Jonas Vestberg's Avatar

Jonas Vestberg

@bugch3ck.bsky.social

Privilege Escalation Engineer Principal Consultant @ Reversec (formerly WithSecure Consulting)

165 Followers  |  187 Following  |  19 Posts  |  Joined: 09.09.2023  |  1.8582

Latest posts by bugch3ck.bsky.social on Bluesky

Post image

The World need more @rageagainst.bsky.social

27.05.2025 06:34 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

They didn't even try this time...

New report for LPE incoming.

30.04.2025 12:49 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Security Bulletin: Vulnerability found in Personal Communications through deployment of arbitrary MSI package. There is a vulnerability in found in Personal Communications through deployment of arbitrary MSI package. Personal Communications has addressed the applicable CVE-2025-1095.

This time they fixed it properly. No more vulns in that service. I'm sure of it ๐Ÿ™„

www.ibm.com/support/page...

10.04.2025 14:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
GitHub - jfjallid/go-rpcclient: Interact with Windows RPC Services over SMB using go-smb Interact with Windows RPC Services over SMB using go-smb - jfjallid/go-rpcclient

New tool drop from jfjallid (not on this platform)

github.com/jfjallid/go-...

06.04.2025 11:05 โ€” ๐Ÿ‘ 5    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Wow I didn't expect that ๐Ÿคฏ Great blog post.

06.03.2025 22:05 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Using RDP without leaving traces: the MSTSC public mode Learn how MSTSCโ€™s /public mode works! It blocks credential caching, session details, and bitmap storage, enhancing security. Discover its impact and how to reset MSTSC for a clean slate.

Need to use RDP without leaving traces? Learn how to enable MSTSC public mode for more privacy and security in your remote sessions. Perfect for shared environments and enhanced confidentiality! ๐Ÿ”๐Ÿ’ป

๐Ÿ‘‰ Read my latest blog post: blog.devolutions.net/2025/03/usin...

06.03.2025 21:59 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Some of the backsplashes disappeared from one of the examples due to lack of escaping. Check for "C:Program FilesMicrosoft".

06.03.2025 21:42 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Decrypting the Forest From the Trees - SpecterOps TL;DR: SCCM forest discovery accounts can be decrypted including accounts used for managing untrusted forests. If the site server is a managed client, service account credentials can be decrypted via ...

#SCCM forest discovery accounts can be decryptedโ€”even those for untrusted forests. If the site server is a managed client, all creds can be decrypted via Administration Service API.

Check out our latest blog post from @unsignedsh0rt.bsky.social to learn more. ghst.ly/4buoISp

06.03.2025 20:34 โ€” ๐Ÿ‘ 22    ๐Ÿ” 15    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

So did Justin Trudeau just quit to make sure he never had anything to do with Trump ever again?

06.01.2025 22:41 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 01.01.2025 21:23 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Delinea Protocol Handler - Remote Code Execution via Update Process (CVE-2024-12908) AmberWolf Security Research Blog

Some Christmas cheer with @buffaloverflow.rw.md . A nice bug in the URL handler for Delinea Secret Server.

blog.amberwolf.com/blog/2024/de...

26.12.2024 12:17 โ€” ๐Ÿ‘ 3    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
NTLM v1 is removed from the latest version of Windows

NTLM v1 is removed from the latest version of Windows

Oh by the way

06.12.2024 01:08 โ€” ๐Ÿ‘ 102    ๐Ÿ” 35    ๐Ÿ’ฌ 9    ๐Ÿ“Œ 6

"Influencing the infosec community 101" by @xpnsec.com

02.12.2024 21:55 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

Capture NetNTLM handshakes. Relay against domainintegrated services.

25.11.2024 22:24 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization | CISA

RIP "Within this assessment, the red team (also referred to as โ€˜the teamโ€™) gained initial access through a web shell left from a third partyโ€™s previous security assessment."

www.cisa.gov/news-events/...

21.11.2024 17:10 โ€” ๐Ÿ‘ 94    ๐Ÿ” 19    ๐Ÿ’ฌ 8    ๐Ÿ“Œ 8

@avlidienbrunn.bsky.social just joined ๐Ÿ‘€

21.11.2024 16:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Wait, where is cube0x0? ๐Ÿค”

(probably busy coding)

20.11.2024 21:10 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Following my prev tweet, my Kerberos MITM relay/forwarder is almost finished! It targets for example insecure DNS updates in AD, allowing DNS name forgery. It intercepts, relays, and forwards traffic, with the client unaware. Currently supporting smb->smb and smb->http (adcs)

20.11.2024 11:21 โ€” ๐Ÿ‘ 36    ๐Ÿ” 14    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

... and _RastaMouse.

19.11.2024 16:21 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

My replies to Linkedin messages this week...

19.11.2024 13:42 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

I have a new family member โ˜•โค๏ธ

19.11.2024 06:26 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Still waiting for _EthicalChaos_ ...

18.11.2024 23:22 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
a man wearing a hat and a tank top with the word hello below him ALT: a man wearing a hat and a tank top with the word hello below him
17.11.2024 14:13 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

That's a keeper ๐Ÿ˜„

17.11.2024 07:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

I think this image capture the state of the world right now...

17.11.2024 00:30 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@bugch3ck is following 20 prominent accounts