CVE STALKER

CVE-2021-42278

CVSS
DESCRIPTIONActive Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291.
HEAT SCORE3085

WORDS

TWEETS

DATE TWEETS USER
2022-06-20 13:21:04@DebugPrivilege - password in clear as comment on LDAP - CVE-2021-42287/CVE-2021-42278 from regular user (responder/relay)crittico
2022-05-25 17:00:28@nader_shalabi @gf_256 CVE-2021-42278aleph_sars
2022-05-10 20:23:40eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IYhhJkeuZx https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlK3vinLuSec
2022-04-27 14:42:48Yo @exploitph love your blog post on CVE-2021-42278 weaponisation.myexploit2600
2022-04-14 01:16:05https://t.co/RJ6a9f55db The Microsoft issues - CVE-2021-42287 and CVE-2021-42278 - also concern privilege escal… https://t.co/867UH3OULJ https://therecord.media/cisa-adds-google-microsoft-and-qnap-bugs-to-exploited-vulnerabilities-list/ https://twitter.com/i/web/status/1514408986040156161eagerbeavertech
2022-04-12 14:50:08Of the 8 new Vulns that @CISAgov added to their catalog, CVE-2021-42287 & CVE-2021-42278 related to AD privilege es… https://t.co/OwVDNRBayE https://twitter.com/i/web/status/1513892134939680771NeedPizzaNow
2022-04-11 21:40:15The latest update for #CalComSoftware includes "CVE-2021-42278 SAM & CVE-2021-42287 KDC vulnerability" and "… https://t.co/ek4WDRmtMf https://twitter.com/i/web/status/1513632406116487176opsmatters_uk
2022-04-08 19:20:29📌 Atacantes utilizaron dos vulnerabilidades en Windows Server para elevar privilegios en la red: + CVE-2021-42278:… https://t.co/JEZisRPM9q https://twitter.com/i/web/status/15125099296592855121ZRR4H
2022-04-06 21:30:48Good catch Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and we… https://t.co/9trI9l7XNE https://twitter.com/i/web/status/1511818340402032640SaidBisri
2022-04-06 19:50:16Good catch 👌🏼 Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and w… https://t.co/UrTLArZRpB https://twitter.com/i/web/status/15117929396802887800xtornado
2022-04-01 18:30:05Invoke-sAMSpoofing CVE-2021-42287/CVE-2021-42278 exploits in powershell https://t.co/28JJTNZhGq #infosec #CyberSecurity #bugbountytips https://github.com/XiaoliChan/Invoke-sAMSpoofingKsecureteamlab
2022-03-19 21:40:04Fully automated CVE-2021-42278 and CVE-2021-42287 (NoPac) exploit that bypasses Defender/AMSI and dumps stored cred… https://t.co/b6cJtrgKpP https://twitter.com/i/web/status/1505298000146571264assume_breach
2022-03-04 13:22:04noPac : CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter AD Domain admin exploit https://t.co/pDiUzvZMNi https://t.co/mSdKWMHEPn https://github.com/cube0x0/noPacbrianlinux
2022-02-28 09:10:06ZeroDayLab | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/7eJrTo3u9l https://bit.ly/3hqdIKMStopMalvertisin
2022-02-11 15:30:20Exploiting the CVE-2021-42278 (sAMAccountName spoofing) and CVE-2021-42287 (deceiving the KDC) #ActiveDirectory vu… https://t.co/9agJw29Dfq https://twitter.com/i/web/status/1492154082160783361Olya_moskovchen
2022-02-02 15:21:25Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/aVZoCZSWET https://github.com/WazeHell/sam-the-adminJacobDjWilson
2022-01-31 07:10:09CVE-2021-42278 Microsoft Active Directory Domain Services Elevation of Privilege... https://t.co/ywCEaPG9ef Vuln… https://t.co/rYAsG4wwGE http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-42278 https://twitter.com/i/web/status/1488046028133703680VulmonFeeds
2022-01-27 10:32:13“60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287” https://t.co/YVSK5W0ln5 https://htn.to/rojsYKAi4owaiha8
2022-01-27 07:44:11ブログ | 60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287 https://t.co/tZCdXnU9oB https://ftnt.net/6014KyZtIFortinetJapan
2022-01-18 07:14:33CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/lCPpRAyLMw #infosec #pentest #bugbounty @Dinosn https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlbeingsheerazali
2022-01-18 05:10:49CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Xp2LPb8zfA https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlDinosn
2022-01-17 06:50:29Microsoft recently published two critical CVEs related to Active Directory (CVE-2021-42278 and CVE-2021-42287), whi… https://t.co/Nx9B0T2rzd https://twitter.com/i/web/status/1482966595915816961TowardsCybersec
2022-01-14 18:40:35noPac Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/AfddOnyXMn https://twitter.com/i/web/status/1482058989340925956hack_git
2022-01-13 13:42:38Adversarial #CVE Targeting - CVE-2021-42278 & CVE-2021-42287 Discussion is less about two CVEs & more about patchi… https://t.co/nxVgSaZOUg https://twitter.com/i/web/status/1481619676455223297y_advintel
2022-01-11 09:51:51.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/61AxgCLWZ3 https://twitter.com/i/web/status/1480837463044206602ChrisRobertsSec
2022-01-10 22:50:09From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/sgdIntLAjt https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.Ydy3O0DdfaM.twitterDennisFernandes
2022-01-10 21:40:17Excited to share our research and detection on the CVE-2021-42278 and CVE-2021-4487 Kerberos vulnerabilities with… https://t.co/uEIjUDGBsO https://twitter.com/i/web/status/1480655530548944907stavsetty
2022-01-10 17:41:39“From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs” https://t.co/F6Pucwelhl https://htn.to/4sKT8teGqEwaiha8
2022-01-10 17:41:08.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/RpLG1fXHd0 https://twitter.com/i/web/status/1480594127687409673SDCarter10
2022-01-10 14:10:08Learn how @cortexbypanw XDR detects the Kerberos noPac vulnerabilities - CVE-2021-42278 and CVE-42287… https://t.co/UxUBhLknrf https://twitter.com/i/web/status/1480539964421066755cortexbypanw
2022-01-10 11:30:11From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs… https://t.co/7fSFSxh91k https://twitter.com/i/web/status/1480499899355607050DominikGeimer
2022-01-10 07:10:26CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2022-01-09 13:00:21From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/hznYOYVW6L https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondslalit_1985
2022-01-09 08:20:06.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/MWVV2kvWiS https://twitter.com/i/web/status/1480091093509234692Scheehan
2022-01-07 12:40:39The Windows Active Directory Domain Services (AD DS) escalation vulnerability (CVE-2021-42287 and CVE-2021-42278 co… https://t.co/AwxlUFm12C https://twitter.com/i/web/status/1479431078532169729sunnynehrabro
2022-01-07 12:10:25.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/3AJdxx7XQn https://twitter.com/i/web/status/1479423355476402180gagjunior
2022-01-07 10:00:03From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/DVXNRpNAUj https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.YdgOc6e55fA.twitterGeeKo0
2022-01-07 07:00:21.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/ufajZULr4T https://twitter.com/i/web/status/1479345987948879875kathleenb03
2022-01-06 23:53:34.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/kfVjmUjNX3 https://twitter.com/i/web/status/1479237303289761798W_Gartner
2022-01-06 19:23:45From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/GwFmuoopOl… https://t.co/pEHifW78Ys https://buff.ly/3HDQZG8 https://twitter.com/i/web/status/1479168906048815104NcuIsao
2022-01-06 18:54:17.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/8M0rfnPohr https://twitter.com/i/web/status/1479161583553159173dkBrianAndersen
2022-01-06 14:20:08Vom Benutzer zum Domänenadministrator in 60 Sekunden: : CVE-2021-42278/CVE-2021-42287 In diesem Beitrag beschreibe… https://t.co/J7o6NyDfdP https://twitter.com/i/web/status/1479095243123281924ThorstenHenning
2022-01-06 11:30:09CVE-2021-42278 and CVE-2021-42287 Exploits are Shared #Exploit #darkweb https://t.co/XS8aEXb2Fecyberguideme
2022-01-06 08:50:04From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/SPMK9Fc5X4 https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondsSecnewsbytes
2022-01-06 03:30:18.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/IlHg6RR5pr https://twitter.com/i/web/status/1478929422912831491mdfaridulalam
2022-01-06 02:20:35.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/wzYzGFxkkk https://twitter.com/i/web/status/1478912037480771587gabrielauyong
2022-01-06 00:10:31#FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analys… https://t.co/fRQTRr24Il https://twitter.com/i/web/status/1478879238438764544FortiGuardLabs
2022-01-05 21:30:04From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/2KI7a328cZ https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondsaxcheron
2022-01-05 19:10:10From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/btn7cRC6Mg https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondsWhitehead4Jeff
2022-01-04 23:00:23On tonight's #AttackOnTuesday, we're going after a domain controller, using the noPAC CVE-2021-42287/CVE-2021-42278… https://t.co/mCL4Whhwde https://twitter.com/i/web/status/1478499506186440705mttaggart
2022-01-04 10:10:05CVE-2021-42287/CVE-2021-42278 Weaponisation、T... 这就是今日安全热帖! https://t.co/khbQmSYHkj https://t.co/jz8y5A4Gmn https://ift.tt/3HDayyr https://ift.tt/3FVDgtEbuaqbot
2022-01-04 07:10:34I've just finished the 'CVE-2021-42287/CVE-2021-42278 Weaponisation' blog post done by @exploitph the blog was high… https://t.co/UwpRCmuJJ8 https://twitter.com/i/web/status/1478261116316880898Nimrodinger1
2022-01-01 07:40:14All computer accounts usually have a trailing $ in their sAMAccountName attribute. CVE-2021-42278 can be leveraged… https://t.co/ebPrqeWcPd https://twitter.com/i/web/status/1477180473097007112CswWorks
2021-12-31 10:30:22@redteamlounge CVE-2021-42278 and Log4Shell were the worst. I am not sure which one is worse tho lold4rckh
2021-12-30 23:30:54@cyb3rops Can we talk about noPac tho ? (CVE-2021-42278 and CVE-2021-42287) It's crazy how it's not getting the exposure it needs !meriem_laroui
2021-12-29 17:00:06Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio… https://t.co/5DmdVlPIFB https://twitter.com/i/web/status/1476235470862307328AEtchegoncelay
2021-12-29 09:28:02域内提权漏洞CVE-2021-42287与CVE-2021-42278原理分析 https://t.co/6W5383REnB https://t.co/nXBGyHwOSA https://ift.tt/3ED2prV https://ift.tt/3pANyK3buaqbot
2021-12-28 09:00:122 @Microsoft Active Directory Bugs: CVE-2021-42287 & CVE-2021-42278, can be chained to gain privileges that lead to… https://t.co/vDhsHbyjTM https://twitter.com/i/web/status/1475751544163295235CswWorks
2021-12-27 08:40:42Windows AD privilege escalation #PrivilegeEscalation #CVE-2021-42278 #Scanning #Exploitation #Windows #Hacking #AD… https://t.co/3I2lCwu3si https://twitter.com/i/web/status/1475384865562447874steiner254
2021-12-26 18:40:33🔹 این باگ‌ها که دارای شناسه‌های CVE-2021-42287 و CVE-2021-42278 هستند، توسط اندرو بارلت (Andrew Bartlett) از شرکت ک… https://t.co/02Amu22zsp https://twitter.com/i/web/status/1475172092035452932semcert
2021-12-25 17:50:07CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/MmBtGbvmI0 https://twitter.com/i/web/status/1474799254099083272ksg93rd
2021-12-25 16:02:27CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/kqu93SbBiU #InfoSec #CyberSecurity #Security #Microsoft… https://t.co/rwKvSE5h1Q https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html https://twitter.com/i/web/status/1474771426494267396s3xcur1ty
2021-12-23 20:40:10Hoy en #CiberAlertas_EcuCERT: Microsoft, para 2 vulnerabilidades, CVE-2021-42287 y CVE-2021-42278; "vulnerabilidad… https://t.co/AyRkfv8TRt https://twitter.com/i/web/status/1474115482047463437EcuCERT_EC
2021-12-23 19:26:22NEW BLOG 🚨 @elad_shamir takes a look behind the scenes of CVE-2021-42278 and CVE-2021-42287 and offers a couple of… https://t.co/m7FiH6urly https://twitter.com/i/web/status/1474096648120844292SemperisTech
2021-12-23 18:02:33Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/EA5qLV3t6q https://twitter.com/i/web/status/1474076077609959425ksg93rd
2021-12-23 15:22:42ثغره تسمح للمخترق تصعيد صلاحياته لدومين ادمن بسهوله في انظمه ويندوز CVE-2021-42287: KDC bamboozling CVE-2021-42278… https://t.co/MLWSbxAjIJ https://twitter.com/i/web/status/1474036583443705858buhaimedi
2021-12-23 15:02:56Microsoft waarschuwt dat voor de twee kwetsbaarheden ( CVE-2021-42287 / CVE-2021-42278) exploit code beschikbaar we… https://t.co/PSVizkxpJz https://twitter.com/i/web/status/1474031006743150592commandline_be
2021-12-23 11:00:18noPac - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/LHVzrhKtS0 http://github.com/Ridter/noPacpythontrending
2021-12-23 09:30:14CVE-2021-42287/CVE-2021-42278はVBScriptで実現できないか軽く調べたけどS.DS.Pを触るのにいろいろ苦労がありそうなので妥協してPowerShellで再発明したという話がな...(遠い目nknskn
2021-12-22 22:41:15HackGit noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admi… https://t.co/6D67r9B54H https://twitter.com/i/web/status/1473784443269693445hack_git
2021-12-22 18:32:02CVE-2021-42278とCVE-2021-42287 の2つを組み合わせることで、通常のドメインユーザからdomain adminに権限昇格させられる…。PoCも出てます。 / Active Directory Bugs C… https://t.co/RqSHVKvguk https://twitter.com/i/web/status/1473719815202574336wakatono
2021-12-22 17:44:28Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio (vía @hackplayers) https://t.co/b1ZovEGD9C https://buff.ly/32ePbnZlordman1982
2021-12-22 17:23:38#PatchNow KB5008102—Active Directory Security Accounts Manager hardening changes (CVE-2021-42278) KB5008380—Auth… https://t.co/tsvatgXbHg https://twitter.com/i/web/status/1473702399374151684JRCRASH
2021-12-22 16:31:14#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/ipxXXC3LHu https://twitter.com/i/web/status/1473690441732304909YourAnonRiots
2021-12-22 16:00:29⚠️ Microsoft advierte que dos vulnerabilidades reportadas recientemente (CVE-2021-42278 y CVE-2021-42287) en Active… https://t.co/fEBNonFzXr https://twitter.com/i/web/status/1473683256692416519jpcarsi
2021-12-22 15:11:07CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2021-12-22 15:00:40Компания Microsoft предупредила клиентов о двух уязвимостях повышения привилегий ( CVE-2021-42287 и CVE-2021-42278… https://t.co/WZnEp9rJ9x https://twitter.com/i/web/status/1473667492413386757infosecmedia_
2021-12-22 14:00:08Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2021-42287: 1.4M (audience size) CVE-2021-42278: 1.4M CVE-2021-442… https://t.co/aRBqxXlP5I https://twitter.com/i/web/status/1473654564939309057CVEtrends
2021-12-22 13:10:06Вышедший в свет PoC для CVE-2021-42287 и CVE-2021-42278 вызывает большую обеспокоенность у разработчиков и клиентов… https://t.co/KggkJ9KRIK https://twitter.com/i/web/status/1473641846723252228IT_news_for_all
2021-12-22 12:40:13A great blog post with some hunting ideas CVE-2021-42278 & CVE-2021-42287. @exploitph #ThreatHunting #BlueTeam… https://t.co/WubQlwuJHM https://twitter.com/i/web/status/1473632658366287883Oran_Yitzhak
2021-12-22 12:30:18#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/7XfjdAgCKl https://twitter.com/i/web/status/1473630649772822530security_wang
2021-12-22 10:30:06#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/83S112fAVz https://twitter.com/i/web/status/1473600450419064833unix_root
2021-12-22 10:20:22Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/bkJTjlP4l6 https://github.com/WazeHell/sam-the-adminp0p0pr3t
2021-12-22 09:40:09By combining CVE-2021-42278 and CVE-2021-42287 #privilegeescalation to domain administrator is possible. #Patch now… https://t.co/o787i7a8Z3 https://twitter.com/i/web/status/1473588535726952448istrosec
2021-12-22 08:30:19PoC released for CVE-2021-42278 & CVE-2021-42287 patches were released by MS in November. Could lead to domain take… https://t.co/Cze8X3qezu https://twitter.com/i/web/status/1473570248318238721sailingbikeruk
2021-12-22 08:30:17#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/9CKSwEZYsy https://twitter.com/i/web/status/1473570251463749632Swati_THN
2021-12-22 08:30:04#Microsoft warns that two recently reported #vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/mjxWmveEq2 https://twitter.com/i/web/status/1473571480550182914AntiVirusLV
2021-12-22 08:20:21Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/C4iUY9SUqS https://twitter.com/i/web/status/1473567766904983562mis_config
2021-12-22 08:10:43Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/zt0cPFZB8J https://twitter.com/i/web/status/1473566261288259588mis_config
2021-12-22 08:00:18Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/bdATOwBSgh https://twitter.com/i/web/status/1473562350900822018Osmanjohn10
2021-12-22 07:21:45"#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/8oKaqHHJCh https://twitter.com/i/web/status/1473551969386127363trip_elix
2021-12-22 07:17:45#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/8Z23f6EyXu https://twitter.com/i/web/status/1473549601525272581TheHackersNews
2021-12-22 07:16:11@TheHackersNews: #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Active…McMcgregory
2021-12-22 05:30:16今度は CVE-2021-42278 と CVE-2021-42287 か。次から次へと仕事に割り込んでくる。これも一種のDoS攻撃だなあ。kkakinuma
2021-12-21 22:11:12SAM Name impersonation. Patch now. A POC leveraging CVE-2021-42287 and CVE-2021-42278 publicly disclosed https://t.co/ijXrWXxDfS https://techcommunity.microsoft.com/t5/security-compliance-and-identity/sam-name-impersonation/ba-p/3042699rodtrent
2021-12-21 21:25:36GitHub - ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/tX3WY2EGzz https://github.com/ricardojba/noPacn0ipr0cs
2021-12-21 21:14:49Fantastic work by exploit[.]ph on their CVE-2021-42287/CVE-2021-42278 Weaponisation post. One thing I didn't see in… https://t.co/98RJrG389w https://twitter.com/i/web/status/1473399255209545736TactiKoolSec
2021-12-21 14:23:47"Tracked as CVE-2021-42287 and CVE-2021-42278, the two security errors can be chained to impersonate domain control… https://t.co/h3aPDZqMrJ https://twitter.com/i/web/status/1473295979764142081ohhara_shiojiri
2021-12-21 13:41:54#Microsoft reminding you to patch two vulnerabilities, CVE-2021-42287 and CVE-2021-42278, from its November… https://t.co/oLiFEkiaYl https://twitter.com/i/web/status/1473286646737121282LindseyOD123
2021-12-21 11:01:47CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/YH5cu5DnwR #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc0ve/cve202142287cve202142278_scanner_exploiter_fork/r_redteamsec
2021-12-21 10:51:10Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter… https://t.co/IdoIMhb1KS https://twitter.com/i/web/status/1473242228470398977AcooEdi
2021-12-21 10:51:05CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/un7VWhWBMZ https://t.co/hQHZatLZZp http://dlvr.it/SFmwKkAcooEdi
2021-12-21 10:40:08Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter https://t.co/OZTFx3P93G #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc046/powershell_net_assembly_loader_for_the/r_redteamsec
2021-12-21 07:20:14Microsoft brīdina par to, ka novembrī izlabotie caurumi CVE-2021-42287 un CVE-2021-42278 kopā ļauj iegūt Active Dir… https://t.co/A2xjVygbgC https://twitter.com/i/web/status/1473190346326691843caurumi
2021-12-21 04:24:0311月のADの脆弱性(CVE-2021-42287、CVE-2021-42278)についてMSが警告。 2つの脆弱性組み合わせると容易にドメイン奪取可能で、12/11にPoCがTwitterとGitHubで拡散とな Micros… https://t.co/T048fFsE4o https://twitter.com/i/web/status/1473136310282252291test_user_css
2021-12-20 21:51:27Windows AD privilege escalation #PrivilegeEscalation #CVE-2021-42278 #Scanning #Exploitation #Windows #Hacking #AD… https://t.co/rlXU8d6wht https://twitter.com/i/web/status/1473046336249417736NormanOre
2021-12-20 11:00:16CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/1WJhYJzdGk https://github.com/ricardojba/noPacAlexaChenowith
2021-12-20 10:10:22#Обучение От пользователя домена до прав админа: CVE-2021-42278, CVE-2021-42287... https://t.co/bAZgIFB3en https://t.co/PKZzTBTnYW https://t.me/s/it_news_for_all/37268IT_news_for_all
2021-12-20 05:01:10解析CVE-2021-42287与CVE-2021-42278 https://t.co/GyFzj1mqI2 https://t.co/JqJLmf9pwm https://ift.tt/3EbY12E https://ift.tt/3EbXYE0buaqbot
2021-12-19 15:23:41Windows AD privilege escalation #PrivilegeEscalation #CVE-2021-42278 #Scanning #Exploitation #Windows #Hacking #AD… https://t.co/IwbWFTezoE https://twitter.com/i/web/status/1472586681664434177reconshell
2021-12-19 15:13:51CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2021-12-19 12:00:54Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/UeGsADhrDl https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmln0ipr0cs
2021-12-18 15:50:06sAMAccountName spoofing (CVE-2021-42278, CVE-2021-42287) be like #log4j https://t.co/XaRaz94vcz_nwodtuhs
2021-12-18 11:00:52CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/JL8MQuAbqV https://twitter.com/i/web/status/1472158868390174727n0ipr0cs
2021-12-18 09:20:14Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/19UL9qdpMt https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmljcgarciagamero
2021-12-18 08:21:51動くやん!(CVE-2021-42287/CVE-2021-42278のps1 PoCnknskn
2021-12-18 02:13:32Numerous public proof-of-concept exploits reveal that the #noPac vulnerabilities (CVE-2021-42278 and CVE-2021-42287… https://t.co/vbluBbT2mp https://twitter.com/i/web/status/1472024536400891904Cyber_O51NT
2021-12-18 01:02:48Hot off the press @Secureworks blog on the noPac #vulnerability, CVE-2021-42278 and CVE-2021-42287 #noPac… https://t.co/dkaDlxU9q5 https://twitter.com/i/web/status/1472006661078495238marcellelee
2021-12-17 17:21:21Hunting Tip: A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) hunting. Looking… https://t.co/eg0nE2h9Wz https://twitter.com/i/web/status/1471892357209595909Mahdi_htm
2021-12-17 13:11:49[HackTip ⚒] A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) controlled exploit… https://t.co/3aD6t0HKuT https://twitter.com/i/web/status/1471829627765239816snovvcrash
2021-12-17 10:15:33Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/UUU95yvKQJ https://github.com/Ridter/noPacBTshell
2021-12-17 06:45:38Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/hrbqDA2dAb https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmljccall80
2021-12-17 05:50:04@LitMoose @brdpoker Especially since CVE-2021-42278 and CVE-2021-42287 would make an attack on krbtgt way easier th… https://t.co/7gDULFwGh1 https://twitter.com/i/web/status/1471719303703633924fabian_bader
2021-12-17 02:42:09Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/xXA4ob6NhM http://dlvr.it/SFX8jyhacktivos
2021-12-17 01:51:18Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/dzVlWD1mex https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmlhackplayers
2021-12-17 01:40:12Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/nxfVhT5p9s https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmlsecurity_inside
2021-12-16 19:05:01While the world is chasing #log4j, don't forget to also patch your Domain Controllers for CVE-2021-42278 which allo… https://t.co/RIMCv3F6yt https://twitter.com/i/web/status/1471552718061850631Horizon3Attack
2021-12-16 18:30:37CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2021-12-16 14:34:49cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security via… https://t.co/yS2S1pRhWW https://twitter.com/i/web/status/1471485420601024513MnkeniFrancis
2021-12-16 14:12:17CVE-2021-42287/CVE-2021-42278 #Scanner & #Exploiter #CTI #DFIR #IncidentResponse https://t.co/OaHs13LcHW #DFIR #IncidentResponse https://github.com/ricardojba/noPacAcademicoCert
2021-12-16 14:02:02cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security https://t.co/RAnxlsM2oY https://github.com/cube0x0/noPaccybersecboardrm
2021-12-16 13:22:06CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/cPrLXgylOU #infosec… https://t.co/JhJ5hgI985 https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/ https://twitter.com/i/web/status/1471467908496650242beingsheerazali
2021-12-16 13:21:17GitHub – ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rGKpKU9L4Y https://aeternusmalus.wordpress.com/2021/12/16/github-ricardojba-nopac-cve-2021-42287-cve-2021-42278-scanner-exploiter/d34dr4bbit
2021-12-16 13:01:05CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/Amqp0qSrru https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/Dinosn
2021-12-16 13:00:31CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. via /r/netsec… https://t.co/KZ3gfEnqeb https://twitter.com/i/web/status/1471465019632144385CybrXx0
2021-12-16 12:50:16New post: "CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements." https://t.co/zmt4Udie8G https://ift.tt/3IUBIlKMyinfosecfeed
2021-12-16 12:20:50CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/ewQnMS8Seb https://github.com/ricardojba/noPac_r_netsec
2021-12-16 12:20:25CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/A42eDnKGLx #infosec… https://t.co/DnHl11f9CQ https://github.com/ricardojba/noPac https://twitter.com/i/web/status/1471454258780250113beingsheerazali
2021-12-16 10:50:32Pachine - Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation) https://t.co/ovz1cP8cN5 http://github.com/ly4k/Pachinepythontrending
2021-12-15 23:31:48CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/sgNKSizo52 #Pentesting #CVE #Exploit… https://t.co/MR9zqYrGN9 https://github.com/cube0x0/noPac https://twitter.com/i/web/status/1471260965408813063ptracesecurity
2021-12-15 21:10:21eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlSecurityblog
2021-12-15 13:24:52@Oran_Yitzhak Don't see that it includes the noPac vulns (CVE-2021-42287 and CVE-2021-42278) 😒. I guess let's wait for exploit Wednesday.MalFuzzer
2021-12-15 11:14:57CVE-2021-42278 - Microsoft / Windows - Privilege escalation - https://t.co/wPb4fHn1TT #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42278-microsoft-windows-privilege-escalation/RedPacketSec
2021-12-15 08:18:35HackGit Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows… https://t.co/VG3t6z0ZOo https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1471029593964433411hack_git
2021-12-15 04:23:49#Red_Team_Tactics Exploiting CVE-2021-42278/CVE-2021-42287 to impersonate DA from standard domain user https://t.co/kwSWpWEoyj https://github.com/WazeHell/sam-the-adminksg93rd
2021-12-15 02:22:25Writing profiling logic for CVE-2021-42287/CVE-2021-42278 weaponization…This one is interesting! See below for sign… https://t.co/rXwO4NpeRl https://twitter.com/i/web/status/1470939648474157062MongolCyber
2021-12-14 23:11:44📦 noPac ⭐ 791 (+121) 🗒 C# CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/XkZidi1GMe https://github.com/cube0x0/noPacgh_trending_
2021-12-14 22:26:48📦 sam-the-admin 👤 @safe_buffer ⭐ 377 (+135) 🗒 Python Exploiting CVE-2021-42278 and CVE-2021-42287 t... https://t.co/gOlU99CHzn https://github.com/WazeHell/sam-the-admingh_trending_
2021-12-14 22:01:02Varsel! 🟡KRITIKALITET: Øget risiko (Gul)🟡 CVE-2021-42278 og CVE-2021-42287 "Sam-the-admin" scriptet kan udnytte s… https://t.co/JKexv3yMas https://twitter.com/i/web/status/1470871803690205190DCIS_SUND
2021-12-14 15:55:30GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/4xlNM3fbyb https://twitter.com/i/web/status/1470781855112826888NeobeePaul
2021-12-14 15:19:09CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2021-12-14 13:53:51To all my hard at work cyber defenders, do not neglect #CVE-2021-42278 and #CVE-2021-42287, patch your domain controllers.zertux6
2021-12-14 12:01:08CVE-2021-42278 and CVE-2021-42287 critical for domain controllers, exploits POC. Please follow MS Guidance https://t.co/20MZwAoiSl https://support.microsoft.com/en-us/topic/kb5008380-authentication-updates-cve-2021-42287-9dafac11-e0d0-4cb8-959a-143bd0201041driekdesmet
2021-12-14 11:44:58GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rAeRBM8JnM https://github.com/cube0x0/noPacn0ipr0cs
2021-12-14 11:44:01GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/xeYs1rAAeN https://twitter.com/i/web/status/1470719503344582664n0ipr0cs
2021-12-14 11:40:26Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/tMkU3EJoer https://github.com/WazeHell/sam-the-adminaxcheron
2021-12-14 11:32:14sam-the-admin - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/Fn3xCTldxC http://github.com/WazeHell/sam-the-adminpythontrending
2021-12-14 10:36:29Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/DB5yRTcEOP https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/Dinosn
2021-12-14 10:35:12Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/NZa8keKRsK… https://t.co/wlXaBFfqNQ https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/ https://twitter.com/i/web/status/1470701134977245193beingsheerazali
2021-12-14 10:34:37GitHub – WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/D8C9d5NpCF https://twitter.com/i/web/status/1470701262555516932d34dr4bbit
2021-12-14 08:20:27Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/sfoLkvdTOy… https://t.co/2auz6KU8HK https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470669556242735107beingsheerazali
2021-12-14 08:20:15Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/IoJ1huptoj #infosec #pentest #bugbounty RT @_r_netsec https://github.com/ricardojba/Invoke-noPacbeingsheerazali
2021-12-14 07:50:07New post: "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user" https://t.co/0E5jAu0W59 https://ift.tt/3oSUIsRMyinfosecfeed
2021-12-14 07:20:34(CVE-2021-42287, CVE-2021-42278) gave me an easy domain compromise on this pentest. Big yikes. Patch your machines people!FreeZeroDays
2021-12-14 07:01:13In case you missed it… Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/SoAi4e8Sd1 https://twitter.com/i/web/status/14706476146181857290xdea
2021-12-14 07:00:24Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/rpxiV3SYBe https://github.com/WazeHell/sam-the-admin_r_netsec
2021-12-14 07:00:07Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user via /r/netsec… https://t.co/XvTqxCwuZk https://twitter.com/i/web/status/1470649568912150528CybrXx0
2021-12-14 05:01:34Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation) ✅ #coding #dev #developer… https://t.co/RFBRZffRqU https://twitter.com/i/web/status/1470618497659113478Python_News
2021-12-14 04:08:20@cjenks6 @Laughing_Mantis I agree. CVE-2021-42278 points to KB5007206 for the Server 2019 patch. KB5008602 appears… https://t.co/GlMTqBCY2R https://twitter.com/i/web/status/1470602776942157824Brunzwick2
2021-12-14 01:14:47“Samir on Twitter: "detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278… https://t.co/PM6g5NLzXE https://twitter.com/i/web/status/1470560620110282753waiha8
2021-12-13 23:55:55Python implementation for CVE-2021-42278. From a regular domain user to domain admin. https://t.co/KQxSxZIlsE https://github.com/ly4k/Pachinely4k_
2021-12-13 23:51:47Sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/ktXxB8oKSg #Python https://github.com/WazeHell/sam-the-adminJekiCode
2021-12-13 23:51:15https://t.co/1uYbItKuWj Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter #cybersecurity https://github.com/ricardojba/Invoke-noPacnetsecu
2021-12-13 21:52:57New post: "Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter" https://t.co/HRPRomFalt https://ift.tt/3ERTHXnMyinfosecfeed
2021-12-13 21:26:08Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/njwVfKIshz https://github.com/ricardojba/Invoke-noPac_r_netsec
2021-12-13 21:22:54Careful with sAMAccountName (CVE-2021-42278 and CVE-2021-42287) automatic exploits scripts They mostly automate so… https://t.co/3l0hNyjpPz https://twitter.com/i/web/status/1470499760419360773_nwodtuhs
2021-12-13 21:02:41Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter via /r/netsec https://t.co/QzL9LQjbuZ #cybersecurity #netsec #news https://ift.tt/3ypBdeMCybrXx0
2021-12-13 20:43:34@Laughing_Mantis Installing the patch for CVE-2021-42278 is enough to be protected, or do you also need the patch (… https://t.co/a92Br0kwJ2 https://twitter.com/i/web/status/1470489365436633101flowid3
2021-12-13 20:26:29@Jean_Maes_1994 @netbiosX @ShitSecure ah right the context is CVE-2021-42287/CVE-2021-42278BenTyson16
2021-12-13 20:08:27Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate #DomainAdmin from standard #DomainUser -… https://t.co/AGi2RfkL8k https://twitter.com/i/web/status/1470482773471375370bemre
2021-12-13 19:47:57Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/lguqR1EfaL https://github.com/Ridter/noPacnetbiosX
2021-12-13 18:55:42■■■■□ noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/IEhOoXXg8a https://twitter.com/i/web/status/1470458892597538817cKure7
2021-12-13 17:14:08While everyone is focused on #log4j Defenders really need to patch their domain controllers against CVE-2021-42278… https://t.co/q8e8JHc79x https://twitter.com/i/web/status/1470440340226252805rootsecdev
2021-12-13 16:43:04CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/fPndDqnPvn https://t.co/NtkTklnYSC https://ift.tt/3pQU9Pu https://ift.tt/3pVI6Aobuaqbot
2021-12-13 15:25:33CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2021-12-13 13:11:47Hackers weaponize CVE-2021-42287, CVE-2021-42278 to reach #ActiveDirectory domain admin rights from a standard user… https://t.co/0KeacU3zRE https://twitter.com/i/web/status/1470379966403645449SOC_Prime
2021-12-13 10:55:27Taking over AD by adding a computer and messing around with samAccountName (CVE-2021-42278)? You can find out who c… https://t.co/sPmwIi7k5G https://twitter.com/i/web/status/1470343778775056390lkarlslund
2021-12-13 00:32:13Con todo el show de #Log4shell se nos está pasando por alto el CVE-2021-42278 que permite escalar una cuenta a Doma… https://t.co/NdBlgtzVHf https://twitter.com/i/web/status/1470188707995168768ProtAAPP
2021-12-12 20:56:50PSA: #log4j & windows domain exploitation via CVE-2021-42278 If you are a windows domain shop it is VERY IMPORTAN… https://t.co/5kNJWye2Ke https://twitter.com/i/web/status/1470132752234135557Laughing_Mantis
2021-12-12 20:03:22@nas_bench what about this CVE-2021-42287/CVE-2021-42278 , people are igoning it. Easy AD adminRaoufAbderrahm1
2021-12-12 19:59:37detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278 https://t.co/xrpcK3qA2W… https://t.co/mqaOcRNMUz https://github.com/elastic/detection-rules/blob/a5359ca675267220afedf67795cd1fd04881b2c8/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml https://twitter.com/i/web/status/1470117387626291202SBousseaden
2021-12-12 18:14:11CVE-2021-42287/CVE-2021-42278 Weaponisation #log4j #Log4Shell https://t.co/jg3k7kyVna https://twitter.com/safe_buffer/status/14697426165059543230xba3ba4
2021-12-12 17:41:27You should really give CVE-2021-42278 a closer look. Easy Domain-Admin for everyone. https://t.co/vQ2aCIZ5WI… https://t.co/rz4XgJJDYA https://www.thehacker.recipes/ad/movement/kerberos/samaccountname-spoofing https://twitter.com/i/web/status/1470084831409504256NandanLohitaksh
2021-12-12 17:22:09GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/rJhTCQAeUk https://twitter.com/i/web/status/1470077137155772423akaclandestine
2021-12-12 17:21:49Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/yuDNiMIXwf https://twitter.com/i/web/status/1470078325632606213beingsheerazali
2021-12-12 15:41:50Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows #redteam Git… https://t.co/toh6ziFnDu https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470055072403005448hack_git
2021-12-12 15:34:37eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlSecurityblog
2021-12-12 15:34:25GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/AZ9PyHK14s https://github.com/cube0x0/noPacSecurityblog
2021-12-12 15:20:16NoPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/5LRYM29Nqe #C# https://github.com/cube0x0/noPacJekiCode
2021-12-12 15:13:10CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2021-12-12 12:22:35CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Ue8MKqnIQq from @exploitph https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlZ0vsky
2021-12-12 12:10:54GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. - https://t.co/SYNbWatb5n https://github.com/cube0x0/noPacmoton
2021-12-12 09:12:56You should really give CVE-2021-42278 a closer look. Easy Domain-Admin for everyone. https://t.co/foZPsElp53… https://t.co/apcjunICth https://www.thehacker.recipes/ad/movement/kerberos/samaccountname-spoofing https://twitter.com/i/web/status/1469956810543091720theluemmel
2021-12-12 09:11:43@2Obeto @zippy1981 @Microsoft Improper code is MS’s fault (CVE-2021-42287, CVE-2021-42278) Improper guidance is MS’… https://t.co/9jFnfmMv4X https://twitter.com/i/web/status/1469957286055534593_nwodtuhs
2021-12-12 08:41:30noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/8eIT0QTzeR https://twitter.com/i/web/status/1469949174812655617hack_git
2021-12-12 07:00:36#tools #Offensive_security 1. JNDI Exploit Kit https://t.co/9BMNP1RREo 2. CVE-2021-42287/CVE-2021-42278 Scanner & E… https://t.co/HqYlVmYHdO https://github.com/pimps/JNDI-Exploit-Kit https://twitter.com/i/web/status/1469924171337641985ksg93rd
2021-12-12 04:52:49log4j の件で話題が持ちきりですが、 AD 管理をしている場合は、こちらも目を通しておく必要があるかなと。 CVE-2021-42287/CVE-2021-42278 Weaponisation:… https://t.co/YZVETMwfxo https://twitter.com/i/web/status/1469889848832327680mimura1133
2021-12-12 04:01:20Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/NrzCO8aNBg https://twitter.com/i/web/status/1469875434670100480NandanLohitaksh
2021-12-12 02:00:32“CVE-2021-42287/CVE-2021-42278 Weaponisation” https://t.co/1qrYjvOp4Z https://htn.to/4nkd8PSNXGwaiha8
2021-12-11 21:11:46Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate Domain Admin from standard domain user https://t.co/T3MFmpMbHe https://github.com/WazeHell/sam-the-adminixmailsaygili
2021-12-11 20:51:55CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/wuhXIe9Cew https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlRapidSafeguard
2021-12-11 20:13:04GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/Ee3chyeFFd https://github.com/cube0x0/noPacakaclandestine
2021-12-11 20:00:52Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/QfHoaoVmLw https://twitter.com/i/web/status/1469753978166685697cube0x0
2021-12-11 19:02:57Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/u5hStleCNn https://twitter.com/i/web/status/1469742616505954323safe_buffer
2021-12-11 16:34:04CVE-2021-42278 Microsoft Active Directory Domain Services Elevation of P... https://t.co/ywCEaPG9ef Don't wait v… https://t.co/s6H1LWGyzX http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-42278 https://twitter.com/i/web/status/1469703561013514244VulmonFeeds
2021-12-10 22:12:04** CVE-2021-42278 - Name impersonation Before patch, there was no validation process to make sure computer accounts names end with an "$"_nwodtuhs
2021-12-10 22:11:42@BlackSnufkin42 Namaste, here is your unroll: So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278…… https://t.co/6Ct1CfJhCE https://twitter.com/i/web/status/1469426786165473280threadreaderapp
2021-12-10 14:52:48So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278 Weaponization - a quick & dirty way to exploit… https://t.co/0IKxwXf2l9 https://twitter.com/i/web/status/1469316932180619268snovvcrash
2021-12-10 11:33:47Please make sure you have installed patches for CVE-2021-42287 / CVE-2021-42278. Exploitation itself is trivial and… https://t.co/VHNK8I0iLi https://twitter.com/i/web/status/1469268110683344905FuzzySec
2021-12-10 04:10:05So with some help from @_EthicalChaos_ I found a way to weaponise CVE-2021-42287/CVE-2021-42278 and more help from… https://t.co/eWfQDzEVzB https://twitter.com/i/web/status/1469157138928914432exploitph
2021-11-12 22:03:22New post from https://t.co/9KYxtdZjkl (CVE-2021-42278 (windows_server_2008, windows_server_2012, windows_server_201… https://t.co/VffmOCy2N3 http://www.sesin.at https://twitter.com/i/web/status/1459277475062726656www_sesin_at
2021-11-12 22:02:21New post from https://t.co/uXvPWJy6tj (CVE-2021-42278 (windows_server_2008, windows_server_2012, windows_server_201… https://t.co/kCHQ58z48s http://www.sesin.at https://twitter.com/i/web/status/1459277508470362120WolfgangSesin
2021-11-12 19:20:17🚨 NEW: CVE-2021-42278 🚨 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique… https://t.co/ZWBTuK6M5z https://twitter.com/i/web/status/1459239457861902337threatintelctr
2021-11-10 23:11:35CVE-2021-42278 https://t.co/CWvu2CNUBf #HarsiaInfo https://har-sia.info/CVE-2021-42278.htmlHar_sia
2021-11-10 08:04:40New post from https://t.co/uXvPWJy6tj (CVE-2021-42278) has been published on https://t.co/CREbIhhsn1 http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42278/WolfgangSesin
2021-11-10 08:04:14New post from https://t.co/9KYxtdZjkl (CVE-2021-42278) has been published on https://t.co/JYgjNSbfVx http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42278/www_sesin_at
2021-11-10 08:01:29One night, CVE-2021-42278 wished upon a star, and today that wish has been granted. It now has a name, like a real,… https://t.co/VZ3B82bHtE https://twitter.com/i/web/status/1458342756951146497vulnonym
2021-11-10 01:51:38CVE-2021-42278 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE… https://t.co/AAdmV1ME2e https://twitter.com/i/web/status/1458249421297172484CVEnew
2021-11-10 01:15:07CVE-2021-42278 : Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from C… https://t.co/le70bK6UrT https://twitter.com/i/web/status/1458239501583720453CVEreport
2021-11-10 00:52:03IT Risk: Windows 7,Windows Server 2008,Windows Server 2008 R2に複数の脆弱性 -2/3 CVE-2021-42282 CVE-2021-42278 CVE-2021-42… https://t.co/qENvqHsykA https://twitter.com/i/web/status/1458233081828036611management_sun
2021-11-09 22:14:20CVE-2021-42278 Microsoft Active Directory Domain Services Elevation of Privilege Vulnerability. Exploitation Less… https://t.co/AducEmQrES https://twitter.com/i/web/status/1458193317317988360VulmonFeeds