Sass, David

Black Lives Matter

Dreamer | Speaker | Legend | SRE | MCT | Shadow Architect

He/him/his/Skills

VB better than PowerShell

Have we met?

Sass, David boosted:
2025-06-19
👷 After 15 years of entrepreneurship and a few months of sabbatical I'm looking for a regular old job.

My ideal role would be primarily technical, aimed to dissect software to uncover vulnerabilities. Beyond bug mining I'd love to learn to mine better and make new kinds of pickaxes.

My public works and contact info are on my homepage:

https://scrapco.de

Get in touch if you want to know more!

Boosts are appreciated! #FediHire
Sass, David boosted:
2025-06-19

Long before the internet, some phone networks were hackable by playing a single tone at 2600Hz.

Whistled into a phone, it could grant you unrestricted access. Do you have the vocal chops to be an old-school phone phreak?

I built a web app to test your ability to produce the legendary frequency. You won't get free long distance calls but you will get some honor in the knowledge that you could have been a cool hacker. 😎

I am sad to say that I can only whistle up to 1100Hz... But my wife (a long time woodwind player) is able to consistently get it.

Give it a try: phreak.kmcd.dev/

#phreaking #2600Hz #bluebox #RetroComputing #hacker #infosec #Tech

Sass, David boosted:
2025-06-19

I successfully tested a LSASS dumping technique on a Windows 10 lab machine, which we encountered on a recent Incident Response engagement (no EDR, default Defender installed).

The "MiniDumpWriteDump" technique, as described here [1], was successful in writing the LSASS process to disk.

However, as soon as I tried to copy the dump to my Kali machine, Defender jumped into action, prohibited access to the LSASS dump, and removed the file to the quarantine. And here is the catch.

I browsed to the following folder:
C:\ProgramData\Microsoft\Windows Defender\Quarantine

In the ResourceData folder, you will find different sub-folders (or not, if Defender never quarantined something on that host), each folder containing a quarantine file.

The files are encrypted with a static key that leaked years ago, and this 10-year-old code snippet is still sufficient to decrypt the files back to their original state. [2]

Long story short: I copied the encrypted file to my Kali machine, decrypted it using the Python code from [2], and extracted the credentials and hashes with pypykatz. [3]

Classic example of "No, it's not enough when your AV blocked or removed a threat". As you can see, an attacker can easily get the LSASS dump, even if Defender removed it from the disk ¯\_(ツ)_/¯

[1 ]ired.team/offensive-security/c
[2] raw.githubusercontent.com/malm
[3] github.com/skelsec/pypykatz

Sass, David boosted:
CatSalad🐈🥗 (D.Burch) :blobcatrainbow:catsalad@infosec.exchange
2025-06-18

At just 3 years old, I have a penthouse suite, 2 passive incomes, a personal chef and driver. Follow me for financial advice.

Sass, David boosted:
BeyondMachines :verified:beyondmachines1@infosec.exchange
2025-06-18

"Works on my machine", oil on canvas.
Unknown artist, 2025

dude your job is done for. I just made an entire website with chatGPT
wanna see it?

Sure

C:\Users\ben\Downloads\index.html
Sass, David boosted:
cR0w :cascadia:cR0w@infosec.exchange
2025-06-18

Looks like today's theme is

Lisa Simpson on stage with a presentation slide that says "If you can't patch your public facing infrastructure within 24hrs of the patch, don't make it public facing."
2025-06-18

@psconf.eu you can always just run the other way

Sass, David boosted:
2025-06-18

Hold up... those things come in orange?

#raccoon

Sass, David boosted:
Adam Shostack :donor: :rebelverified:adamshostack@infosec.exchange
2025-06-16

Incidentally, if you’re not paying attention to the EU’s Cyber Resillience Act, it seems to require publishing threat models (as of the effective dates). Specifically, Article 13 states:

“3. The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. That cybersecurity risk assessment shall comprise at least an analysis of cybersecurity risks based on the intended purpose and reasonably foreseeable use, as well as the conditions of use, of the product with digital elements, such as the operational environment or the assets to be protected, taking into account the length of time the product is expected to be in use. The cybersecurity risk assessment shall indicate whether and, if so in what manner, the security requirements set out in Part I, point (2), of Annex I are applicable to the relevant product with digital elements and how those requirements are implemented as informed by the cybersecurity risk assessment...
4. When placing a product with digital elements on the market, the manufacturer shall include the cybersecurity risk assessment referred to in paragraph 3 of this Article in the technical documentation required pursuant to Article 31 and Annex VII.”

Futher, Annex 7, Part 2(a) specifies that:

“The technical documentation referred to in Article 31 shall contain at least the following information, as applicable to the relevant product with digital elements: ... 2. a description of the design... including: necessary information on the design and development of the product with digital elements, including, where applicable, drawings and schemes and a description of the system architecture explaining how software components build on or feed into each other and integrate into the overall processing...”

(4/5)

Sass, David boosted:
cR0w :cascadia:cR0w@infosec.exchange
2025-06-16
Comic of a woman yelling "No!" at her computer as she walks away.
Sass, David boosted:
2025-06-16

Scottish Police Authority.
May 2024.
FOI-Request

Microsoft 365 – Microsoft have advised that they cannot guarantee data sovereignty for M365....FOI-Request Scottish Police
Sass, David boosted:
2025-06-16

@powers-hell.com will be on stage for #PSConfEU 2025 in #Malmö (23-26 June)! 🎙️Argument completers, Dynamic parameters, and more: Building better PowerShell functions 🎙️Authentication unpacked: What does MSAL actually do? 🎟️ Tickets at psconf.eu #PowerShell #Svenska

2025-06-16

It seems selling Microsoft software licenses in Hungary is very attractive for criminals...

Sass, David boosted:
2025-06-16

Here is my new #minirack !

DeskPi RackMate T1, 2x GeeekPi 10 Inch 2U Rack Mount for Raspberry, MikroTik CSS610-8G-2S+in Network Switch, and DeskPi 7.84-inch Touch Screen.

4xpi5-8gb and 4xpi5 -6gb, 8 total nodes. There is also an additional pi4 running the display.

Running docker swarm with Portainer.

So far my stacks are: CoreDNS, traefik, tailscale, docker-registry, and nextjs dashboard for the display.

#homelab #portainer #dockerswarm #pi #pi5

Photo of a mini rack with 8xpi5s, network switch, and 2u displayScreenshot of Portainer Swarm visualize
Sass, David boosted:
2025-06-15

Incredible.

I fought Fascism in 1945!  At 102 I am doing it again!
Sass, David boosted:
JA WestenbergDaojoan
2025-06-14

Once you flatten knowledge into prediction, once you replace the actual road of learning with a shortcut that feels smarter than you are, you’ve done more harm than you know.

15/16

Sass, David boosted:
Patrick C Miller :donor:patrickcmiller@infosec.exchange
2025-06-14
Sass, David boosted:
Merill Fernando :verified: :donor:merill@infosec.exchange
2025-06-14

To understand the future of identity, you have to know its past.

I had an incredible conversation with Microsoft's "Yoda of Entra" Tarek Dawoud, about the entire 20+ year history of Microsoft's Identity platform.

Sass, David boosted:
Star Trek Minus Contextnocontexttrek
2025-06-14

It's the weekend, baby

Shaxs from Star Trek Lower Decks is pictured. He's a cartoon, because Lower Decks, besides being the best effing show ever, is a cartoon. Shaxs is a big burly man wearing his gold Star fleet uniform and also an apron over the front like he's doing some sort of art project or baking a nice sourdough. In each hand he's holding a broken bottle like that thing you do where you take a bottle and break off the bottom and then use it as a weapon. His eyeballs are bulging large, his brow is furrowed, and he looks absolutely unhinged with rage and anger. Closed caption reads, "Fighting fascism is a full time job!"
Sass, David boosted:
False Kneesfalseknees
2025-06-13

(3/14)

Fledgling is emerging from the top of her nest, squinting, asking out loud to no one "where do the interesting birds hang out?". She then looks up, gasps and says "what an interesting bird!". In the final frame we see a nasty white and black long-haired cat perched on the branch above the nest looking down at her.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst