Rémi GASCOU (Podalirius) 

537 Followers
99 Following
18 Posts

Security Researcher and speaker 📢

I hack stuff and then I write/talk about the stuff I hacked.

- Site: https://podalirius.net/en/
- Youtube: https://youtube.com/@Podalirius_
- Twitter: https://twitter.com/podalirius_
- Patreon: http://patreon.com/podalirius

Githubhttps://github.com/p0dalirius

Opening a new chapter 📖

Back in 2005, I started taking apart computers just to see how they worked. I wasn’t following a roadmap — I was driven by pure curiosity. Then I got my hands on an old Amstrad CPC 6128, a beautiful machine that introduced me to BASIC and marked the beginning of a long journey into programming. Since then, I’ve explored 20+ languages, countless network protocols, and one big obsession that always stuck with me: understanding how systems work under the hood.

In 2019, while finishing my engineering degree, I dove headfirst into cybersecurity research. At first it was just a side passion — spending nights and weekends reverse-engineering, coding, breaking, and fixing things. I started a blog, shared my findings, and slowly, this hobby began to grow into something bigger. I gave many talks in France and Europe, with BlackHat Europe 2022, where I had the honor of presenting my work on Windows Remote Procedure Calls. Since then, I’ve never stopped working on Windows internals, Active Directory, and developing open-source tools to share what I learn along the way.

🚨 Now it’s time for the next chapter.

After two years working as a consultant at Bsecure I’ve learned and grown, I’m beyond excited (and proud!) to announce that I’m joining @SpecterOps as a Senior Security Researcher.

This isn’t just a new job — it’s a perfect reflection of who I am and where I want to go. I will get to focus full-time on deep technical research, work alongside people I’ve followed and admired for years, and continue contribute to the infosec community as a whole.

Thank you to everyone who’s supported me on this journey so far — it’s just getting started. 💥

🚀 New Tool Release: DescribeNTSecurityDescriptor 🚀

If you've ever had to analyze Windows NT Security Descriptors, you know how complex it can be. To make this easier, I've developed DescribeNTSecurityDescriptor, a cross-platform tool that helps decode, parse, and visualize security descriptors in a structured way.

🔍 What does it do?

1️⃣ Parses DACLs, SACLs, ACEs, and more

2️⃣ Converts raw security descriptors into a readable format

3️⃣ Helps security researchers and admins better understand permissions and access control of a specific object

This tool is useful for pentesters, DFIR analysts, and sysadmins working on Windows security. Feel free to check it out, contribute, or give feedback!

💡 If your company finds my tools useful, consider sponsoring my work on GitHub to support open-source cybersecurity research: https://github.com/sponsors/p0dalirius

➡️ Check it out on GitHub: https://github.com/p0dalirius/DescribeNTSecurityDescriptor

---
🔧 Stay ahead in offensive security, follow me for tools and tips:
👉 GitHub: https://github.com/p0dalirius
👉 YouTube: https://www.youtube.com/@Podalirius_

If you were annoyed by the recent multi-lines output bug in #ffuf in your #pentests and #bugbounty engagements, I've just fixed it: https://github.com/ffuf/ffuf/pull/656

It's not yet merged, but in the meantime you can apply the patch locally and recompile ffuf if needed! 🤗

[Fix] Fixed multiline output when using only one fuzz variable (issue #645) by p0dalirius · Pull Request #656 · ffuf/ffuf

Description Fixed multi-line output when using only one fuzz variable (issue #645) Fixes: #645 Bug source In version 2.0 of fuff, FFUFHASH was added. ffuf/CHANGELOG.md ...

GitHub

My guide on #maintainer burnout and departure planning:

"All maintainers eventually leave (or stop leading) projects.... It's worth taking a moment to imagine: what would a GOOD departure look like for your involvement with your project? Or... what endings or departures would be...clearer, more respectful, less wasteful?"

https://docs.oscollective.org/guides/handling-burnout-and-career-planning

It was pleasant to learn that the volunteers who publish Wikipedia Signpost find it useful as they consider sustainability:

https://en.wikipedia.org/wiki/Wikipedia_talk:Wikipedia_Signpost/Newsroom/Archive_30#EiC_continuity_norms

Handling Burnout and Career Planning | Open Source Collective

Twitter will effectively disable a security feature: (SMS) two-factor authentication (2FA). Will be disabled automatically. Unless you pay $8 a month.

You may opt to other 2FA method but probably most users won’t. So they’ll get degraded security. Automatically! https://blog.twitter.com/en_us/topics/product/2023/an-update-on-two-factor-authentication-using-sms-on-twitter

An update on two-factor authentication using SMS on Twitter

An update on two-factor authentication using SMS on Twitter

Hey #infosec, want to speak at a conference but you feel like you have nothing to share that's new or exciting? Well you're wrong. Just your perspective on a well documented issue or practice is unique to you and valuable.

I got started with #conference #speaking by giving a talk on common OAuth2 implementation errors. 80% of what I presented was documented in the RFC. However, the value (as I was told later by attendees) was that I presented it from my perspective of a former developer turned pentester. That helped it resonate for others.

The @BlueTeamCon CFP will be kicking off later this month and I'd love to have you make our conference your first speaking engagement. If you feel like you could use help putting together a strong CFP submission, reach out. Either I can help or I will connect you with someone who can!! Hope to see your name in the list!!

Making #ChatGPT display cats using reflected Markdown injections!

https://www.youtube.com/watch?v=GL0KaqwoBV8

Demonstration of reflected markdown injections in #ChatGPT

YouTube

Microsoft has just released a patch for ZIP MOTW vulnerability assigned as CVE-2022-41091.

I am happy to be able to finally drop my bug analysis write-up! 🔥🐜​

Enjoy and happy patching!
https://breakdev.org/zip-motw-bug-analysis/

Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049)

Windows ZIP extraction bug (CVE-2022-41049) lets attackers craft ZIP files, which evade warnings on attempts to execute packaged files, even if ZIP file was downloaded from the Internet.

BREAKDEV

Next week I will present a #talk at #BlackHat Europe 2022 on how to automate the search of RPC functions allowing to coerce authentications on #Windows.

Alongside this talk, I'm publishing a brand new version of #Coercer!

➡️Check it out here: https://github.com/p0dalirius/Coercer

GitHub - p0dalirius/Coercer: A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods. - GitHub - p0dalirius/Coercer: A python script to automatically coerce a Windows...

GitHub

Several years ago, there was a flap in the fediverse when someone mentioned being part of infragard (a public/private partnership with the FBI) for securitng infrastructure.

My comments about CISA members joining infosec.exchange have rekindled those flames, with instances now apparently blocking infosec.exchange because their members have a legitimate reason to fear the US government. We also have accounts owned by the CERTs of several countries, and even the EU. It's disappointing, however I understand the reasoning. I am posting this so that infosec.exchange accounts, along with others in the community, have a chance to move accounts, or institute their own blocks, as necessary.

It's becoming clear to me that some parts of the fediverse may be incompatible with each other. Not for technical reasons, but for philosophical ones. That makes me a bit sad, particularly in the case of CISA, who are doing their level best to improve the security and resiliency of technology that underpins modern civilization.

If this is the lsat message your instance sees from me, be well. If you chose to move to a new instance that blocks this one, I appreciate you have been here and hope the experience was good.

Go forth and do good things.