v1ru6
v1ru6.bsky.social
v1ru6
@v1ru6.bsky.social
Cybersecurity Expert. Views are my own.
Reposted by v1ru6
Trend Zero Day Initiative™ (ZDI) discovered ZDI-CAN-25373, a critical vulnerability in Windows shortcut files.

State-sponsored #APT groups are actively exploiting this #ZeroDay in targeted attacks, posing a serious risk to affected systems.

Read: research.trendmicro.com/windows-shortc
Research, News, and Perspectives
research.trendmicro.com
March 18, 2025 at 6:43 PM
Reposted by v1ru6
Certified from HackTheBox is the first assume-breach box, where initial creds are provided. It's a realatively easy Windows box with some basic bloodhound / permissions abuse capped off with an ESP9 ADCS attack.
HTB: Certified
Ceritified is the first “assume-breach” box to release on HackTheBox. I’m given creds for a low priv user. I’ll find this user has WriteOwner over a group, which I’ll abuse to eventually get access to another user. That user has GenericAll over a user. This enabled the ESC9 attack on ADCS, where I can modify the user’s UPN to get a certificate as administrator.
0xdf.gitlab.io
March 15, 2025 at 3:00 PM