ret2src Profile Banner
ret2src Profile
ret2src

@ret2src

Followers
352
Following
1K
Media
20
Statuses
687

Breaker of Stuff | Injector of 0x41 | Discoverer of Dumb Things | Creator of Glitches. Dropping shells since 0x7DC.

On your Domain Controller
Joined July 2021
Don't wanna be here? Send us removal request.
@ret2src
ret2src
6 days
Here we go again, more hardcoded Cisco creds.
@UjlakiMarci
Marci Ujlaki
7 days
lefover root credential 🫨. 🟥 CVE-2025-20309, CVSS: 10.0 (#Critical, #Highest). #Cisco Unified Communications Manager and Session Management Edition. #Vulnerability allows unauthenticated remote access via static root credentials. #CyberSecurity #CVE.
Tweet media one
0
1
0
@ret2src
ret2src
9 days
RT @vxunderground: There's a guy on Xitter who claims to be the highest IQ person in the world and he is, quite possibly, the best scammer….
0
122
0
@ret2src
ret2src
18 days
Had this exact same scenario a few weeks ago. root:calvin to DA.
@DirectoryRanger
DirectoryRanger
18 days
iDRAC to Domain Admin.
0
0
0
@ret2src
ret2src
19 days
RT @MarcOverIP: Go read this if you’re into EDR evasion. Its *really* cool research. Plus lots of details in the blog post 👌.
0
9
0
@ret2src
ret2src
21 days
RT @al3x_n3ff: Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable. This….
0
115
0
@ret2src
ret2src
25 days
RT @cyb3rops: lol
Tweet media one
0
34
0
@ret2src
ret2src
25 days
RT @techspence: Reddit never disappoints 😆
Tweet media one
0
10
0
@ret2src
ret2src
27 days
If, like me, you're wondering what this magical string "srv11UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbEAYBAAAA" does or means: It's seemingly additional information added to the SPN and interpreted by Microsoft's SMB client implementation (see
Tweet media one
0
1
2
@ret2src
ret2src
27 days
This is huge. compromise any machine with SMB signing not enforced 🔥.
@Synacktiv
Synacktiv
28 days
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d.
1
0
6
@ret2src
ret2src
1 month
RT @xvonfers: 0day "In the Wild". Spreadsheet:. It is still updated regularly. https://t.co….
0
16
0
@ret2src
ret2src
1 month
RT @sshell_: my man literally called his shot 3 months ago. you love to see it.
Tweet media one
0
54
0
@ret2src
ret2src
1 month
RT @RedTeamPT: Newer Windows clients often enforce signing ✍️ when using SMB fileshares. To quickly deploy an SMB server with signing suppo….
0
24
0
@ret2src
ret2src
1 month
RT @infosec_au: We scanned 18,206,880 (us-east-1 AWS) hosts from outside of us-east-1 AWS on port 443, using masscan. This returned 2,574,….
0
4
0
@ret2src
ret2src
1 month
RT @TJ_Null: Someone made a python version of Evilwinrm and it works well!. Although it is missing a few features like bypassing amsi I wou….
0
60
0
@ret2src
ret2src
1 month
RT @nyxgeek: Ever wonder if two companies are secretly working together? You might be able to find out!. Azure user enumeration includes gu….
0
58
0
@ret2src
ret2src
1 month
RT @0x_shaq: Code review is ready sir
Tweet media one
0
6
0
@ret2src
ret2src
1 month
RT @I_Am_Jakoby: well i have something unfortunate to share.last night they gave my bounty an important rating, but marked it out of scope….
0
37
0
@ret2src
ret2src
1 month
RT @techspence: VM escape.
0
5
0
@ret2src
ret2src
1 month
RT @sekurlsa_pw: Great post with 3 mitigations:. 1️⃣ Add-BadSuccessorOUDenyACEs.ps1.This script will set 3 deny ACE….
0
29
0
@ret2src
ret2src
1 month
RT @snovvcrash: Why're we still doing the Impacket thing when @skelsec's stuff is so sick?. (just kidding ofc, Impa….
0
55
0