Clément Labro Profile
Clément Labro

@itm4n

Followers
7K
Following
1K
Media
29
Statuses
346

Pentest & Windows security research (I stopped using this account in December 2022) ➡ Mastodon: @[email protected]

Joined November 2017
Don't wanna be here? Send us removal request.
@itm4n
Clément Labro
3 years
I didn't want to rush it. Though, I finally took the decision to leave Twitter. 😢 See you on the other side. 👋 @itm4n@infosec.exchange https://t.co/eiUDbrP2Iz
Tweet card summary image
infosec.exchange
124 Posts, 148 Following, 919 Followers · Pentest & Windows security research
4
2
13
@_dirkjan
Dirk-jan
3 years
The python BloodHound ingestor was updated to support GPO/OU/container collection. Thanks to @_zblurx for the PR. The python version is now functionally equivalent to the official C# version for DCOnly collection. Also thanks to @itm4n who added registry based session enum 🔥
9
57
245
@K3vinLuSec
KevinLu
3 years
Here is my new blog "Technical Analysis of Windows CLFS Zero-Day Vulnerability CVE-2022-37969 - Part 1: Root Cause Analysis", Part 2 will be released soon. Stay tuned!
@Threatlabz
Zscaler ThreatLabz
3 years
The ThreatLabz research team has analyzed the Windows CLFS Zero-Day vulnerability: https://t.co/1SfCHDkCYp
Tweet media one
Tweet media two
Tweet media three
Tweet media four
2
47
92
@1ns0mn1h4ck
Insomni'hack
3 years
Save the Date ! Insomni'hack 2023 will be on March 20th - 25th 2023 and we will be at a brand new venue in Lausanne ! More details: https://t.co/3Pyvk4IID5 #INSO23 #CTF #STCC Photo: STCC
Tweet media one
0
43
77
@_EthicalChaos_
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿
3 years
For the beady eyed, even on patched machines this should open up a new lateral movement technique too.
4
51
125
@itm4n
Clément Labro
3 years
Some news about PrivescCheck! 📰 If you are a Metasploit user, please note that I finally solved a (stupid) issue that prevented the script from working properly with "powershell_execute". 🥳 More info on GitHub. 👉 https://t.co/OZfgHlAq8S 👉
Tweet card summary image
github.com
Hi, thanks for your effort in developing this enumeration script. It's a really nice project and it is really useful for engagements to quickly find privesc vulns, however, sadly this is only f...
4
9
36
@ly4k_
Oliver Lyak
3 years
Certipy reached 1k stars on GitHub. Let’s celebrate with a brand new version, new research, a forked BloodHound GUI with ADCS support, and many new features, for instance Schannel authentication via LDAPS, SSPI authentication, and much more! https://t.co/h85p3cCO1N
Tweet card summary image
research.ifcr.dk
A new version of Certipy has been released along with a forked BloodHound GUI that has PKI support! In this blog post, we will look at…
18
159
435
@itm4n
Clément Labro
3 years
The July 2022 update of Windows 10/11 killed PPLdump 💀😢 Find out how in this blog post... 👉 https://t.co/o0izvkkSm0
Tweet media one
13
261
664
@preemptdev
pre.empt
3 years
🧵In part 5 of the blog series we're looking at implementing and bypassing common EDR functionality. As a part of this we look at Kernel Callbacks, Hooks, and Thread Call Stacks: https://t.co/l5C7jnBYTw 1/3
7
148
361
@itm4n
Clément Labro
3 years
I revisited the Credential Guard bypass originally discussed by @N4k3dTurtl3. Have a nice reading! 🙂 👉 https://t.co/tlXLLlsW5M TL;DR It is possible to get rid of hardcoded offsets...
Tweet media one
8
131
291
@zyn3rgy
Nick Powers
4 years
You like NTLM relays to LDAP? Same. There's a unique error that will identify whether LDAP EPA (channel binding) is enforced, and it can be determined from an unauthenticated perspective. Here's a PoC to check for both channel binding and server signing: https://t.co/s7qGACH4DY
Tweet card summary image
github.com
Check for LDAP protections regarding the relay of NTLM authentication - zyn3rgy/LdapRelayScan
10
129
335
@itm4n
Clément Labro
4 years
There is now a check for this in PrivescCheck (available through the "-Extended" mode). Thanks @splinter_code ! 🙏
@splinter_code
Antonio Cocomazzi
4 years
Windows Defender AV allows Everyone to read the configured exclusions on the system 🤦 reg query "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions" /s
Tweet media one
Tweet media two
1
30
94
@splinter_code
Antonio Cocomazzi
4 years
My last blog post for 2021 is out! 🔥 The hidden side of Seclogon part 2: Abusing leaked handles to dump LSASS memory Enjoy the read :D https://t.co/Vsgy3GHLPy
Tweet card summary image
splintercod3.blogspot.com
  by splinter_code - 7 December 2021   Credential dumping is one of the most common techniques leveraged by attackers to compromise an infr...
14
239
506
@ly4k_
Oliver Lyak
4 years
Exploit for CVE-2021-40449 released S/O to @RedDrip7 who created an exploit based on my original PoC, and then I made an exploit based on their exploit, which is based on my PoC. Funny. Features a neat technique from RedDrip that I hadn't seen before https://t.co/teaKElpIWZ
Tweet card summary image
github.com
Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE) - ly4k/CallbackHell
2
108
256
@itm4n
Clément Labro
4 years
Some of you asked for a part 2, so here you go! 🔥 From RpcView to #PetitPotam 🔥 👉 https://t.co/4DBBIExqGW In this post I explain how you can reproduce the #PetitPotam trick using RpcView, but the same principle can be applied to any Windows RPC interface. 🙂
itm4n.github.io
In the previous post we saw how to set up a Windows 10 machine in order to manually analyze Windows RPC with RpcView. In this post, we will see how the information provided by this tool can be used...
6
143
305
@itm4n
Clément Labro
4 years
Thanks to @SAERXCIT, #PrivescCheck now enumerates volume shadow copies and checks whether SAM/SYSTEM/SECURITY files are readable as a low-priv user. #HiveNightmare #SeriousSAM 👉 https://t.co/GS4Clqyomf
Tweet media one
0
41
118
@0xdeaddood
leandro
4 years
NTLM relay over and over again! Great blog post by @sploutchy explaining a new NTLM relay attack vector over RPC using MS-DCOM... and #impacket 😀 https://t.co/BcoNzkb1Hp
1
91
199
@splinter_code
Antonio Cocomazzi
4 years
#RemotePotato0 new release! Now you can also grab and steal the NTLMv2 hashes of every user logged on a machine from an unprivileged user! ✅ works fully local - no network interaction (except win 2019) ✅ ntlm related ✅ won't fix Windows in 2k21 cc @decoder_it
10
250
529