framapiaf.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Un service Mastodon fourni par l'association d’éducation populaire Framasoft.

Administré par :

Statistiques du serveur :

1,4K
comptes actifs

#redteam

10 messages9 participants0 message aujourd’hui
Tim (Wadhwa-)Brown :donor:<p>We shall call our host something.on.someoneelses.tld. What could go wrong?</p><p><a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>Hmmm, a service running as DA calling c:\nosuchfile.exe to start where Users has create rights...</p><p>What could go wrong? Genuinely wondered if the box had already been popped...</p><p><a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a></p>
Redhotcyber<p>🔥 CORSO ETHICAL HACKER EXTREME EDITION: IL PERCORSO DEFINITIVO PER L’HACKING ETICO! 🔥</p><p>✅ Pacchetto ELITE CLUB incluso:<br>🔹 5 anni di accesso a 50+ scenari di hacking<br>🔹 Lezioni avanzate su tecniche e strategie d’attacco<br>🔹 Piano quinquennale per il mantenimento della certificazione professionale</p><p>📅 PARTECIPA GRATUITAMENTE AL WEBINAR L'8 APRILE 2025 ORE 18:00<br>⚠️ Posti limitati – e come sempre, garanzia soddisfatti o rimborsati!<br>👉LINK REGISTRAZIONE : <a href="https://cybersecurityup.webinargeek.com/presentazione-del-corso-ethical-hacker-extreme-edition-aprile-2025?cst=rhc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecurityup.webinargeek.co</span><span class="invisible">m/presentazione-del-corso-ethical-hacker-extreme-edition-aprile-2025?cst=rhc</span></a> </p><p>📞 3755931011 ✉️ e.picconi@fatainformatica.it</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/rhc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rhc</span></a> <a href="https://mastodon.bida.im/tags/webinar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webinar</span></a> <a href="https://mastodon.bida.im/tags/EthicalHackerExtremeEdition" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHackerExtremeEdition</span></a> <a href="https://mastodon.bida.im/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/formazioneprofessionale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formazioneprofessionale</span></a> <a href="https://mastodon.bida.im/tags/infocert" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infocert</span></a> <a href="https://mastodon.bida.im/tags/sicurezzainformatica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicurezzainformatica</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacker</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cyberrange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberrange</span></a> <a href="https://mastodon.bida.im/tags/hackmeup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackmeup</span></a> <a href="https://mastodon.bida.im/tags/hackthebox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackthebox</span></a> <a href="https://mastodon.bida.im/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.bida.im/tags/capturetheflag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>capturetheflag</span></a> <a href="https://mastodon.bida.im/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.bida.im/tags/officer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>officer</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Mimikatz is a well-known open-source tool for extracting credentials from Windows systems. It can retrieve plaintext passwords, hash credentials, and even Kerberos tickets from memory. Used by both researchers and attackers, it highlights the importance of secure credential management in Active Directory environments. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/gentilkiwi/mimikatz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/gentilkiwi/mimikatz</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Erik Jonker<p>DOGE destroying cybersecurity in the USA. This also has impact on all those digital services from the US we rely on <br><a href="https://www.theregister.com/2025/03/12/cisa_staff_layoffs/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/12/cis</span><span class="invisible">a_staff_layoffs/</span></a><br><a href="https://mastodon.social/tags/doge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>doge</span></a> <a href="https://mastodon.social/tags/musk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>musk</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.social/tags/cisa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisa</span></a></p>
0ddj0bb<p>Hey <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> and <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> ers, what security controlsnon endpoints and servers make your life miserable on an engagement? </p><p>App allow listing? <br>DEP?<br>Powershell execution policies?<br>Hostbased firewall?</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a></p>
r1cksec<p>A Windows standalone executable tool that allows you to change the password of user/computer accounts in Active Directory (AD) via MS-SAMR protocol🕵️‍♂️ </p><p><a href="https://github.com/decoder-it/ChgPass" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/decoder-it/ChgPass</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Bettercap is a powerful, modular tool for network attacks and monitoring. It supports ARP spoofing, DNS spoofing, packet sniffing, and more. Written in Go, it's flexible and efficient for intercepting and manipulating network traffic on various protocols. <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> 👉 <a href="https://github.com/bettercap/bettercap" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/bettercap/bettercap</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Tim (Wadhwa-)Brown :donor:<p>Side thought: What if you injected a non-existent domain user into the various Linux AD integration's caches? In at least one case, the cache is a SQLite database. Also, would the same be possible on Windows. Interesting persistence approach if it worked.</p><p><a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a>, <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
r1cksec<p>An article about the security implications of abandoned third-party JavaScript libraries🕵️‍♂️ </p><p><a href="https://blog.fraktal.fi/examining-external-dependencies-in-web-applications-0846894cecdd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.fraktal.fi/examining-exte</span><span class="invisible">rnal-dependencies-in-web-applications-0846894cecdd</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://infosec.exchange/tags/javascript" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>javascript</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a></p>
r1cksec<p>Chrome browser extension-based Command &amp; Control🕵️‍♂️ </p><p><a href="https://github.com/Darkrain2009/RedExt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Darkrain2009/RedExt</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>For EU folks, <span class="h-card" translate="no"><a href="https://infosec.exchange/@mitreattack" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mitreattack</span></a></span> community is coming around again in May. Register here: <a href="https://attack-community.org/event/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">attack-community.org/event/</span><span class="invisible"></span></a>.</p><p>Also. v17 release is slated for 22nd April.</p><p><a href="https://infosec.exchange/tags/atr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>atr</span></a>&amp;ck, <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a>, <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a></p>
Matthias Schulze<p>Ich merke immer wieder, wie schwer es Normalsterblichen fällt, Cyber-Angriffe zu verstehen. Arbeitet jemand als red teamer und hat mal Lust, eine Podcast-Folge mit mir zu machen, um mal Schritt für Schritt zu erklären, wie man dabei vorgeht, wie Cyber-Operationen ablaufen. Also z.B. entlang MITRE ATT&amp;CK oder Killchain? <a href="https://ioc.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://ioc.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a></p>
Max Maass :donor:<p>Last week, I finally finished my writeup of a vulnerability based on a misuse of <a href="https://infosec.exchange/tags/Cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cryptography</span></a> that we found a while back in a penetration test. It's my favorite vulnerability so far, as it relies on abusing basic properties of unauthenticated encryption and shows, in a real-world scenario, how such seemingly theoretical issues can compromise an entire system. In the end, it's a teachable moment about both cryptography and secure software architecture.</p><p>I had the draft lying around for more than a year, but reading the articles by <span class="h-card" translate="no"><a href="https://furry.engineer/@soatok" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>soatok</span></a></span> finally reminded me that I should really wrap this up and post it. So, here it is: <a href="https://blog.maass.xyz/encryption-isnt-enough-compromising-a-payment-processor-using-math" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.maass.xyz/encryption-isnt</span><span class="invisible">-enough-compromising-a-payment-processor-using-math</span></a></p><p><a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/SoftwareArchitecture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareArchitecture</span></a></p>
Redhotcyber<p>🔥 Preiscrizioni CORSO ETHICAL HACKER E PENETRATION TESTER! </p><p>🌟 Certificazioni riconosciute a livello internazionale in conformità alle normative italiane<br>🎁 Accesso 12 mesi alla piattaforma HackMeUp<br>💰 Prezzo scontato per preiscrizioni entro venerdì 7 marzo<br>⏳ 34 settimane di formazione intensiva + 5 anni di accesso alla piattaforma di hacking HackMeUp + Accesso per 5 anni all'Elite Club con corsi Python, Malware Analysis e Reverse Engineering<br>💳 Possibilità di rateizzare in 12 rate</p><p>📅 Inizio corso 16 aprile 2025</p><p>📲 Blocca l'iscrizione e diventa parte della community RHC: <a href="https://www.cybersecurityup.it/ethical-hacker-path" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cybersecurityup.it/ethical-hac</span><span class="invisible">ker-path</span></a><br>📞 3755931011 | ✉️ e.picconi@fatainformatica.it</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/rhc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rhc</span></a> <a href="https://mastodon.bida.im/tags/webinar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webinar</span></a> <a href="https://mastodon.bida.im/tags/EthicalHackerExtremeEdition" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHackerExtremeEdition</span></a> <a href="https://mastodon.bida.im/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/formazioneprofessionale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formazioneprofessionale</span></a> <a href="https://mastodon.bida.im/tags/infocert" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infocert</span></a> <a href="https://mastodon.bida.im/tags/sicurezzainformatica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sicurezzainformatica</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacker</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cyberrange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberrange</span></a> <a href="https://mastodon.bida.im/tags/hackmeup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackmeup</span></a> <a href="https://mastodon.bida.im/tags/hackthebox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackthebox</span></a> <a href="https://mastodon.bida.im/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a></p>
r1cksec<p>Exploitation of the container runtime socket to move laterally or to escalate privileges🕵️‍♂️ </p><p><a href="https://thegreycorner.com/2025/02/12/containerd-socket-exploitation-part-1.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thegreycorner.com/2025/02/12/c</span><span class="invisible">ontainerd-socket-exploitation-part-1.html</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a></p>
r1cksec<p>Tool for viewing NTDS.dit</p><p><a href="https://github.com/trustedsec/DitExplorer" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/trustedsec/DitExplo</span><span class="invisible">rer</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/activedirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activedirectory</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a></p>
r1cksec<p>SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts🕵️‍♂️ </p><p><a href="https://github.com/logangoins/SoaPy" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/logangoins/SoaPy</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/activedirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>activedirectory</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
Alexandre Borges<p>The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1, 2 and 3:</p><p><a href="https://neodyme.io/en/blog/com_hijacking_1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neodyme.io/en/blog/com_hijacki</span><span class="invisible">ng_1/</span></a><br><a href="https://neodyme.io/en/blog/com_hijacking_2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neodyme.io/en/blog/com_hijacki</span><span class="invisible">ng_2/</span></a><br><a href="https://neodyme.io/en/blog/com_hijacking_3/#vulnerability-1-leveraging-file-deletion-for-lpe" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neodyme.io/en/blog/com_hijacki</span><span class="invisible">ng_3/#vulnerability-1-leveraging-file-deletion-for-lpe</span></a></p><p><a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://infosec.exchange/tags/com" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>com</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Alexandre Borges<p>The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1, 2 and 3:</p><p><a href="https://neodyme.io/en/blog/com_hijacking_1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neodyme.io/en/blog/com_hijacki</span><span class="invisible">ng_1/</span></a><br><a href="https://neodyme.io/en/blog/com_hijacking_2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neodyme.io/en/blog/com_hijacki</span><span class="invisible">ng_2/</span></a><br><a href="https://neodyme.io/en/blog/com_hijacking_3/#vulnerability-1-leveraging-file-deletion-for-lpe" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">neodyme.io/en/blog/com_hijacki</span><span class="invisible">ng_3/#vulnerability-1-leveraging-file-deletion-for-lpe</span></a></p><p><a href="https://mastodon.social/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://mastodon.social/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/edr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>edr</span></a> <a href="https://mastodon.social/tags/com" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>com</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>