DTM
banner
dtmsecurity.bsky.social
DTM
@dtmsecurity.bsky.social
Hacker, Security Engineer and Researcher.
https://dtm.uk/
Reposted by DTM
In ~1h, we’ll explore the awesome and clever DOOM.PDF!
www.youtube.com/live/t17joAi...
10 Doom.PDF
YouTube video by Ange Albertini
www.youtube.com
January 19, 2025 at 6:40 PM
Reposted by DTM
I made my #38C3 talk on file formats (fearsome file formats) for all kinds of audience.
Here's how...

Hopefully, a little bit for all kinds of people!
January 7, 2025 at 9:04 AM
Reposted by DTM
I presented about file formats at #38C3.
Thanks for the feedback everyone!
speakerdeck.com/ange/fearsom...
Fearsome File Formats
Presented at 38C3 in Hamburg on the 28th December 2024. With so many open-source parsers being tested and fuzzed, and widely available specs, what c…
speakerdeck.com
December 28, 2024 at 5:19 PM
Reposted by DTM
Some Christmas cheer with @buffaloverflow.rw.md . A nice bug in the URL handler for Delinea Secret Server.

blog.amberwolf.com/blog/2024/de...
Delinea Protocol Handler - Remote Code Execution via Update Process (CVE-2024-12908)
AmberWolf Security Research Blog
blog.amberwolf.com
December 26, 2024 at 12:17 PM
Reposted by DTM
Sorry folks, I had to remove the Disconnected GPO project from GitHub... but never fear, it has returned as Disconnected RSAT since it now supports the Certificate Authority and Certificate Templates snap-ins in addition to Group Policy support.
github.com/CCob/DRSAT
GitHub - CCob/DRSAT: Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies
Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies - CCob/DRSAT
github.com
December 27, 2024 at 11:51 AM
Reposted by DTM
Merry CRTmas everyone poc.lol/crtmas/
Merry CRTmas
poc.lol
December 1, 2024 at 10:00 PM
Reposted by DTM
Bug Bounty Tip

XSS Filter Bypass: mXSS

Cheers!
November 28, 2024 at 11:22 AM
Reposted by DTM
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range.

volexity.com/blog/2024/11...

And yet... they got caught doing this!
November 22, 2024 at 10:31 PM