Twitter | Pretraživanje | |
šŸ“” Michael Grafnetter
IT Security Researcher and Trainer, Author of DSInternals PowerShell Module
172
Tweetovi
97
Pratim
1.208
Osobe koje vas prate
Tweetovi
šŸ“” Michael Grafnetter proslijedio/la je tweet
Andrew Robbins 31. sij
Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Alex Simons 28. sij
You want to read this: Five Identity Priorities for 2020 (a really good blog post from my boss Joy Chik)
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Luca Marcelli 26. sij
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Matthieu Garin 21. sij
Le skimmer de dingue !! šŸ’³šŸŽ¬
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter 19. sij
Odgovor korisniku/ci @solardiz @jpgoldberg i 2 ostali
And the winner is ... bf5b160e133c84572b9fe664bf4c718a. But I wonder if copy-pasting the password instead of typing it directly might affect the results somehow. The Windows password dialog window shows 14 stars when I paste š“®š”š“Ŗš“¶š“¹š“µš“®.
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Alex Weinert 19. sij
Nice article on MFA rollout from and :
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter 19. sij
Odgovor korisniku/ci @jpgoldberg @thorsheim i 2 ostali
I honestly don't know. But I just successfully verified those 2 values by first setting them as Windows local account passwords and then looking into the SAM database using mimikatz. Got the same results as from ConvertTo-NTHash, my own PowerShell wrapper of SystemFunction007.
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter 19. sij
Odgovor korisniku/ci @solardiz @thorsheim @troyhunt
IMO Microsoft's implementation of NTOWF in Windows (exposed as SystemFunction007 in advapi32.dll, expects UTF-16 input) should be a reference point here. For password contraseƱa I get 305a42a96d4df77c1f0434f63a28239a and for ŠæŠ°Ń€Š¾Š»ŃŒ it returns 507e3ee80df7db7c1fdd8d50ae8db606.
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Ryan Ries 15. sij
Hundreds of useful KBs got deleted just because they said "Applies to: Windows Server 2003" and weren't updated, even though the articles were still relevant? Won't catch me slippin again.
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
šŸ„ Benjamin Delpy 16. sij
It will be my new wallpapers
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Corben Leo 10. sij
Citrix ADC/Netscaler RCE (CVE-2019-19781) 😬
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Paula Januszkiewicz 9. sij
2020 will surely surprise us with many cybersecurity threats, that we didn’t expect. But some of them can be predicted. In its article listed i.a. , and . See the summary of all the possible threats, gathered here:
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
šŸ„ Benjamin Delpy 4. sij
I just pushed a šŸ„ release to support SupplementalCredentials attribute in local SAM A lots of fixes in lsadump::sam & dpapi::chrome functions too > Works on live system or offline/backup filesšŸ˜‰ Again, thank you
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter 2. sij
Odgovor korisniku/ci @gentilkiwi
OMG, is it still Xmas? Thank you, Benjamin!
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
šŸ„ Benjamin Delpy 2. sij
I just pushed the first version of the year Support RSA, DSA & EC(DH|DSA) keys: - export (even when not exportable) - convert from different format (PVK,blob,PKCS#8,PEM,DER,...) to PKCS#8 - build your PKCS#12 (pfx) from raw keys & certificates >
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Responder 2. sij
Responder 2.3.4.5 is on the way, major auth servers refactoring, py2 and py3 support, tool enhancements, and throughout Q.A. Be patient, I'm doing this on my free time, but I'm sure you'll enjoy it when it's out :)
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Seunghun Han 30. stu
demo video for Europe 2019 is now available. We extracted the VMK with the TPM vulnerability and decrypted the BitLocker-locked partition with it! BitLeaker will be published soon. Please use BitLocker with the PIN.
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
šŸ„ Benjamin Delpy 22. pro
Windows Defender killing Outlook process because of the usage of an authentication certificate with CN=.., O=mimikatz, ... āœ… "Internal behavior"
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
šŸ„ Benjamin Delpy 23. pro
Just released a version to support new options when creating SmartCard to logonšŸ˜‰ >
Reply Retweet Označi sa "sviđa mi se"
šŸ“” Michael Grafnetter proslijedio/la je tweet
Jan Muenther 18. pro
Incident Response Plan
Reply Retweet Označi sa "sviđa mi se"