Opens profile photo
Follow
Caitlin Condon
@catc0n
Adventurer. Takes a lot of photos, calls many places home. Manages vulnerability research + development for . Opinions mine, etc. She/her.
Boston, MAcaitlincondon.comJoined October 2010

Caitlin Condon’s Tweets

No more reasons to hold back. Here's my blog I wrote days ago. frycos.github.io/vulns4free/202
Quote Tweet
We just published details about the @fortraofficial GoAnywhere RCE from last week, which is now assigned CVE-2023-0669. It's pre-auth, being actively exploited, and is relative easy to reverse engineer from their mitigation steps attackerkb.com/topics/mg883Nb
Show this thread
18
The landscape here has changed a lot between Citrix , popular file transfer solutions, VPN appliances, load balancers, and whatever else having some horrible vulnerabilities. You need to be able to triage and perform IR in the appliance space especially when it bridges networks.
2
11
Show this thread
Why is it always that a bunch of vulns hit when goes on vacation? The only logical conclusion is that Glenn is secretly a threat actor.
2
12
🧡
Quote Tweet
Many thanks to our dedicated hacker team and our brilliant open-source community, including (but not limited to) @DeanAsInSean @zeroSteiner @n00tmeg @k0pak4 @_smashery_ @Op3n4M3 @SpaceySpacek @tychos_moose @TrustedSec @TheColonial and many more folks not on social media!
Show this thread
2
Just managed to replicate a common GenericWrite/RBCD attack chain I usually do with Impacket but instead used pure MSF. Will blog it tomorrow for anyone curious how to use the new features
Quote Tweet
Metasploit Framework 6.3 is out now🎉 New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats. rapid7.com/blog/post/2023
Show this thread
3
90
Show this thread
My favorite part of the new Kerberos auth is the integrated ticket cache. TGTs are stored and used to obtain new TGSs. Tickets are fetched from the cache based on the SPN from the options. No having to manage a bunch of files and set environment variables.
Quote Tweet
MSF 6.3 supports Kerberos authentication over HTTP, LDAP, MSSQL, SMB, and WinRM. Request TGTs and TGS with a password, NT hash, or encryption key — or request tickets via PKINIT with certs issued from AD CS. New authentication methods here: gist.github.com/adfoster-r7/2b
Show this thread
1
28
Bananas fantastic work from the #Metasploit team here adding killer new features and simplifying complex attack workflows that are relevant to a huge percentage of modern environments
Quote Tweet
Metasploit Framework 6.3 is out now🎉 New features include native Kerberos authentication support, streamlined Active Directory attack workflows (AD CS, AD DS), and new modules that request, forge, and convert tickets between formats. rapid7.com/blog/post/2023
Show this thread
1
19
In today's investigation, we successfully found traces of exploitation with the artifact ManageEngineLog from . 🙏 Keep in mind that, at least in the server we investigated, the logs were overwritten pretty quickly. No hits != all good. #Cybersecurity
Quote Tweet
Just pushed my first round of a @velocidex hunt for a ManageEngine vulnerability rapid7.com/blog/post/2023 docs.velociraptor.app/exchange/artif
Show this thread
20
CVE-2022-47966: Works over GET as well (notable for our network signature writing friends). Additionally, those not familiar with XML transformation, you can execute arbitrary Java - not just getRuntime().exec(). I just developed a PoC that creates an in-memory reverse shell. 🤷
2
86
New emergent threat response: "CVE-2022-47966: Rapid7 Observed Exploitation of Critical ManageEngine Vulnerability." Details ⤵️ (Note: emergent threat responses evolve quickly and as we learn more about this vulnerability, this blog post will evolve too.)
13