Same username, probably same “hey I’m hiring” and “here are words about vulnerabilities” posts over at
Caitlin Condon
@catc0n
Adventurer. Takes a lot of photos, calls many places home. Manages vulnerability research + development for . Opinions mine, etc. She/her.
Caitlin Condon’s Tweets
No more reasons to hold back. Here's my blog I wrote days ago.
frycos.github.io/vulns4free/202
Quote Tweet
11
18
We just published details about the GoAnywhere RCE from last week, which is now assigned CVE-2023-0669. It's pre-auth, being actively exploited, and is relative easy to reverse engineer from their mitigation steps
1
9
16
Show this thread
Excellent work via who details our latest vulnerability disclosure details CVE-2023-22374: F5 BIG-IP Format String Vulnerability: rapid7.com/blog/post/2023 #infosec #cybersecurity #Vulnerability
10
6
The landscape here has changed a lot between Citrix , popular file transfer solutions, VPN appliances, load balancers, and whatever else having some horrible vulnerabilities. You need to be able to triage and perform IR in the appliance space especially when it bridges networks.
2
2
11
Show this thread
After the last few years removing your mangement interfaces from the internet should be an immediate priority.
9
27
173
Show this thread
If you're a GoAnywhere MFT customer, heads up — exploited zero-day vuln, no CVE, no patch (that we can tell). Mitigation available, has to be applied to every node.
1
10
16
5
5
Goodnight Moon,
Goodnight Chinese high-altitude spy balloon,
Goodnight stars,
Goodnight air,
Goodnight persistent overhead reconnaissance everywhere.
34
1,017
4,763
Why is it always that a bunch of vulns hit when goes on vacation? The only logical conclusion is that Glenn is secretly a threat actor.
2
12
My next live stream will be Friday the 10th at 4:30 EST on twitch.tv/zerosteiner This one will be on the new features in 6.3, mostly kerberos with some AD CS sprinkled in. Come hangout and bring your questions!
10
17
Reading 's analysis on CVE-2021-22005 affecting VMWare vCenter & the new RCE vuln in VMWare vRealize I think its a good idea to point to my auditd config, which includes rules to monitor for crond modifications
Analysis
attackerkb.com/topics/15E0q0t
github.com/Neo23x0/auditd
17
52
A few months ago, we found a format string vulnerability in an administrative endpoint of F5 BIG-IP's SOAP interface.
I wrote a lot more details on Mastodon: infosec.exchange/@iagox86/10979
All the details are in our blog post as well:
33
95
Another day, another vulnerability disclosure from — this time an authenticated format string bug in F5 BIG-IP.
1
32
56
Metasploit Framework 6.3 is out now🎉
New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats.
2
269
786
Show this thread
Quote Tweet
0:35
Fully automated privilege escalation in MSF 6.3 with the new Certifried (CVE-2022–26923) module by @n00tmeg
Show this thread
1
10
Fully automated privilege escalation in MSF 6.3 with the new Certifried (CVE-2022–26923) module by
1
8
26
Show this thread
🧡
Quote Tweet
Many thanks to our dedicated hacker team and our brilliant open-source community, including (but not limited to) @DeanAsInSean @zeroSteiner @n00tmeg @k0pak4 @_smashery_ @Op3n4M3 @SpaceySpacek @tychos_moose @TrustedSec @TheColonial and many more folks not on social media!
Show this thread
1
2
MSF 6.3 also adds Kerberos ticket inspection and debugging, plus support for generating Keytab files to decrypt Kerberos network traffic in Wireshark.
1
9
29
Show this thread
MSF 6.3 supports Kerberos authentication over HTTP, LDAP, MSSQL, SMB, and WinRM. Request TGTs and TGS with a password, NT hash, or encryption key — or request tickets via PKINIT with certs issued from AD CS.
New authentication methods here:
1
10
31
Show this thread
Just managed to replicate a common GenericWrite/RBCD attack chain I usually do with Impacket but instead used pure MSF.
Will blog it tomorrow for anyone curious how to use the new features
Quote Tweet
Metasploit Framework 6.3 is out now
New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats. rapid7.com/blog/post/2023
Show this thread
3
17
90
Show this thread
Delighted to confirm that Framework 6.3 is now Released. Includes Native Kerberos authentication over HTTP, LDAP, MSSQL, SMB, and WinRM and much much more! rapid7.com/blog/post/2023 #infosec #cybersecurity
12
13
Metasploit Framework 6.3 Released !!!!!! :
8
6
Latest Metasploit release comes with cool stuff like AD attacks rapid7.com/blog/post/2023 #metasploit #Pentesting #cybersecurity
1
9
12
My favorite part of the new Kerberos auth is the integrated ticket cache. TGTs are stored and used to obtain new TGSs. Tickets are fetched from the cache based on the SPN from the options.
No having to manage a bunch of files and set environment variables.
Quote Tweet
MSF 6.3 supports Kerberos authentication over HTTP, LDAP, MSSQL, SMB, and WinRM. Request TGTs and TGS with a password, NT hash, or encryption key — or request tickets via PKINIT with certs issued from AD CS.
New authentication methods here: gist.github.com/adfoster-r7/2b
Show this thread
1
8
28
Bananas fantastic work from the #Metasploit team here adding killer new features and simplifying complex attack workflows that are relevant to a huge percentage of modern environments
Quote Tweet
Metasploit Framework 6.3 is out now
New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats. rapid7.com/blog/post/2023
Show this thread
1
9
19
This Friday we have updates to the Python Meterpreter, an adapter to run Python payloads on Windows, and a Cacti Unauth Command Injection. Thanks !
18
35
Just pushed my first round of a hunt for a ManageEngine vulnerability
rapid7.com/blog/post/2023
docs.velociraptor.app/exchange/artif
1
12
24
Show this thread
In today's investigation, we successfully found traces of exploitation with the artifact ManageEngineLog from . 🙏
Keep in mind that, at least in the server we investigated, the logs were overwritten pretty quickly.
No hits != all good.
#Cybersecurity
Quote Tweet
Just pushed my first round of a @velocidex hunt for a ManageEngine vulnerability
rapid7.com/blog/post/2023
docs.velociraptor.app/exchange/artif
Show this thread
7
20
We’ve updated our blog (published on 1/19), “CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability.” Check out our updated IOCs here 👉 r-7.co/3knzlQB
1
8
15
ICYMI coverage details and overview of CVE-2022-44877 - Exploitation of Control Web Panel available here via rapid7.com/blog/post/2023 #infosec #cybersecurity
9
5
I just posted our #Rapid7 technical analysis of the recent vuln in #ManageEngine - CVE-2022-47966 (#cve202247966 / #CVE_2022_47966. Big thanks to and my new co-worker for their help on this one! I have a lot to learn from Stephen :)
24
50
Absolutely stellar root cause analysis of ManageEngine CVE-2022-47966 from and . TL;DR = exploitation not equally trivial across all affected products. There are also a number of vulns at play, which folks seem to be missing.
16
22
Our latest analysis details CVE-2022-47966 a pre-authentication remote code execution (RCE) vulnerability where we are seeing active exploitation: rapid7.com/blog/post/2023 H/T #infosec #cybersecurity
14
21
1
5
CVE-2022-47966: Works over GET as well (notable for our network signature writing friends). Additionally, those not familiar with XML transformation, you can execute arbitrary Java - not just getRuntime().exec(). I just developed a PoC that creates an in-memory reverse shell. 🤷
2
15
86
New emergent threat response: "CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability." Details ⤵️ (Note: emergent threat responses evolve quickly and as we learn more about this vulnerability, this blog post will evolve too.)
7
13
Donald Trump incited an insurrection, but Joe Biden once failed a car inspection, so
8
65
382


















