tiraniddo Profile Banner
James Forshaw Profile
James Forshaw

@tiraniddo

Followers
49K
Following
2K
Statuses
7K

Security researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]

United Kingdom
Joined July 2009
Don't wanna be here? Send us removal request.
@tiraniddo
James Forshaw
11 months
This new book has finally arrived. Thank's to @nostarch as well as @billpollock for making it happen as well as @Lee_Holmes as my tech reviewer.
Tweet media one
52
186
1K
@tiraniddo
James Forshaw
14 days
RT @itswillis: Two new posts from @tiraniddo today: on reviving a memory trapping primitive from his 2021 post.…
0
98
0
@tiraniddo
James Forshaw
2 months
RT @__sethJenkins: My blog post is now live alongside @amnesty 's joint release, providing remarkable insight into an ITW exploitation camp…
0
41
0
@tiraniddo
James Forshaw
2 months
RT @itswillis: If you've ever wondered if one can determine a vuln from just the kernel panic logs, @__sethJenkins (feat. @tehjh & @benoits
0
11
0
@tiraniddo
James Forshaw
2 months
RT @itswillis: Finding 0day is not the most impactful thing that Project Zero does 😲 — it's sharing knowledge 🧠. One part of that sharing i…
0
35
0
@tiraniddo
James Forshaw
3 months
RT @hakril: In our search for new forensic artifacts at @ExaTrack, we sometimes deep dive into Windows Internals. This one is about COM and…
0
41
0
@tiraniddo
James Forshaw
3 months
RT @itswillis: Project Zero Blogpost recap for the month: — @j00ru doing another deep dive into the Windows Regis…
0
62
0
@tiraniddo
James Forshaw
4 months
RT @nostarch: BOO! Our Halloween flash sale is haunting for 24 hours only. Load up on books and merch, then use cod…
0
21
0
@tiraniddo
James Forshaw
4 months
Put up the slides for my @MSFTBlueHat 2024 presentation on improvements to You can also grab v1.15 of from the PS Gallery which has the new features to generate proxy clients on the fly.
3
83
264
@tiraniddo
James Forshaw
4 months
@DrAzureAD @MSFTBlueHat @ManuelBerrueta Not my greatest photo :D
0
0
9
@tiraniddo
James Forshaw
4 months
RT @spoofyroot: The new account type for services finally landed in WIP. Now when running Windows Protected Print (WPP) the service will ru…
0
18
0
@tiraniddo
James Forshaw
4 months
@spoofyroot @decoder_it @bopin2020 @splinter_code That's fair IMO sudo should have been a PowerTool. It's unfortunate as I think admin protection would benefit greatly for a sysop controlled mechanism to limit what can and can't be elevated, like sudo is able to do. Perhaps it's just not the right model for the way Windows works
0
0
0
@tiraniddo
James Forshaw
4 months
@spoofyroot @decoder_it @bopin2020 @splinter_code Ironically there was a perfect opportunity to remodel the concept of elevation in Windows, by introducing something like sudo. Unfortunately, something "like" sudo was introduced which was just a fancy wrapper around UAC :(
1
0
2
@tiraniddo
James Forshaw
4 months
@cnotin @DaniLJ94 @decoder_it @0x64616e Me and Nick mentioned this in our Kerberos presentation at Blackhat 2022. In fact we also mentioned how to "fix" the Kerberos UAC bypass through ticket renewal :)
0
0
5
@tiraniddo
James Forshaw
4 months
@bopin2020 @decoder_it I think MS should fix these, but whether they decide they're not security boundaries or not remains to be seen.
0
0
1
@tiraniddo
James Forshaw
4 months
@bopin2020 @decoder_it I guess this is the basic question, what is an UAC bypass with Admin Protection? ICMLuaUtil would presumably require a prompt, is that a bypass, or just working as designed? The Kerberos and NTLM attacks are truly promptless, so it's easier to see them as real bypasses.
2
1
14
@tiraniddo
James Forshaw
4 months
2
4
41
@tiraniddo
James Forshaw
4 months
@spoofyroot Can I get the cash as a massive novelty check at Bluehat this year, for old time's sake? :D
1
0
20
@tiraniddo
James Forshaw
4 months
@BoreanJordan Well I assume the network behavior, while related to UAC, is really separate in what it's trying to protect against. The purpose of this new feature is to make it harder to bypass UAC on the desktop, but I'm not even sure how useful that is in practice.
1
0
4
@tiraniddo
James Forshaw
6 months
RT @nostarch: A big thank you to everyone who visited us at @defcon! It's also not too late to shop our #DEFCON32 website sale. Get 32% off…
0
17
0