Red team operator @MDSecLabs, former bootneck.

Joined June 2015
This did not age well
It's happened, finally, for the first time in my career, a monumental occasion. ..... I've started reporting on a job from the beginning. What a time to be alive.
2
12
It's happened, finally, for the first time in my career, a monumental occasion. ..... I've started reporting on a job from the beginning. What a time to be alive.
8
1
23
Getting old fucking sucks. I've lifted since I was 14, with questionable technique - never been injured. I've been blown up (more than once), shot at, fallen off cliffs - not a scratch. This morning I slightly stretched to grab something and threw my back out. FML
5
28
Tim retweeted
We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploiti… by @domchell
10
444
25
871
Hilariously this is one of the most useless ASR rules.
Replying to @MSFT365Status
Shortcuts are being deleted where the Block Win32 API calls from Office macros ASR rule is in block mode. Quick fix is to change this to audit mode, but a process to restore the removed lnk files is needed.
I wrote an article on how to bypass VPN compliance checks. It's based on PaloAlto VPN but the approach can be applied for other VPN. Process exploration, reverse engineering, step by step explanation ! Thank to @iansus et @th3m4ks for the review ! riskinsight-wavestone.com/en…
4
73
1
189
Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential Guard. These techniques also work on victims logged on before the server was compromised. research.ifcr.dk/pass-the-ch…
36
714
21
1,771
Show this thread
First year @MDSecLabs wrapped up, what a blast it's been. Great team, tough (but awesome) clients, some blinding gigs, couldn't ask for more.
1
2
30
I've seen snippets of Outflanks OST offering and it looks amazing. Not exactly a surprise
KerberosAsk is the latest addition to our OST offering. It is a fully inline BOF implementation of some of the core Kerberos commands from Rubeus/Kekeo. Ask a TGT, a service ticket or exploit CVE-2022-33679. Also works with certs to support your ADCS magic. Demo below. ⬇️ (1/3)
Show this thread
2
10
Try red teaming a Finnish bank as a non-native speaker.... Where every group, user, computer etc looks like "verkkotunnuksen järjestelmänvalvojat"
Security though obscurity doesn’t really work….
10
32
249
Actually I know exactly how - and while I cant say publicly due to behind the scenes action, its shady af
1
Tim retweeted
In response to the numerous enquiries we've received regarding distribution of Nighthawk, we've just pushed the following post: "Nighthawk: With Great Power Comes Great Responsibility" mdsec.co.uk/2022/11/nighthaw…
3
27
2
73
GIF
What's ironic here though, is that @proofpoint document some unpublished techniques which will now no doubt be deployed by TAs in their c2s, while at same time saying NH not known to be used by TAs 😆 Proper FUD mongering by sec co selling sec solutions 🙄
3
2
16
It genuinely confuses me why our industry is so insistent on using mitre. If you have control over your org's budget and want to choose an EDR, talk to your preferred red team vendor, MITRE evals are the last place you should look.
TL;DR of ATT&CK MSSP Evals: MSSPs built CTF teams to compete against each other and thus is no reflection of monitoring reality.
4
4
1
12
Also shout out to the marketing teams who take the results and create the most cringe inducing shit you'll ever see... "Look our EDR fully prevents APT script kiddie"
5
This is a game changer for hitting complex objectives, and, well, there's some fun to be had too 👀
Watch the video where I run adexplorer from my host, inside chrome.exe, on a hidden desktop, with no dll load events generated.... i literally couldn't get my head around that 😂
2
10
Pro tip: if you don't want a 15inch dehydrated bulls penis laying around your house, pay attention when wife orders the dog treats Fucking thing is longer than he is 🤣
1
6