Max Andreacchi's Avatar

Max Andreacchi

@atomicchonk.bsky.social

AdSim Consultant @ SpecterOps πŸ‘» Corgi dad 🐢 Cat servant 🐱 Tattoo collector πŸ–ΌοΈ Runner πŸƒπŸ»

219 Followers  |  358 Following  |  39 Posts  |  Joined: 03.11.2023  |  1.6711

Latest posts by atomicchonk.bsky.social on Bluesky


Preview
This One Weird Trick: Multi-Prompt LLM Jailbreaks (Safeguards Hate It!) - SpecterOps Using multiple prompts within the context of a conversation with an LLM can lead to safeguard bypasses. Learn about safeguards evaluations at scale.

Spoiler alert: Your AI safety measures might have a blind spot. πŸ‘€

When attackers use conversation context to bypass LLM safeguards, single-prompt evals just don't cut it anymore.

Dive into @atomicchonk.bsky.social's latest blog on multi-prompt attack detection. ghst.ly/47qJhzn

05.09.2025 16:30 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Potato exploits have been a cornerstone of local priv esc on Windows for years, but how & why do the inner starchy workings of the potatoes function?

Join @atomicchonk.bsky.social next week to understand Windows access tokens & their use in the Windows environment. ghst.ly/june-web-bsky

20.06.2025 16:55 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Sorry, Italian four cheese and cheddar jack supreme. My mind was still recovering from the abomination

05.06.2025 02:45 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Idk if it’s the Cheez It crust itself for me, or if it’s the fact that someone thought a Cheez It crust and an Italian Supreme flavor were a good mix

05.06.2025 02:45 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Tokenization Confusion - SpecterOps Meta's Prompt Guard 2 aims to prevent prompt injection. This post looks at how much knowledge of ML we need to be effective at testing these LLM WAFs.

New blog post is up! Stepping out of my comfort zone (be kind), looking at Meta's Prompt Guard 2 model, how to misclassify prompts using the Unigram tokenizer and hopefully demonstrate why we should invest time looking beyond the API at how LLMs function. specterops.io/blog/2025/06...

03.06.2025 16:57 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1

You’re a real one, thank you πŸ™πŸΌ

29.05.2025 22:30 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

It's potato harvest season! πŸ₯”

Join our upcoming webinar w/ @atomicchonk.bsky.social as he breaks down the starchy workings of potato exploits β€” from Windows access tokens to technical walkthroughs of Rotten, Juicy, and Rogue potatoes.

Register at ghst.ly/june-web-bsky

29.05.2025 21:20 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1

Just wrapped up a blog post on understanding BadSuccesor from a DACL abuse aspect and mitigating it from a DACL abuse perspective.

Also added some PowerShell on my GitHub to create and remove the mitigations.

27.05.2025 21:32 β€” πŸ‘ 14    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
Understanding & Mitigating BadSuccessor - SpecterOps Understanding the impact of the BadSuccessor AD attack primitive and mitigating the abuse via targeted Deny ACEs on Organizational Units.

BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escalate privileges and take over the forest.

Check out @jimsycurity.adminsdholder.com's latest blog post to understand how you can mitigate risk. ghst.ly/4kXTLd9

27.05.2025 21:11 β€” πŸ‘ 16    πŸ” 9    πŸ’¬ 0    πŸ“Œ 1

If you haven’t read the BadSuccessor blog post, woo boy: www.akamai.com/blog/securit...

24.05.2025 02:40 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Ok I’ve been enlightened further; they don’t collide if you tweak the command just slightly :pain:

22.05.2025 15:43 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
a rainbow and a star with the words " make you know " on it ALT: a rainbow and a star with the words " make you know " on it

I’m convinced most learning happens when you’re doing what I call β€œsmacking into something;” failing repeatedly, figuring out why it failed, and proceeding to the next step where you rinse and repeat until you achieve your ultimate objective. TIL: docker and podman dependencies collide.

22.05.2025 15:24 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Congratulations!

21.05.2025 23:02 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Black Hat USA 2025

Beyond hyped to be presenting with @anam0x.bsky.social and the rest of my team at Arsenal at BHUSA 2025! app.ingo.me/q/0x9xn

20.05.2025 16:14 β€” πŸ‘ 6    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Squeezing Cobalt Strike Threat Intelligence from Shodan One of my favorite Twitter accounts from the last several years was @cobaltstrikebot, mainly because it was an awesome source of threat intelligence for Cobalt Strike beacons in the wild. The account ...

Do you miss "@cobaltstrikebot"? If so, here's a blog post showing how you can pull Cobalt Strike SpawnTo and watermark info with @shodanhq.bsky.social and some PowerShell: forensicitguy.github.io/squeezing-co...

19.05.2025 01:38 β€” πŸ‘ 11    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Post image

It was an absolute pleasure to speak at @cackalackycon.bsky.social today and share my love of potatoes. Thank you to @specterops.io for fueling me to always go a layer deeper in learning and motivating me to chase my passions πŸ₯”

18.05.2025 17:10 β€” πŸ‘ 7    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0

What do potatoes have to do with privilege escalation on Windows? Come find out at Max Andreacchi’s session, β€œTater Tokens: Introduction to Windows Access Tokens and Their Role in PrivEsc” on May 18th!

17.05.2025 21:55 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Why do potato exploits work & how can we stop them?

Join @atomicchonk.bsky.social at @cackalackycon.bsky.social this weekend for a walkthrough of Windows access token manipulation and get the answer. ghst.ly/4jzjlnI

12.05.2025 21:28 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Immaculate Rick Roll placement

11.05.2025 23:10 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Great work getting it done!

06.05.2025 21:13 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Always enjoy the views in Seattle! Spent excellent quality time with teammates and received amazing training. Now for a weekend of running and resting back home before new travels next week ✈️

02.05.2025 23:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Don't let threat actors mash your Windows security! @atomicchonk.bsky.social’s @cackalackycon.bsky.social talk breaks down potato exploits from token mechanics to defensive implementations.

Learn more ➑️ ghst.ly/4jzjlnI

28.04.2025 16:00 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Fulltime Win Graphic: NC Courage 3-2 KC Current.

Fulltime Win Graphic: NC Courage 3-2 KC Current.

NC BABYYY πŸ’™

27.04.2025 01:07 β€” πŸ‘ 68    πŸ” 16    πŸ’¬ 1    πŸ“Œ 10
Post image

I’ve had to beat stubbornness out of my training. When I ran 10+ yrs ago I’d just hard-head my way forward but wind up injured. This time I’m focused on the goals ahead; nagging aches mean a rest day tomorrow so I can live to run later this week and keep this train moving to Oct (and beyond)

24.04.2025 05:22 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Understanding Windows access tokens could be your best defense. At @cackalackycon.bsky.social, @atomicchonk.bsky.social will be peeling back the layers on potato exploits that threat actors use for privilege escalation.

Check out the schedule to learn more ➑️ ghst.ly/4jzjlnI

18.04.2025 16:33 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

Just pushed a new versions for #AADInternals and AADInternals-Endpoint modules! Some bug fixes plus support for:
1️⃣ Microsoft Authentication Library (MSAL)
2️⃣ Token Protection
3️⃣ Continuous Access Evaluation (CAE)

18.04.2025 12:10 β€” πŸ‘ 16    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0
Preview
DPRK IT Workers in Open Source and Freelance Platforms A cluster of actors discovered in onlyDust.com freelancer platform and beyond

The Ketman Project has published a list of names and GitHub profiles they believe may be North Korean rogue IT workers posing as open-source developers and freelancers, and seeking employment at Western software companies

www.ketman.org/dprk-it-work...

17.04.2025 13:27 β€” πŸ‘ 8    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Initial stab at using Chris Hayuk's mcp-cli tool to pair roadrecon_mcp_server with a locally-hosted model (in this case, mistral-small3.1). Note that running this query took over 300s so YMMV depending on several factors. Will update GH this week with instructions on replicating this.

16.04.2025 01:53 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@atomicchonk is following 20 prominent accounts