Screenshot of the XSS Lab web application showing the leaderboard.
We're excited to host our XSS workshop for RWTH Aachen University's SecLab, again. Today, the students will face XSS challenges as well as a hunt for IT security easter eggs to climb the leaderboard π
#rwth #informatik #aachen
17.06.2025 09:14 β π 0 π 0 π¬ 0 π 0
Based on our testing, MS seems to have fixed CVE-2025-33073 by blocking the CredUnmarshalTargetInfo/CREDENTIAL_TARGET_INFORMATIONW trick!
@tiraniddo.dev @decoder-it.bsky.social @synacktiv.com #infosecsky #infosec #pentests #redteam #cybersky #cybersecurity
bsky.app/profile/redt...
11.06.2025 10:44 β π 1 π 0 π¬ 0 π 0
π We have also released a paper which really goes into the nitty-gritty for those who are interested π΅οΈββοΈ:
www.redteam-pentesting.de/publications...
For those that only need a short overview, here's our advisory π¨:
www.redteam-pentesting.de/advisories/r...
11.06.2025 08:04 β π 1 π 1 π¬ 0 π 0
We are referencing CVE-2025-33073: Windows SMB Client Elevation of Privilege Vulnerability (when we sent the tweet, the title was not public, yet)
11.06.2025 05:43 β π 1 π 0 π¬ 0 π 0
π¨π¨π¨ Just a heads-up: Microsoft will release a fix for a vulnerability we discovered as part of Patch Tuesday, today. MS classified CVE-2025-33073 as "important" and we recommend patching soon.
Stay tuned for our blog post and paper about it tomorrow at 10:00 am CEST π₯
10.06.2025 13:14 β π 1 π 1 π¬ 1 π 0
We also used modified sploutchy's RPC server for impacket's ntlmrelayx.py to also provide a generic endpoint mapper (EPM) to abuse PrinterBug on newer versions of Windows 11.
github.com/fortra/impac...
04.06.2025 07:57 β π 2 π 1 π¬ 0 π 0