There are various tools that allow you to automatically test different login processes, user agents, and resources. I briefly tried NoPrompt over the weekend, and it was super easy to use. [1]
20.10.2025 06:18 — 👍 1 🔁 0 💬 1 📌 0
For example, certain resources were excluded, allowing attackers to access data despite the policy. In other cases, specific user agents were excluded. The list is relatively long.
20.10.2025 06:18 — 👍 0 🔁 0 💬 1 📌 0
In various business email compromise (BEC) cases, we later discovered that although the customer had set up a conditional access (CA) policy to enforce multi-factor authentication, mistakes had been made during the implementation of said policies.
20.10.2025 06:18 — 👍 1 🔁 0 💬 1 📌 1
Linux Capabilities Revisited | dfir.ch
Technical blog by Stephan Berger (@malmoeb)
I wrote about Linux Capabilities and how to find them on my blog if you want to learn more. [1]
[1] dfir.ch/posts/linux_...
19.10.2025 07:29 — 👍 2 🔁 0 💬 0 📌 0
An attacker can now effectively spawn a root shell over the Python binary. The thing about this technique is that they haven't set a suid bit on a binary, or changed the Python binary. By setting the capabilities, attackers can build powerful backdoors.
19.10.2025 07:29 — 👍 1 🔁 0 💬 1 📌 0
One way they could regain root access on Linux servers was by adding capabilities to the Python binary, for example:
setcap cap_setuid+ep /usr/bin/python3.12
19.10.2025 07:29 — 👍 1 🔁 0 💬 1 📌 0
We recently took over an APT investigation from another forensic company. While reviewing analysis reports from the other company, we discovered that the attackers had been active in the network for months and had deployed multiple backdoors.
19.10.2025 07:29 — 👍 4 🔁 1 💬 1 📌 1
[1] specterops.io/wp-content/u...
[2] www.vilkascyber.com/blog/adcs-es...
[3] dfir.ch/posts/tear_d...
18.10.2025 06:46 — 👍 0 🔁 0 💬 0 📌 0
There may be dependencies and technical debt for which there is no quick solution. Nevertheless, I strongly recommend addressing these vulnerabilities. Otherwise, an attacker within the internal network could potentially take over the entire domain within minutes.
18.10.2025 06:46 — 👍 0 🔁 0 💬 1 📌 0
Exactly. And believe me, we saw that in our Incident Response cases as well, that threat actors requested a new certificate, and jumped right from zero to domain admin. I wrote about ACDS before, with more tips and tricks for securing your Active Directory environment. [3]
18.10.2025 06:46 — 👍 0 🔁 0 💬 1 📌 0
ESC1 is a misconfiguration that allows a regular domain user to request a certificate for a Domain Admin and use it to take control of the entire domain.
ESC1 offers a basic and stealthy method for escalating from a compromised user account to a domain compromise." [2]
18.10.2025 06:46 — 👍 0 🔁 0 💬 1 📌 0
One of the most common and impactful of these is ESC1, short for "Domain Escalation Scenario 1," first outlined in the Certified Pre-Owned whitepaper by Will Schroeder and Lee Christensen. [1]
18.10.2025 06:46 — 👍 0 🔁 0 💬 1 📌 0
But when misconfigured, AD CS can introduce some of the most dangerous privilege escalation paths in Active Directory.
18.10.2025 06:46 — 👍 0 🔁 0 💬 1 📌 0
"Active Directory Certificate Services (AD CS) is the backbone of certificate issuance in Windows environments. When properly configured, it helps enforce secure authentication and encryption.
18.10.2025 06:46 — 👍 0 🔁 0 💬 1 📌 0
Second story from a recent coffee break with my pentest colleague. During a retest for a client, they discovered the same ESC1 vulnerability they had reported before. Why is that dangerous and also super critical?
18.10.2025 06:46 — 👍 1 🔁 1 💬 1 📌 0
GitHub - sensepost/gowitness: 🔍 gowitness - a golang, web screenshot utility using Chrome Headless
🔍 gowitness - a golang, web screenshot utility using Chrome Headless - sensepost/gowitness
4/ Attack Surface Reduction –> removing low-hanging fruit, especially when you run the tool from an office network, and you see various admin panels popping up in the results.
[1] github.com/sensepost/go...
17.10.2025 06:44 — 👍 2 🔁 0 💬 0 📌 0
3/ In a previous job, I used to run the predecessor tool EyeWitness from time to time for exactly the reason outlined above. I would recommend that anyone who secures networks take the time to run the tool and go through the output.
17.10.2025 06:44 — 👍 0 🔁 0 💬 1 📌 0
2/ In doing so, we found a web interface where any user on the internal network could issue certificates, even for domain admins! So we simply issued a new certificate for the DA and were able to authenticate ourselves."
17.10.2025 06:44 — 👍 0 🔁 0 💬 1 📌 0
1/ Coffee break with one of our pentesters. He casually mentioned to me, "The last attack simulation was pretty cool. We used gowitness (a website screenshot utility written in Golang, to generate screenshots of web interfaces) to find internal services [1].
17.10.2025 06:44 — 👍 5 🔁 1 💬 1 📌 0
Sysmon's RegistryEvent (Value Set) - SANS Internet Storm Center
Sysmon's RegistryEvent (Value Set), Author: Didier Stevens
3/
You can still monitor for modifications to these keys, but you must rely on other mechanisms to check the values of the modified keys.
[1] isc.sans.edu/diary/28558
16.10.2025 08:52 — 👍 0 🔁 0 💬 0 📌 0
2/
However, the values of these keys are "Binary Data", as explained by Didier Stevens [1].
If you are building your detection logic with Sysmon and a SIEM, beware of such "blind spots".
16.10.2025 08:52 — 👍 0 🔁 0 💬 1 📌 0
1/ During a recent engagement, the customer provided us with access to their extensive data collection in Splunk. One thing I checked was Sysmon’s Event ID 13 (Registry - Value Set) for modifications to various keys used for credential stealing (NetworkProvider, Notification- &, Security Packages).
16.10.2025 08:52 — 👍 0 🔁 0 💬 1 📌 0
3/
For example, see this Splunk query here [1], or the KQL query here [2]
[1] research.splunk.com/endpoint/fd4...
[2] gist.github.com/secgroundzer...
28.09.2025 07:47 — 👍 1 🔁 1 💬 0 📌 0
2/
Yes, you could change it, but if not, we have a cool angle for hunting, as our internal Threat Hunter, Rene Kretzinger, showed me a few days ago.
As visible in the screenshot, it should be clear that something is amiss (minesweeper.exe - Sysinternals).
28.09.2025 07:47 — 👍 1 🔁 0 💬 1 📌 0
1/
Love that Minesweeper reference here :) They tried hard to blend in; however, certain metadata about a file is baked into the PE header. Attackers can rename binaries all they want, but fields like original_file_name or inconsistencies in headers often give them away.
28.09.2025 07:47 — 👍 3 🔁 0 💬 1 📌 0
5/
The incoming emails will get flagged as spam and moved to the Junk email folder.
This is a sneaky way to circumvent monitoring of audit logs, which look for specific keywords, such as "New-InboxRule". You can read more about it here [2]
[1] x.com/malmoeb/stat...
[2] x.com/malmoeb/stat...
27.09.2025 07:42 — 👍 0 🔁 0 💬 0 📌 0
4/
By the way, while typing this short article, I searched a bit around and stumbled upon another tweet from me,where the TA,instead of creating a new Inbox Rule, added email addresses of interest to the list of blocked senders and domains (again via the Set-MailboxJunkEmailConfiguration operation).
27.09.2025 07:42 — 👍 0 🔁 0 💬 1 📌 0
3/
So, to make extra sure such (important messages, to the attacker) are reaching the inbox.
I do not frequently see this operation in BEC cases. This might be a good operation for alerting, or at least for a hunting session from time to time.
27.09.2025 07:42 — 👍 0 🔁 0 💬 1 📌 0
2/
Additionally, the attacker used the Set-MailboxJunkEmailConfiguration operation to add the target email addresses to this list, as messages from these senders that reach the mailbox are never delivered to the Junk Email folder (via the TrustedSendersAndDomains).
27.09.2025 07:42 — 👍 0 🔁 0 💬 1 📌 0
Senior Threat Analyst @Google Cloud
Co-Organizer Boston’s #DC617 hacker group 🏳️🌈
@sarlacklab.bsky.social Lead Developer
OT Security @<bio-manufacturer>
Protecting people in the nerdiest of ways 🛡🧙♂️
🩷💜💙 he/him
views!=employerViews
CTI Analyst | Threat Hunter
based in europe
Opinions are my own
Mastodon: https://infosec.exchange/@intuentis0x0
Reddit: https://www.reddit.com/user/intuentis0x0/
Medium: https://medium.com/@intuentis0x0
X: https://x.com/intuentis0x0
Dir. of Marketing, Carlton PR and Marketing, Innovation Women; Director of Partnerships Raíces Cyber, WiCyS People w/ Disabilities & Caregivers Affiliate. MS in Digital Marketing. Creator of career fairs, mother of cats. #midwestwifey #booknerd #wonk
Writer, editor, cybersecurity nerd, #author of Self-Care for Cats, #gamer, #disability activist, wheelchair user, recovering journalist, passionate reader of #sff living in Maine.
Higher Ed IT guy; @Reddit Lurker ; former 13P ; cd73502828457d15655bbd7a63fb0bc8; They called me the switch switcher.
USAF vet, imposter syndrome fighter, Digital Forensicator, and perpetual learner
Threat Intelligence Analyst
Principal R&D Engineer. Mexican and transgender. 🏳️⚧️🇲🇽From Chicago and learning ASL 🤟🔇 Ex paratrooper from the Cold War. Writing mostly in C++ 👩🏽💻, Python 🐍, Java ☕️, some Rust 🦀.
I love art and history‼️
InfoSec Professional, who's most happy spending time with family, skiing and hiking. I'm thankful for my god given talents, and my wife and daughters who can put up with them. #VFL