New Protocol Vulnerabilities: CVE-2024-7595/7596 & CVE-2025-23018/23019
Over 4.2 million VPN servers, private home routers and other network hosts are vulnerable to hijacking due using tunneling protocols without security.
For more info and a demol video, see the article by @simonmigliano.bsky.social at top10vpn.com/research/tun...
IT admins can request access to our code to test servers (code is not yet public to prevent abuse): github.com/vanhoefm/tun...
Academic paper: papers.mathyvanhoef.com/usenix2025-t...
14.01.2025 14:12 β π 10 π 6 π¬ 1 π 2
Tales from the Scottish-Sounding Anti Virus Company No. 1: In The Beginning
Sure!
Here's the story of my first day on the job: www.reddit.com/r/talesfromt...
And something from my 20th anniversary in the industry: www.welivesecurity.com/2010/07/16/a...
Hope you find them interesting reading. :)
06.12.2024 02:51 β π 2 π 1 π¬ 0 π 0
Would love to read something about the AV industry in its early phase.
Can you share some stories / anecdotes from the βgood olβ daysβ? Or maybe just a βday in the lifeβ, description of what work you did and describing the company, cultures, characters and the viruses itself.
05.12.2024 21:36 β π 1 π 0 π¬ 1 π 0
Excited to share a tool I've been working on - ShadowHound.
ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them.
blog.fndsec.net/2024/11/25/s...
25.11.2024 12:25 β π 32 π 10 π¬ 0 π 1
Shows the contents of 123.rule, that adds the number 1, 2 and 3 after a word and abc.rule, that adds a, b and c after a word.
The third command shows hashcat being used with 123.rule and abc.rule used with the word hashcat as wordlist. The output generates hashcat1a, hashcat2a etc until hashcat3c as final output on the last line.
Trouble cracking password hashes? Remember that #hashcat can stack (combine) rules. Just use:
βͺοΈ-r 1.rule -r 2.rule
You can even add more rules, but it will quickly use a lot of memory. Save the rules that cracked a hash with:
βͺοΈ--debug-mode=1 --debug-file=found.rule
21.11.2024 11:19 β π 1 π 0 π¬ 0 π 0
I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission.
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.
30.03.2024 17:13 β π 688 π 276 π¬ 7 π 15
Handshakes overview of the tool.
AngryOxide
802.11 Attack tool built in Rust π¦
github.com/Ragnt/AngryO...
The documentation is pretty nice, also has recommendations for WiFi hardware.
github.com/Ragnt/AngryO...
11.02.2024 20:17 β π 1 π 0 π¬ 0 π 0
37C3: Unlocked
- media.ccc.de
Video Streaming Portal des Chaos Computer Clubs
#CCC #37c3 Chaos Communication Congress
Streaming media
streaming.media.ccc.de/37c3/
Videos archived
media.ccc.de/c/37c3
Schedule
fahrplan.events.ccc.de/congress/202...
27.12.2023 23:11 β π 4 π 1 π¬ 0 π 0
For the losers like me who donβt know Freedom π¦
Units that are universally used in πΊπΈπ²π²π±π·; 48F is ~8,9 Β°C.
26.12.2023 19:15 β π 1 π 0 π¬ 0 π 0
Editor and CEO, Zeteo
Author, βWin Every Argumentβ
British-American
Hacker. Friend. Cybersecurity Researcher at Huntress.
Tech enthusiasts, offensive cybersecurity professional, AI student
CEO @specterops.bsky.social
Infosec, Detection Engineering, Threat Research, Threat Hunting, OffSec, Conference Organizer.
Adversary Simulation @specterops.io
Open source privacy and security focused mobile OS with Android app compatibility.
https://grapheneos.org/
In het Nederlands, en alleen als het voor niet-nederlandstaligen waarschijnlijk niet zo boeiend is. Ik dupliceer niks, dus volg vooral ook mijn hoofdaccount: @rop.gonggri.jp
I am the host of Behind the Bastards and overlord of podcasts at Cool Zone Media
Account for RedTeam Pentesting GmbH
Imprint: https://redteam-pentesting.de/imprint/
@almondoffsec but #pywerview at night
Former Pentester
Engineer at SpecterOps
Author of BloodHound
Red teamer @ Mandiant
https://dumpco.re
Does stuff at @specterops
Cloud security research
Adversary Simulation Operator, Researcher, Teacher, and Leader @SpecterOps
Adversary Simulation Consultant @SpecterOps
https://github.com/werdhaihai
Purple PowerShell & Hazy Windows.
Ghost Dog Whisperer.
BloodHound Operator.