livellosegreto.it is one of the many independent Mastodon servers you can use to participate in the fediverse.
Livello Segreto è il social etico che ha rispetto di te e del tuo tempo.

Administered by:

Server stats:

1.2K
active users

#cybersecurity

396 posts202 participants88 posts today

New Open-Source Tool Spotlight 🚨🚨🚨

Active Directory Certificate Services (AD CS) can be a goldmine if misconfigured. Tools like Certipy simplify enumeration and abuse, leveraging techniques like Shadow Credentials, Golden Certificates, and domain escalation paths (ESC1-ESC11). #CyberSecurity #RedTeam

Certipy's `shadow` command exemplifies ADCS weaknesses. By manipulating `msDS-KeyCredentialLink`, you can take over accounts via PKINIT. It's seamless but devastating for privilege escalation. #Pentesting #ActiveDirectory

Golden Certificates mimic Golden Tickets but target ADCS. Using a compromised CA private key, an attacker can forge certs for domain controllers or users. Certipy automates this process—caution with CA backups. #InfoSec #PKI

🔗 Project link on #GitHub 👉 github.com/ly4k/Certipy

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

European Cyber Security Organisation (ECSO) expresses serious concern over recent developments in the CVE vulnerability identification program and calls for European leadership in establishing an alternative solution. With cybersecurity at stake, ECSO advocates for a transparent, trustworthy public-private partnership to strengthen Europe's security posture.

#SecurityLand #GeoSphere #Cybersecurity #VulnerabilityManagement #EuropeanLeadership #EU

security.land/ecso-calls-for-e

Security Land · ECSO Calls for European Leadership in Vulnerability Management Following CVE Program Concerns | Security LandEuropean Cyber Security Organisation urges creation of public-private partnership to manage vulnerability identifiers as alternative to CVE.