Felipe Molina's Avatar

Felipe Molina

@felmoltor.me.bsky.social

Mastodon felmoltor@defcon.social. Now with more #OSCP than the previous version. Working @SensePost.com - Orange Cyberdefense https://blog.felipemolina.com/

90 Followers  |  197 Following  |  64 Posts  |  Joined: 15.11.2024  |  2.2637

Latest posts by felmoltor.me on Bluesky

A screenshot of two windows. The top is a view of the Microsoft SQL management GUI showing that “Extended Protection” is enabled for NTLM authentication. The bottom is a terminal showing an invocation of Impacket’s mssqlclient.py successfully connecting using channel binding.

A screenshot of two windows. The top is a view of the Microsoft SQL management GUI showing that “Extended Protection” is enabled for NTLM authentication. The bottom is a terminal showing an invocation of Impacket’s mssqlclient.py successfully connecting using channel binding.

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (@Defte_ on the bird site), including instructions for reproducing the test environment yourself.

sensepost.com/blog/2025/a-...

31.07.2025 16:19 — 👍 9    🔁 6    💬 0    📌 1
Preview
Attackers abusing Proofpoint & Intermedia link wrapping to deliver phishing payloads Attackers are exploiting Proofpoint and Intermedia link wrapping to mask phishing payloads.

From June 2025 through July 2025, the Cloudflare Email Security team has been tracking a cluster of cybercriminal threat activity leveraging Proofpoint and Intermedia link wrapping to mask phishing payloads. Read more: cfl.re/4lUXBEE

30.07.2025 13:54 — 👍 8    🔁 2    💬 0    📌 0
Preview
Active Supply Chain Attack: npm Phishing Campaign Leads to P... Popular npm packages like eslint-config-prettier were compromised after a phishing attack stole a maintainer’s token, spreading malicious updates.

There's an ongoing npm supply chain attack taking place:

socket.dev/blog/npm-phi...

x.com/AikidoSecuri...

19.07.2025 11:53 — 👍 24    🔁 10    💬 0    📌 0
BChecks/vulnerabilities-CVEd/CVE-2025-5777 - CitrixBleed 2.bcheck at main · felmoltor/BChecks BChecks collection for Burp Suite Professional and Burp Suite DAST - felmoltor/BChecks

The bcheck is here, ping me if you have comments or improvement suggestions: github.com/felmoltor/BC...

17.07.2025 06:37 — 👍 0    🔁 0    💬 0    📌 0
CVE-2025-5777 - CitrixBleed 2 by felmoltor · Pull Request #253 · PortSwigger/BChecks BCheck Contributions BCheck compiles and executes as expected BCheck contains appropriate metadata (name, version, author, description and appropriate tags) Only .bcheck files have been added o...

I've created a pull request to detect CitrixBleed 2 into Burp's Bcheck repository: github.com/PortSwigger/...

17.07.2025 06:37 — 👍 0    🔁 0    💬 1    📌 0
JsJack A tool to find orphan scrips and two interesting cases

I wrote a tool to detect orphan scripts at a scale using Scrapy as its foundation: JsJack.

Finding vulnerabilities in high-volume traffic sites was more challenging than I initially expected, but I learned many other things from this experience: blog.felipemolina.com/posts/jsjack/

14.07.2025 11:15 — 👍 0    🔁 0    💬 0    📌 0
Preview
Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now Wireless hardware to seriously disrupt rail transport costs less than $500.

Oh neato, a 13 year-old vuln in

(checks notes)

all US trains that allowed anyone to control the brakes?

Cool cool cool.

14.07.2025 04:10 — 👍 25    🔁 12    💬 3    📌 1
asking grok 4 for its opinions on israel palestine it first searches to see what Elon musk thinks

asking grok 4 for its opinions on israel palestine it first searches to see what Elon musk thinks

Well, a single week was enough to provide a convincing case that a Wikipedia equivalent for LLMs is necessary i.e. decentralized LLM training and serving

10.07.2025 22:28 — 👍 103    🔁 17    💬 5    📌 5

Y luego tenemos a unos cuantos gurús educativos proponiendo que el alumnado "le pregunte las dudas" a ChatGPT...

11.07.2025 06:26 — 👍 14    🔁 7    💬 2    📌 0

These arrests are the definition of "don't shit where you eat"

10.07.2025 12:14 — 👍 12    🔁 1    💬 1    📌 1
Post image

The finding was for "JWT weak HMAC secret" and it said the secret was literal "secret"

A range of emotions pushed me in various directions at once. What? no.!? yes!!!!!!! let's verify...

10.05.2025 19:27 — 👍 5    🔁 1    💬 1    📌 3

Anyway, the BTC address is 17vv2jEQBbPbzfBaWMJGXJd6EPrsvjt34J and the guy is cybertraderoficial@gmail.com. In case you want to phish the guy 🎣

18.06.2025 09:49 — 👍 1    🔁 0    💬 0    📌 0
Post image

All hail the stupid king! Me! 🤴
In 2024 forgot that I was running a Mongo Express in a docker container without authentication (AS IT WAS ONLY INTERNALLY EXPOSED). Later, I randomly did some tests with Nginx to expose port 8081 and forgot about it... Fast forward to June 2025:

18.06.2025 09:49 — 👍 0    🔁 0    💬 1    📌 0
Preview
Spaceballs 2 Will See Rick Moranis Return as Dark Helmet as Mel Brooks Sequel Trailer Plots a Course for 2027 - IGN Moviemaking icon Mel Brooks and Amazon MGM Studios have published a special trailer to announce that Spaceballs 2 is moving full steam ahead with plans to premiere in 2027.

If this is true, this is the best news I've read this week! Excited to activate my nostalgia mode with Spaceballs 2! www.ign.com/articles/spa...

13.06.2025 09:35 — 👍 0    🔁 0    💬 0    📌 0

I programmed some time ago a crawler with Scrapy to detect orphan JavaScript scripts in target domains. I think I'll release that tool soon ☺️

13.06.2025 08:57 — 👍 0    🔁 0    💬 0    📌 0
Sample output of PrivescCheck showing the information collected about the Symantec Management Agent (SMA).

Sample output of PrivescCheck showing the information collected about the Symantec Management Agent (SMA).

🆕 New blog post!

"Checking for Symantec Account Connectivity Credentials (ACCs) with PrivescCheck"

This blog post is not so much about PrivescCheck, but rather brings additional insight to the original article published by MDSec on the subject.

👉 itm4n.github.io/checking-sym...

#redteam

11.06.2025 15:46 — 👍 8    🔁 4    💬 0    📌 0
SensePost | Depscanner: find orphaned packages before the bad guys do Leaders in Information Security

I was talking with someone about dependency confusion and suply chain attacks and I was confused myself with the feasibility of doing this in 2025, so I decided to take a practical aproach and create my own tool 🔨 to detect Orphan and Mispelled packages 📦: sensepost.com/blog/2025/de...

11.06.2025 10:04 — 👍 5    🔁 3    💬 0    📌 1
Post image 09.06.2025 22:00 — 👍 22    🔁 2    💬 0    📌 0
The Sombrero Galaxy is an oblong, pale white disk with a glowing core. It appears nearly edge-on but slants slightly in the front, presenting a slight top-down view of the inner region of the galaxy and its bright core. The outer disk is darker with shades of brown and black. Different colored distant galaxies and various stars are speckled among the black background of space surrounding the galaxy.

The Sombrero Galaxy is an oblong, pale white disk with a glowing core. It appears nearly edge-on but slants slightly in the front, presenting a slight top-down view of the inner region of the galaxy and its bright core. The outer disk is darker with shades of brown and black. Different colored distant galaxies and various stars are speckled among the black background of space surrounding the galaxy.

Image of a galaxy on the black background of space. The galaxy is a very oblong, brownish yellowish disk that extends from left to right at an angle (from about 10 o’clock to 5 o’clock). Mottled dark brown patches rim the edge of the disk and are particularly prominent where they cross directly in front of the galaxy. The galaxy’s center glows white and extends above and below the disk. There are different colored dots, distant galaxies, speckled among the black background of space surrounding the galaxy. At the bottom right, there is a particularly bright foreground star with Webb’s signature diffraction spikes.

Image of a galaxy on the black background of space. The galaxy is a very oblong, brownish yellowish disk that extends from left to right at an angle (from about 10 o’clock to 5 o’clock). Mottled dark brown patches rim the edge of the disk and are particularly prominent where they cross directly in front of the galaxy. The galaxy’s center glows white and extends above and below the disk. There are different colored dots, distant galaxies, speckled among the black background of space surrounding the galaxy. At the bottom right, there is a particularly bright foreground star with Webb’s signature diffraction spikes.

sombrero galaxy - hubble vs webb:

03.06.2025 16:40 — 👍 467    🔁 56    💬 6    📌 3
The background is mostly dark. At the center is a dark orange-brown circle, surrounded by several blazing bright, thick, horizontal whiteish rings. This is Saturn and its rings. There are three tiny dots in the image—one to the upper left of the planet, one to the direct left of the planet, and the lower left of the planet. These are three of Saturn’s moons: Dione, Enceladus, and Tethys, respectively. There is a slightly darker tint at the northern and southern poles of the planet. The rings surrounding Saturn are mostly broad, with a few singular narrow gaps between the broader rings. There is an innermost, thicker ring, and next to that is a brighter, wider ring. Traveling farther outward, there is a small dark gap before another thicker ring. In the thicker ring, there is a narrow faint band. There is then an outermost, faintest, thinnest ring.

The background is mostly dark. At the center is a dark orange-brown circle, surrounded by several blazing bright, thick, horizontal whiteish rings. This is Saturn and its rings. There are three tiny dots in the image—one to the upper left of the planet, one to the direct left of the planet, and the lower left of the planet. These are three of Saturn’s moons: Dione, Enceladus, and Tethys, respectively. There is a slightly darker tint at the northern and southern poles of the planet. The rings surrounding Saturn are mostly broad, with a few singular narrow gaps between the broader rings. There is an innermost, thicker ring, and next to that is a brighter, wider ring. Traveling farther outward, there is a small dark gap before another thicker ring. In the thicker ring, there is a narrow faint band. There is then an outermost, faintest, thinnest ring.

i still think about the jwst saturn picture a lot

05.06.2025 18:44 — 👍 520    🔁 68    💬 14    📌 1
A DALL-E generated image of a hooded person behind a computer with a large glowing wifi symbol on it. In the background are neon posters with the words WPA2 handshake cracking, PEAP relay access, certificate bypass and BLACK HAT. The style is neon cyberpunk.

A DALL-E generated image of a hooded person behind a computer with a large glowing wifi symbol on it. In the background are neon posters with the words WPA2 handshake cracking, PEAP relay access, certificate bypass and BLACK HAT. The style is neon cyberpunk.

Wifi hacking can be a useful tool, but people are out here grinding on WPA2 handshake cracking tutorials & menu driven attack tooling. When we built the 3rd and latest iteration of the wifi hacking course for BlackHat - we did it to show what really works and how it really works. 1/7

04.06.2025 12:01 — 👍 3    🔁 2    💬 1    📌 2

I finished watching the last chapter of The Leftovers yesterday. Oh, man! Not many series got me so hooked up to the TV and sitting at the edge of my seat as this one has. ❤️

04.06.2025 13:23 — 👍 0    🔁 0    💬 0    📌 0

From my perspective, the most difficult part for a phishing assessment where AI cannot easily help is to set up a trusted and mature infrastructure and domains to be able to land your emails in the target's inbox. The content/pretext of the mail is important, but first you have to land your mail!

28.05.2025 14:15 — 👍 4    🔁 1    💬 0    📌 0

I’m seeing a large disconnect between “thought leader” takes about AI aiding attackers versus hands-on practical use - but I’d love a wider view.

If we look at deepfakes, malware & phishing as the most common places people believe attackers are advantaged by AI one by one 1/5

28.05.2025 10:45 — 👍 0    🔁 3    💬 1    📌 0
Post image

Wow, a comment on HN I actually agree with!

28.05.2025 04:18 — 👍 603    🔁 69    💬 44    📌 31
Hijacking the Windows “MareBackup” Scheduled Task for Privilege Escalation – SCRT Team Blog

🆕 New blog post! It's a rather short one, nothing crazy. Just wanted to share a random finding I made recently. 🤷‍♂️

'Hijacking the Windows "MareBackup" Scheduled Task for Privilege Escalation'

👉 blog.scrt.ch/2025/05/20/h...

#pentest #pentesting #redteam #windows #privilegeescalation

28.05.2025 07:08 — 👍 8    🔁 5    💬 0    📌 0

Nice! It looks like It could work for my use case.
I'm still sad about Pocket, though 😁

24.05.2025 16:09 — 👍 0    🔁 0    💬 0    📌 0

Bad news for many of us. I have been a Pocket user since its name was "Read it Later" 😞

24.05.2025 13:57 — 👍 1    🔁 0    💬 1    📌 0

Politicians really need to stop using X to assess public opinion on any given subject, at this point they might as well be relying on 4chan.

12.05.2025 12:22 — 👍 1884    🔁 324    💬 42    📌 33

@felmoltor.me is following 20 prominent accounts