82 Followers
154 Following
705 Posts

Fun fact I made a typo in sysmon-config many years ago, when I was working in Helpdesk.

I got my shot and was hired to the big firm with the big fancy expensive tools I would've never dreamed of.

Do you know what I find in that tool, auditing it?

My typo. They pasted it in. They just... copied the whole thing.

I sit at my desk. And I realize I was always enough.

Oh look, the exact thing everyone but Google said would happen has happened.

https://futurism.com/artificial-intelligence/google-ai-overviews-media

Evidence Grows That Google’s AI Overviews Have Eviscerated the Media Industry

Google's AI overviews have eviscerated the media landscape, with some top publications losing up to 97 percent of their web traffic.

Futurism
The best way to prevent online ads from fueling surveillance is to ban online behavioral advertising. https://www.eff.org/deeplinks/2025/01/online-behavioral-ads-fuel-surveillance-industry-heres-how
Online Behavioral Ads Fuel the Surveillance Industry—Here’s How

Each time you see a targeted ad, your personal information is exposed to thousands of advertisers and data brokers through a process called “real-time bidding” (RTB). This process does more than deliver ads—it fuels government surveillance, poses national security risks, and gives data brokers easy access to your online activity. RTB might be the most privacy-invasive surveillance system that you’ve never heard of.

Electronic Frontier Foundation

Look me in the eye and tell me any amount of money—let alone a massive loss—is worth this.

This technology is anti-human.

https://www.cnn.com/2025/11/06/us/openai-chatgpt-suicide-lawsuit-invs-vis

‘You’re not rushing. You’re just ready:’ Parents say ChatGPT encouraged son to kill himself

A 23-year-old man killed himself in Texas after ChatGPT ‘goaded’ him to commit suicide, his family says in a lawsuit.

CNN
Boom 💥
Alongside armored vehicles, local police are getting surveillance technology with help from the federal government. Learn what tech law enforcement have in your area with EFF's Atlas of Surveillance, where we’ve documented thousands of examples: https://atlasofsurveillance.org/
Atlas of Surveillance

Documenting Police Tech in Our Communities with Open Source Research

@pfitz
Now with Alt-Text!

For any UK councils caught in the #NoName DDoS thing on Azure in the recent rounds - MS have finally implanted CAPTCHA in Azure Front Door, worth enabling for floods of traffic from same IPs

https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/general-availability-of-captcha-in-azure-front-door-waf/4464704

General Availability of CAPTCHA in Azure Front Door WAF | Microsoft Community Hub

We are excited to announce the General Availability (GA) of the Azure Web Application Firewall (WAF) CAPTCHA challenge for Azure Front Door, empowering...

TECHCOMMUNITY.MICROSOFT.COM

Today I learned: Using diskshadow to fetch the NTDS.dit. As mentioned several times, I love reading the HTB writeups from 0xdf because I always learn something new. Like here [1]:

"To dump the domain hashes, I’ll want to get the C:\Windows\NTDS.dit file. Unfortunately, this file can’t just be copied as it is locked and in use. I can access it via a shadow copy, which I’ll generate with diskshadow and this script:

set verbose on
set context persistent nowriters
set metadata C:\Windows\Temp\0xdf[.]cab
add volume c: alias 0xdf
create
expose %0xdf% e:

and pass it [the script from above] to diskshadow:
C:\programdata> diskshadow /s C:\programdata\backup"

Attackers love vssadmin, and so do the EDR vendors. How about diskshadow? We tested the attack flow in our lab with various EDRs, and the results were .. interesting. Would the command above trigger an alert in your environment?

And here, for reference, is the corresponding lolbas article [3]

[1] https://0xdf.gitlab.io/2025/09/19/htb-baby.html
[2] https://raw.githubusercontent.com/elastic/protections-artifacts/b5a0c1956d0aa92e2f44156bc9983c25ddc817d1/behavior/rules/windows/credential_access_credential_access_via_known_utilities.toml
[3] https://lolbas-project.github.io/lolbas/Binaries/Diskshadow/

HTB: Baby

Baby is an easy Windows Active Directory box. I’ll start by enumerating LDAP to find a default credential, and spray it to find another account it works on. From there, I’ll abuse Backup Operators / SeBackupPrivilege to get dump both the local and domain hashes, finding a hash for the Administrator account that works to get a shell.

0xdf hacks stuff