Daniel Profile
Daniel

@0x64616e

Followers
1,355
Following
136
Media
39
Statuses
814

To the monsters we're the monsters.

Germany
Joined September 2021
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@0x64616e
Daniel
3 months
Lol, blocking the loading of EDR drivers with WDAC actually works.
Tweet media one
@Deadlift_Douche
Deadlift_Douche
3 months
@0x64616e You don’t need physical access, local admin can turn off EDR easily, just make a WDAC policy to block the drivers/user land binaries.
3
29
150
10
246
1K
@0x64616e
Daniel
3 months
Binding to port 445 on Windows without WinDivert. This is highly useful for NTLM relaying. Big thanks to @zyn3rgy for the talk.
Tweet media one
@x33fcon
/ˈziːf-kɒn/
3 months
Tweet media one
2
52
151
2
126
508
@0x64616e
Daniel
1 year
Lateral movement as unprivileged user via Remote Registry now in Impacket
@splinter_code
Antonio Cocomazzi
1 year
Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe 👇
Tweet media one
26
322
1K
3
136
392
@0x64616e
Daniel
15 days
Kerberos relaying from SMB to ADCS. Especially great when ESC8 was mitigated by disabling NTLM auth on the ADCS server.
Tweet media one
Tweet media two
@decoder_it
ap
22 days
Following up on my earlier tweet () regarding Kerberos relay with SMB server, I've uploaded my quick & dirty version. It's far from perfect, so feel free to improve it!
6
97
239
5
87
313
@0x64616e
Daniel
2 months
You dumped TGTs on a Windows 11 laptop and are wondering why PTT is breaks in strange ways? Check if Credential Guard is enabled. If so, dump STs instead, as they are not protected by CG.
Tweet media one
6
71
308
@0x64616e
Daniel
3 months
Hu, this actually works. Local admin + physical access = bye, bye EDR.
@anthonyoren
The Tech Maven @NeroConsulting #MSP
3 months
@UK_Daniel_Card How true is it that bitlocker can be bypassed following these steps?
Tweet media one
4
5
38
5
34
218
@0x64616e
Daniel
7 months
After reading @C5pider 's blog I got an idea how to implement global shellcode context without NtProtectVirtualMemory: Add magic header to context struct, place context on stack, append its address to peb.ProcessHeaps and retrieve it from there when needed. No syscalls required.
Tweet media one
@C5pider
5pider
9 months
Modern implant design: position independent malware development. A small blog post on how to design "modern" malware with features like global variables, raw strings, and compile-time hashing. Repo:
27
320
1K
1
29
176
@0x64616e
Daniel
2 months
Do you like ZSH, SOCKS proxies and Impacket? Then you might want to check this out:
Tweet media one
3
43
176
@0x64616e
Daniel
1 year
This weeks path to domain admin was quite a ride. Starting from credentials in SCCM task sequences and ending in a golden certificate. BloodHound is such an invaluable tool.
Tweet media one
7
23
175
@0x64616e
Daniel
2 months
Can anyone explain what the hell is going on with Protected Users here? Why is the user allowed to do NTLM? And how does it even work when the NT hash isn't cached in LSASS? I'm so confused.
Tweet media one
9
23
153
@0x64616e
Daniel
3 months
Session Takeover via Pass the Challenge powered by @mcbroom_evan 's lsa-whisperer and @ly4k_ 's impacket fork.
Tweet media one
1
49
153
@0x64616e
Daniel
6 months
How to WebDAV Relay LPE on Windows 11: 1-3. Trigger start of EFS service trough Explorer 4-11. Continue like on Windows 10 Thanks again @ret2src for the idea. Any tip for triggering EFS remotely on Windows 11 would be greatly appreciated by the way :D
Tweet media one
Tweet media two
7
44
145
@0x64616e
Daniel
4 months
Did you know curl on Windows can authenticate via SSPI? Proxy auth works as well.
Tweet media one
2
20
136
@0x64616e
Daniel
1 month
Virtualization is the future for AV/EDR evasion. Minimal RX memory, no crappy sleep masking and many new possibilities. @C5pider if you haven't already, you'll want to read that.
@artem_i_baranov
Artem I. Baranov
1 month
Red Teaming in the age of EDR: Evasion of Endpoint Detection Through Malware Virtualisation
2
171
529
4
14
130
@0x64616e
Daniel
8 months
Weighted graphs seem to be the logical next step for BloodHound. The shortest path to Domain Admin isn't necessarily the easiest to exploit. Will definitely use this in my upcoming Active Directory Pentests.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@jmbesnard_maz
Jean-Michel Besnard
9 months
New release of AD Miner () introducing better path calculation with #Bloodhound (Smartest vs. Shortest Paths). Also published an article to explain this feature :
2
52
148
3
28
126
@0x64616e
Daniel
7 months
Cool use case for NTLM relay from SO-CON 2024.
Tweet media one
4
27
121
@0x64616e
Daniel
5 months
You obtained a computer account password and need an AES ticket? Check out Original source is by @snovvcrash
Tweet media one
0
35
110
@0x64616e
Daniel
11 months
Had a shower thought: Instead of searching for RWX sections in other DLLs (Mockingjay) just bring your own RWX section. Not sure if this is actually useful, but it enables syscall-less shellcode loaders.
Tweet media one
1
26
105
@0x64616e
Daniel
4 months
Added support for LAPSv2 to :
Tweet media one
Tweet media two
2
27
92
@0x64616e
Daniel
6 months
Just Windows doing Windows things :D I bet there's plenty software out there that doesn't expect this behavior.
Tweet media one
@oryair1999
Or Yair
6 months
*Reminder* MagicDot is now live on GitHub - If you want to manipulate the DOS-to-NT path conversion process in Windows and leverage that for rootkit capabilities, Remote Code Execution, and Elevation of Privilege then check it out!
0
26
74
2
11
74
@0x64616e
Daniel
1 year
I did some more testing and must add two constraints: 1. Doesn't work if RemoteRegistry service is explicitly disabled, which seems to be default on desktops since Win 10. 2. Target user must be currently logged in on target computer. Otherwise you get ERROR_FILE_NOT_FOUND.
Tweet media one
Tweet media two
Tweet media three
@0x64616e
Daniel
1 year
Lateral movement as unprivileged user via Remote Registry now in Impacket
3
136
392
0
16
65
@0x64616e
Daniel
4 months
This talk mentions a pretty funny AD persistence technique that I hadn't heard of before: RBCD to krbtgt. More info at
0
15
65
@0x64616e
Daniel
7 months
"Backing up" NTDS.dit with wbadmin.exe is interesting. Will have to test what EDRs think about it :D
@Wietze
Wietze
7 months
Another #LOLBAS milestone: 200 entries 💯💯 Recent additions: 🔥wbadmin (NTDS.dit dumping) 🔥winproj/msaccess (INetCache downloaders) 🔥appcert (proxy execution) 🔥tar (to/from ADS) 🔥te (arbitrary DLL loading) Thanks @AvihayEldad , irEasty, @C_h4ck_0 & others for contributing
Tweet media one
2
34
132
0
15
54
@0x64616e
Daniel
9 months
Genius idea to discourage users from entering credentials on AitM phishing sites! I implemented a PoC as Cloudflare Worker. See
Tweet media one
@MathematicaKen
Mathematica Ken
9 months
@N805DN @EricaZelic So in the MSP space theres a tool that uses the Entra branding custom CSS to dynamically eval the request header referer and if it’s not login.microsoftonline change the backround image to warnings.
3
0
19
1
11
50
@0x64616e
Daniel
9 months
Interesting detail: "Using direct syscalls is not always malicious. This action can be performed frequently by legitimate software, such as security products, gaming anti-cheat modules, Chromium-based applications and more."
1
16
45
@0x64616e
Daniel
4 months
My friend @mojeda_101 and I had the funny idea to leverage GPO item-level targeting for domain persistence.
0
13
33
@0x64616e
Daniel
6 months
I've put together a custom Google search for offensive security
1
9
31
@0x64616e
Daniel
1 year
@ShitSecure @m3g9tr0n Lateral movement in certain edge cases. For example if you found credentials of a regular domain user on a SMB share you can create a malicious Run key on his/her workstation.
4
5
32
@0x64616e
Daniel
3 months
Entra roles that have an actual path to Tier 0: Same for MS Graph: Nice work @emiliensocchi !
@emiliensocchi
Emilien Socchi
3 months
New blog post 📢 𝗧𝗶𝗲𝗿𝗶𝗻𝗴 Entra roles and application permissions based on 𝗸𝗻𝗼𝘄𝗻 𝗮𝘁𝘁𝗮𝗰𝗸 𝗽𝗮𝘁𝗵𝘀 🌩 This is a humble approach to understand the security implications of administrative cloud assets in terms of privilege escalation🪜
2
16
57
1
7
30
@0x64616e
Daniel
2 months
Cool Entra PRT cookie shenanigans
@TEMP43487580
%TEMP%
6 months
Thank you very much for joining my session at #BHASIA ! I think the slide will be published tomorrow. So, in the meantime, I'm releasing the PoC tool, BAADTokenBroker. You can pivot to the cloud, interacting with the secret keys in TPM. Enjoy!
2
20
49
0
5
28
@0x64616e
Daniel
6 months
I had multiple engagements where WebDAV relaying provided a straight path onto an admin workstation. With this HTTP.sys trick it's even better.
@pfiatde
pfiatde
6 months
As ntlm leaking is still a thing, made a showcase for elevating via ldap relaying with some little tricks. Relaying is done with a Win Client without admin privs and an active Windows firewall (default config), by using HTTP.SYS and SSH. Details here:
4
66
142
0
4
23
@0x64616e
Daniel
1 year
Wrote a small script for better integration between ZSH and Proxychains
Tweet media one
0
5
16
@0x64616e
Daniel
8 months
I noticed at the beginning of this year that "certipy find" as regular domain user doesn't always identify ESC11. Since then I'm rerunning certipy after I got Domain Admin another way and found two additional cases of ESC11 this way.
@EricaZelic
IAM!ERICA
8 months
I don't think orgs realize how lucky they are that ransomware groups didn't automate ADCS vulns into their malware. These vulnerabilities were everywhere last year. EVERYWHERE
12
5
84
1
1
15
@0x64616e
Daniel
3 months
More details:
0
2
15
@0x64616e
Daniel
5 months
@EricaZelic @NathanMcNulty Read a comment recently that was basically: If your IT isn't doing SSO your users are (by reusing passwords). Pretty on point I think :D
2
0
14
@0x64616e
Daniel
1 year
Highly recommend this series and all his other videos. Really good stuff.
@DaniLJ94
ATTL4S
1 year
Third video of "Understanding a Payload's Life" is now available This one focuses on how MSF and other frameworks generate payload executables (EXEs, DLLs...). We will see their different approaches, and how to create custom templates for Metasploit! Links in my site🙏
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
81
204
1
1
14
@0x64616e
Daniel
1 year
@an0n_r0 Wow, glad my notes are actually useful to someone :D
1
1
12
@0x64616e
Daniel
8 months
Wait, what?
@D1iv3
Dlive
8 months
We can relay back to the same machine using Kerberos relay instead of NTLM relay. I discovered this attack vector more than a year ago. I will describe it in detail in upcoming Black Hat Asia 2024 and introduce more interesting attacks.
Tweet media one
18
182
569
0
0
12
@0x64616e
Daniel
8 months
Nice trick to escalate MSSQL guest access with xp_dirtree to search backup files in the webroot.
@0xdf_
0xdf
8 months
The most fun part of Manager from @hackthebox_eu is exploiting the ESC7 vulnerability in the ADCS. To get there, I'll do a password spray, get access to MSSQL, and use xp_dirtree access to find creds.
0
25
122
0
3
10
@0x64616e
Daniel
6 months
After seeing a YouTube video where a malware analyst used a sandbox to triage samples, I got interested in stealthy sandbox evasion. This is the result:
0
2
10
@0x64616e
Daniel
5 months
Hash cracking methodology by JakeWnuk
0
2
10
@0x64616e
Daniel
2 months
With @buck_steffen we found the solution: All this is a narrow edge case: 1. Logon local interactive 2. Logon remote interactive via RDP, prev session is taken over -> NT hash is cached, NTLM auth works Without step 1 hash is not cached and uncrackable NTLM response is produced.
2
1
9
@0x64616e
Daniel
1 year
JuicyPotatoNG still works on Win 11 22H2 with CLSID {A9819296- E5B3-4E67-8226-5E72CE9E1FB7}
@splinter_code
Antonio Cocomazzi
1 year
The slides of our joint research talk “10 Years of Windows Privilege Escalation with Potatoes” at #POC2023 are out! 👉 cc @decoder_it
Tweet media one
4
149
382
0
3
8
@0x64616e
Daniel
15 days
Powered by , and
0
0
8
@0x64616e
Daniel
1 month
I've never heard of this persistence technique before. Thanks @sreevatsa for telling be about this.
@SecBlueTeam
Security Blue Team
5 months
In this week's blog post, we discuss a technique often employed by red teamers and threat actors during the lateral movement stage of the cyber kill chain, known as RID hijacking. #RedTeam #RIDHijacking #Cybersecurity
1
6
12
0
0
6
@0x64616e
Daniel
9 months
And that's why you need a TPM PIN.
@ghidraninja
stacksmashing
9 months
Lenovo X1 Carbon Bitlocker Key Sniffing any% Speedrun (42.9 seconds)
65
897
5K
0
0
6
@0x64616e
Daniel
1 year
@adamsvoboda I was able to dump the agent, but not LASS. Win 10, agent 22.3
Tweet media one
1
0
6
@0x64616e
Daniel
6 months
@vysecurity @ret2src You can adapt to use the same pipe and interface as coercer.
0
1
5
@0x64616e
Daniel
7 months
@C5pider In my head the smallest possible agent downloads raw shellcode instead of an object file and calls it with the context struct as first parameter. Everything else could then be built on that primitive.
1
0
4
@0x64616e
Daniel
11 months
@lowercase_drm Thanks. I hope the PR in ldap3 is merged soon. This would make adoption in Impacket and other tools even easier.
1
0
5
@0x64616e
Daniel
3 months
"Jumpboxes/bastion hosts are a relic from the network segmentation days and are an inadequate solution for mitigating identity-driven offensive tradecraft."
@elad_shamir
Elad Shamir
3 months
Check out my latest blog post, "The Security Principle Every Attacker Needs to Follow", in which I lay the foundation for a framework for discovering attack paths, including those that BloodHound can't find yet.
5
37
100
0
0
5
@0x64616e
Daniel
4 months
@tedixh1 @Rhynorater curl hxxps://apps.db.ripe.net/db-web-ui/api/rest/fulltextsearch/select -H 'accept: application/json' -G --data-urlencode q='(RIPE NCC) AND (object-type:inetnum)'
0
0
4
@0x64616e
Daniel
5 months
Quote: "I did not find a single mail provider that correctly parses the “From” field according to RFC standards." Ouch.
@slonser_
slonser
5 months
My new Research Email attacks. - C# 0day - spoofing emails e.t.c.
4
81
260
0
0
3
@0x64616e
Daniel
7 months
Using systemd-generators as persistence is a cool technique that I haven't heard of before.
@0xor0ne
0xor0ne
7 months
Series by @__pberba__ about persistence in Linux environments Map: Auditd: Accounts: Systemd: Scripts: Generators: #Linux
Tweet media one
1
119
406
0
0
4
@0x64616e
Daniel
2 months
Update: The order of step one and two doesn't matter.
1
1
4
@0x64616e
Daniel
5 months
@mrd0x This might be quite effective against Android (and iOS?) too, because after installation the URL bar is not shown at all.
Tweet media one
Tweet media two
1
0
4
@0x64616e
Daniel
1 year
@Memory_before @ShitSecure @m3g9tr0n Haven't tested HKU, but HKCU definitely works.
2
0
4
@0x64616e
Daniel
8 months
I have a hard time understanding the difference between "User consent to apps" in and "User consent for applications" in Does somebody know more? Maybe @EricaZelic or @NathanMcNulty ?
Tweet media one
Tweet media two
1
0
4
@0x64616e
Daniel
7 months
According to this Microsoft presentation the Active Directory functional level 2025 will enforce LDAP Signing, but not LDAPS Channel Binding. The docs at mention neither.
0
1
3
@0x64616e
Daniel
6 months
@Octoberfest73 I recommend to create a list with all people you follow. This gets you a chronological timeline, no ads, no algorithm.
0
0
3
@0x64616e
Daniel
7 months
@EricaZelic Like SSLv3 and most other findings related to outdated crypto it's medium at best, because in the real world it'll never get exploited. NTLMv1 and SMB Signing are much more important.
0
0
3
@0x64616e
Daniel
1 month
The first meme in the blog post is very on point.
Tweet media one
@TrustedSec
TrustedSec
1 month
Team work makes dream work! In our new #blog , Security Consultant @ZBStrike provides guidance for #SOC teams to navigate hurdles that might be slowing growth for the team or even their organization. Read it now!
2
17
49
0
0
3
@0x64616e
Daniel
1 year
Cool trick to hide a process.
@_ringzer0
ringzerø.training && @[email protected]
1 year
How Linux starts a process
0
44
167
0
1
3
@0x64616e
Daniel
9 months
For sake of completeness: This can be easily bypassed. You should use phishing resistant authentication like Fido or WHFB.
0
0
3
@0x64616e
Daniel
6 months
@Cyb3rC3lt @ret2src It won't work without on Windows 11.
Tweet media one
1
0
3
@0x64616e
Daniel
5 months
Good idea. Should also work well with ADIDNS Spoofing.
@nullg0re
Tony Gore
5 months
How to combine Responder w/ Evilgnx2 for privilege escalation and lateral movement in Passwordless, MFA and/or Zero Trust Environments: (Technique discovered by @nevadaromsdahl in 2023))
0
54
105
0
0
3
@0x64616e
Daniel
1 month
@shubakki @C5pider What has sleep masking to do with unbacked memory? DLL sideloading or module stomping are the answer anyway. And another big advantage for virtualization. If the interpreter runs on backed memory all payloads do too.
1
0
3
@0x64616e
Daniel
2 months
@mpgn_x64 Nope. That's why it's so strange. I initially noticed the same behavior during an engagement in a customer environment. It doesn't seem to be weird misconfiguration either.
0
0
2
@0x64616e
Daniel
15 days
@decoder_it @EricaZelic Until a few months ago I myself thought that disabling NTLM on the server is sufficient.
1
0
2
@0x64616e
Daniel
3 months
@Deadlift_Douche That's an interesting idea.
0
0
2
@0x64616e
Daniel
11 months
@ewbysec @Cyb3rC3lt As stated in the original tweet, I'm not sure if this has any real world use case. It's definitely useless for remote process injection. The only interesting aspect is probably that you can load code at runtime and execute it from backed memory without invoking any syscall.
1
0
2
@0x64616e
Daniel
6 months
@pfiatde I should've taken another look at your post. I'm so used to coercing the computer account via RPC that I overlooked that you were coercing the user with an LNK. The former works fine on Win10, but doesn't seem to work on Win11, while the latter works exactly as you described.
0
0
2
@0x64616e
Daniel
7 months
@sapientflow @C5pider Yes, that's a weak point. But it could be addressed with virtualization. For example a RISC-V VM without address translation like The only disadvantage of the railgun idea is the open connection to the C2 for the runtime of the payload.
1
0
2
@0x64616e
Daniel
2 months
@JimSycurity @bugch3ck I think the mystery is solved. See
@0x64616e
Daniel
2 months
With @buck_steffen we found the solution: All this is a narrow edge case: 1. Logon local interactive 2. Logon remote interactive via RDP, prev session is taken over -> NT hash is cached, NTLM auth works Without step 1 hash is not cached and uncrackable NTLM response is produced.
2
1
9
0
0
2
@0x64616e
Daniel
1 year
@ShitSecure I could already bring it to use today. Worked flawlessly 👍
1
0
2
@0x64616e
Daniel
2 months
@bugch3ck @buck_steffen No, at least not in the general case. Only if you login locally, don't close the session and then login remotely, then suddenly NTLM auth is allowed.
1
0
2
@0x64616e
Daniel
6 months
Stumbled upon an interesting talk by @mariussmellum about privilege escalation in Azure.
Tweet media one
0
0
2
@0x64616e
Daniel
5 months
@Gridironsec @EricaZelic @NathanMcNulty If you're thinking dev vs prod, then I probably agree, but otherwise I don't see what network separation has to do with SSO. And you can't really prevent password reuse. PasswordDev2024! vs. PasswordProd2024!
0
0
2
@0x64616e
Daniel
11 months
@_RastaMouse I assume most (all?) of it can be implemented in a library and doesn't require direct compiler support. Features that do should be solvable with a LLVM plugin. But that's all theoretical I've no practical experience with LLVM :D
0
0
1
@0x64616e
Daniel
1 year
@Memory_before @ShitSecure @m3g9tr0n Found some additional constraints
@0x64616e
Daniel
1 year
I did some more testing and must add two constraints: 1. Doesn't work if RemoteRegistry service is explicitly disabled, which seems to be default on desktops since Win 10. 2. Target user must be currently logged in on target computer. Otherwise you get ERROR_FILE_NOT_FOUND.
Tweet media one
Tweet media two
Tweet media three
0
16
65
0
0
2
@0x64616e
Daniel
10 months
@M4yFly Nice trick. Obvious if you think about it, but never came to mind.
0
0
2
@0x64616e
Daniel
1 month
@shubakki @C5pider a) Yes, of course the interpreter is plain. That's why the blog mentions polymorphism and recommends to keep the interpreter small. b) There's no need for sleep masking in a VM. The payload is never decrypted in the first place. Except the instruction that is currently executed.
1
0
2
@0x64616e
Daniel
6 months
@n00py1 I can recommend msldap from @SkelSec
0
0
2
@0x64616e
Daniel
8 months
0
0
2
@0x64616e
Daniel
15 days
@EricaZelic @decoder_it Yes, the first time I heard about it was also the BlackHat Asia talk.
0
0
2
@0x64616e
Daniel
10 months
Nice ZIP exploitation tricks at the end.
@0xdf_
0xdf
10 months
To exploit Zipping from @hackthebox_eu , I'll use symlinks in Zips to read files, bypass a gnarly regex filter with newline injection to get SQL injection and write a webshell. I'll make a malicious shared object. In Beyond Root, two unintended footholds.
1
12
86
0
0
1