
🔒Enhance #remotedesktop security with practical tips from Security Analyst Felix Aeppli. Learn about features like Remote Credential Guard and Restricted Admin Mode to protect against credentials theft and impersonation. https://t.co/83OqJfP3ef
0
7
10
@ly4k_
Oliver Lyak
3 years
Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential Guard. These techniques also work on victims logged on before the server was compromised. https://t.co/euNIyX2dwW
Tweet card summary image
research.ifcr.dk
In this blog post, we present new techniques for recovering the NTLM hash from an encrypted credential protected by Windows Defender…
34
683
2K
@_nwodtuhs
Charlie Bromberg « Shutdown »
3 years
Now adding external docs links to The Hacker Tools https://t.co/3fjsZpxQ4k Major tools that aren't documented will be on THT. Mimikatz is mostly over with. Impacket is now next in line. But docs that already exist will be linked. Feel free to contribute 🤗
3
17
52
@theluemmel
LuemmelSec
3 years
Are you also tired of "This setting is managed by your administrator or organization" messages, preventing you from altering settings, although you are admin? Fear no more, I got you covered - well at least partially: AV FW DeviceGuard Edge FF https://t.co/ZHf1QoMSfo
3
22
73
@hackvent
Santa Claus
3 years
HACKvent2022 awaits! At Dec. 1st 2022, 00:00 CET the first challenge will be released. Ready for sleep-deprivation? 😉 Enter the free competition here: https://t.co/WbrBNRxTZP Leaderboard: https://t.co/RBFOu0oAfH #HV22 #ctf
2
19
31
@compasssecurity
Compass Security
3 years
At @BlackAlpsConf, our analyst Sylvain Heiniger @sploutchy presented a new attack path to AD CS. Read his blog post for details and tools updates. #adcs #esc11 #ntlmrelay #rpc #msrpc https://t.co/UiRDilU9TS
5
78
145
@compasssecurity
Compass Security
3 years
Today, we share the analysis of a very rare piece of quantum military-grade #ransomware. All your data are belong to us !!! https://t.co/o7JU562jlc
0
7
11
@xdavidhu
David Schütz
3 years
I found a vulnerability that allowed me to unlock any @Google Pixel phone without knowing the passcode. This may be my most impactful bug so far. Google fixed the issue in the November 5, 2022 security patch. Update your devices! https://t.co/LUwSvEMF3w
Tweet card summary image
bugs.xdavidhu.me
83
1K
5K
@mpgn_x64
mpgn
3 years
Execute commands as another user w/t dumping LSASS or touching the ADCS server ? Thanks to @Defte_ a new module has been added to CrackMapExec 🚀 The module will impersonate any logged on user to exec command as "this" user (system, domain user etc) 🔥
21
227
720
@chaosupdates
CCC Updates
3 years
In der ARD am 13. Dezember (Nacht von Mo auf Di) um 0:20 Uhr: Dokumentarfilm „Alles ist Eins. Außer der 0.“, eine Geschichte digitaler Subversion über das Wirken von Wau Holland
Tweet card summary image
ardmediathek.de
Das Programm der ARD vom 16.12.2025 jetzt zum Streamen
3
64
159
Yeah nice, a Windows token impersonation module for CrackMapExec by @Defte_
@sensepost
Orange Cyberdefense's SensePost Team
3 years
Read @defte_'s Windows authentication token manipulation deep dive to compromise Active Directory in this new blog post. Includes a new tool and a CrackMapExec module using it as a, "token" of appreciation. https://t.co/ML8FHoIi5f
0
0
1
@mpgn_x64
mpgn
3 years
We worked together with @_zblurx to pull this new feature on CME ! CrackMapExec can now authenticate using kerberos with login/pass/nthash/aeskey without the need of a KRB5CCNAME ticket env 🚀 But wait there is more! by adding this feature we can now mimic kerbrute features 🔥🫡
7
132
434
@maximilianhils
Maximilian Hils
3 years
mitmproxy 9 is out! 🎉 https://t.co/GrxJLtQCxE Three highlights:
1
62
207
@pascal_gujer
Pascal Gujer 
3 years
Anyone knows how to obtain a #bitlocker recovery key with #dislocker? I can decrypt the drive with another protector. Windows somehow can do this. Looking for a way to "convert" respectively use a VMK or FVEK to obtain/decrypt the recovery key passphrase. RT is highly appreciated
3
2
1