CVSS | |
---|---|
DESCRIPTION | Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291. |
HEAT SCORE | 2776 |
DATE | TWEETS | USER |
---|---|---|
2023-04-27 13:13:11 | Microsoft CVE-2021-42278 ve CVE-2021-42287: Active Directory Domain Services Elevation of Privilege Zafiyetleri… https://t.co/tJzJctAwka https://twitter.com/i/web/status/1651569863637311496 | cozumpark |
2023-02-24 05:30:46 | 从外网 log4j2 RCE 再到内网组合拳漏洞 CVE-2021-42287、CVE-2021-42278 拿到 DC - 渗透测试中心 https://t.co/NE3biwr1zl https://t.co/FW172jueA1 https://ift.tt/PJNaeSw https://ift.tt/Y6eoIN9 | buaqbot |
2023-02-16 16:50:09 | CVE-2021-42287 Windows域内提权漏洞原理分析 https://t.co/shFTCFlJ9l https://t.co/tzmfBVptEy https://ift.tt/0oOEbuK https://ift.tt/EBaIg5F | buaqbot |
2022-12-04 14:49:48 | CVE-2021-42278、CVE-2021-42287への対応として、PacRequestorEnforcementが0は2022 年 10 月 11 日以降互換性がなくなるのか。TGTのPACに利用ユーザ情報が追加され、結果… https://t.co/lou3tbPU4o https://twitter.com/i/web/status/1599412377782743041 | number3to4 |
2022-11-04 00:03:13 | 「偵察段階を超えて、Black Basta はさまざまなエクスプロイトを通じて、ローカルおよびドメイン レベルの権限昇格を試みます。ZeroLogon (CVE-2020-1472)、NoPac (CVE-2021-42287、C… https://t.co/eOfAFc3akC https://twitter.com/i/web/status/1588319008428032000 | NobMiwa |
2022-10-20 11:00:55 | 今月から強制モードに移行したCVE-2021-42287、KB5008380について調べてるけど、毎月きちんと更新されてる環境は問題ないんだろうけど、そうじゃないとこにいきなりコレ適用したらどうなるのか、さっぱりわからん。 | wanto1101 |
2022-10-12 14:52:22 | So did MS enforce CVE-2021-42287 with yesterday’s patches? The KB article still says so, but it also mentioned that… https://t.co/znnbQxmu5M https://twitter.com/i/web/status/1580207332692176896 | qd285 |
2022-10-12 00:26:35 | 利用CVE-2021-42278和CVE-2021-42287从标准域用户模拟 DA https://t.co/zywzAEgvwj https://t.co/IHZux1bDR6 https://ift.tt/3DNgjzl https://ift.tt/3RvCt14 | buaqbot |
2022-09-12 11:20:52 | noPac : Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/KVOVKsdqEs https://twitter.com/i/web/status/1569283160789114881 | PentestingN |
2022-09-10 13:16:01 | Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2021-42278: 338.9K (audience size) CVE-2021-42287: 338.9K CVE-2019… https://t.co/kApHopHO0R https://twitter.com/i/web/status/1568585092838162436 | CVEtrends |
2022-09-10 13:14:10 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/SAwyWTNwkY https://twitter.com/i/web/status/1568526705714933761 | ZeroDayCVE |
2022-09-10 12:56:11 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/SAwyWTNwkY https://twitter.com/i/web/status/1568526705714933761 | ZeroDayCVE |
2022-09-10 12:39:47 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/SAwyWTNwkY https://twitter.com/i/web/status/1568526705714933761 | ZeroDayCVE |
2022-09-10 10:22:10 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/FWWf5NuEmo #infosec https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | r3pek |
2022-09-09 15:20:19 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/1EiwO1uBQ7 https://twitter.com/i/web/status/1568247983942283265 | KitPloit |
2022-09-09 15:02:02 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/nUoPAAvILL https://twitter.com/i/web/status/1568249080761008128 | Chahali |
2022-09-08 14:12:47 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/Ki60cWLkKF https://twitter.com/i/web/status/1567876673684779009 | ptracesecurity |
2022-09-08 14:11:53 | Emerging Vulnerability Found CVE-2021-42287 - Active Directory Domain Services Elevation of Privilege Vulnerability… https://t.co/9qWQ1LRBwb https://twitter.com/i/web/status/1567876706106544136 | ColorTokensInc |
2022-09-08 11:30:08 | noPac - Exploiting CVE-2021-42278, CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/N7otJJZOz8 https://twitter.com/i/web/status/1567836290359431169 | cackerman1 |
2022-09-07 18:20:18 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/H9DJTsCLK7 https://twitter.com/i/web/status/1567574400936955907 | 0xbadad |
2022-09-07 17:21:31 | noPac Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/JI3R62Vwxy https://twitter.com/i/web/status/1567561429678542851 | hack_git |
2022-09-07 15:32:50 | https://t.co/a1FpPLsiYP noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #cybersecurity https://professionalhackers.in/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | netsecu |
2022-09-07 13:05:54 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/JyEKVIugVr https://professionalhackers.in/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | PHackersIndia |
2022-09-07 13:00:40 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/DIFbSoDFkq http://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | Seven_Stones |
2022-09-07 12:50:52 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User – Professional Hac… https://t.co/WXaznWVVeh https://twitter.com/i/web/status/1567494754228740096 | BibsTech |
2022-09-07 10:37:40 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/AQ05rNtb1C http://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | Dinosn |
2022-09-07 10:32:03 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/y9OiPMBLoZ https://aeternusmalus.wordpress.com/2022/09/07/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | d34dr4bbit |
2022-09-07 09:30:15 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/19GohMFtSh https://twitter.com/i/web/status/1567444881961803779 | MnkeniFrancis |
2022-09-07 08:22:47 | #noPac Exploiting #CVE -2021-42278 And #CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/5b5PE9netp https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | rkx73 |
2022-09-07 03:11:16 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security https://t.co/t2OW0lO0Lq https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | Necio_news |
2022-09-07 03:01:29 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/LTfXt8xD8r https://twitter.com/i/web/status/1567345119992365056 | StanleyEpstein |
2022-09-07 02:21:32 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security v… https://t.co/N3lGiI2lGc https://twitter.com/i/web/status/1567334884506476545 | corizance |
2022-09-07 02:00:10 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #Cybersecurity #security https://t.co/zO0WMuYKCI https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | cybersecboardrm |
2022-09-06 22:25:35 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/906QgFXiHH https://twitter.com/i/web/status/1567275320486821889 | s0urc3c0d3err0r |
2022-09-06 19:47:03 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/P5BeO5O2LI https://twitter.com/i/web/status/1567231967812538368 | beingsheerazali |
2022-09-06 15:11:19 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2022-09-06 15:00:15 | Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Customary Domain User https://t.co/Dz4K2n8VQX https://un5t48l3.com/exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-customary-domain-user/ | UN5T48L3 |
2022-09-06 14:51:12 | r/t noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/66SU0goMay https://twitter.com/i/web/status/1567161214907842566 | profxeni |
2022-09-06 14:50:30 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/Z7YsWzpgc4 https://ift.tt/nzG4tBy | Asesores_Brito |
2022-09-06 14:31:30 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User | squadpirates |
2022-09-06 14:30:19 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/XWx2611bG3 https://ift.tt/rH19Vm3 | 3m1l |
2022-09-06 14:20:17 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/Sd6yTZd1uG https://twitter.com/i/web/status/1567154185807843330 | KitPloit |
2022-09-06 14:20:15 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/bUcjIcn6IZ https://twitter.com/i/web/status/1567154289591681027 | santosomar |
2022-09-06 14:20:11 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/Y8MHDFSU7m https://twitter.com/i/web/status/1567154562368258049 | Chahali |
2022-09-06 14:20:07 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/AFaYdHuMTc #Pentesting #tools https://ift.tt/vr56fPx | angelart07 |
2022-09-06 14:04:24 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/cFdqThvQSm https://twitter.com/i/web/status/1567148667877867522 | FilipiPires |
2022-09-06 13:51:07 | noPac – And CVE-2021-42287 To Impersonate DA From Standard Domain User #infosec #infosecurity #cybersecurity… https://t.co/A7LBkH1YKo https://twitter.com/i/web/status/1567147936718397440 | CyberIQs_ |
2022-09-06 13:42:27 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/vESkEDUTqB https://twitter.com/i/web/status/1567144677777760265 | oe0e0 |
2022-09-06 13:41:53 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/1uydZZfH3W https://twitter.com/i/web/status/1567144857097105408 | AcooEdi |
2022-09-06 13:22:29 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User… https://t.co/5ZyeYxmSw9 https://twitter.com/i/web/status/1567138842825658368 | buaqbot |
2022-09-06 13:10:26 | noPac – Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User https://t.co/XLbhPUnyGH https://hacker-gadgets.com/blog/2022/09/06/nopac-exploiting-cve-2021-42278-and-cve-2021-42287-to-impersonate-da-from-standard-domain-user/ | OSINT_info |
2022-09-06 12:57:45 | https://t.co/bTc2mjoiYo noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User #cybersecurity http://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-42278-and-cve.html | netsecu |
2022-09-06 12:43:27 | noPac - Exploiting CVE-2021-42278 And CVE-2021-42287 To Impersonate DA From Standard Domain User: Exploiting CVE-20… https://t.co/mpUuHKF8Wv https://twitter.com/i/web/status/1567129505508249602 | cipherstorm |
2022-08-23 20:31:18 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Dy5xo2nnd5 https://t.co/EpDiunDv3M https://ift.tt/RbhqS9n https://ift.tt/w6xT4fd | buaqbot |
2022-06-20 13:21:04 | @DebugPrivilege - password in clear as comment on LDAP - CVE-2021-42287/CVE-2021-42278 from regular user (responder/relay) | crittico |
2022-05-19 03:40:20 | CVE-2021-42287 Windows域内提权漏洞分析 https://t.co/0Ux6twuuov https://t.co/ao0iAuPRiK https://ift.tt/LxplrXA https://ift.tt/Oz4aSQb | buaqbot |
2022-05-11 06:21:46 | CVE-2021-42287 addresses a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate… https://t.co/oVyKl4uWb9 https://twitter.com/i/web/status/1524270791587766277 | OvidiuPismac |
2022-05-10 20:23:40 | eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IYhhJkeuZx https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | K3vinLuSec |
2022-04-18 19:50:24 | I'm so excited for MS's fix of CVE-2021-42287 to roll out in July. AD-connected NASs everywhere are gonna break gloriously. | hippyvanstorage |
2022-04-14 01:16:05 | https://t.co/RJ6a9f55db The Microsoft issues - CVE-2021-42287 and CVE-2021-42278 - also concern privilege escal… https://t.co/867UH3OULJ https://therecord.media/cisa-adds-google-microsoft-and-qnap-bugs-to-exploited-vulnerabilities-list/ https://twitter.com/i/web/status/1514408986040156161 | eagerbeavertech |
2022-04-12 14:50:08 | Of the 8 new Vulns that @CISAgov added to their catalog, CVE-2021-42287 & CVE-2021-42278 related to AD privilege es… https://t.co/OwVDNRBayE https://twitter.com/i/web/status/1513892134939680771 | NeedPizzaNow |
2022-04-12 10:21:28 | > 影響を受けたマシンは、ADドメインコントローラとの通信ができなくなり、ユーザのロックアウトやデータ損失が発生します Mac の AD バインド、滅ぼさねばならない🗡 CVE-2021-42287とActive Direct… https://t.co/xgzRVpD32l https://twitter.com/i/web/status/1513822582973558784 | rotomx |
2022-04-11 21:40:15 | The latest update for #CalComSoftware includes "CVE-2021-42278 SAM & CVE-2021-42287 KDC vulnerability" and "… https://t.co/ek4WDRmtMf https://twitter.com/i/web/status/1513632406116487176 | opsmatters_uk |
2022-04-06 21:30:48 | Good catch Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and we… https://t.co/9trI9l7XNE https://twitter.com/i/web/status/1511818340402032640 | SaidBisri |
2022-04-06 19:50:16 | Good catch 👌🏼 Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and w… https://t.co/UrTLArZRpB https://twitter.com/i/web/status/1511792939680288780 | 0xtornado |
2022-04-01 18:30:05 | Invoke-sAMSpoofing CVE-2021-42287/CVE-2021-42278 exploits in powershell https://t.co/28JJTNZhGq #infosec #CyberSecurity #bugbountytips https://github.com/XiaoliChan/Invoke-sAMSpoofing | Ksecureteamlab |
2022-03-29 08:15:06 | CVE-2021-42287 addresses a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate… https://t.co/zkRKv4q0bV https://twitter.com/i/web/status/1508716490970828806 | melihozhan |
2022-03-19 21:40:04 | Fully automated CVE-2021-42278 and CVE-2021-42287 (NoPac) exploit that bypasses Defender/AMSI and dumps stored cred… https://t.co/b6cJtrgKpP https://twitter.com/i/web/status/1505298000146571264 | assume_breach |
2022-03-08 18:01:59 | @TimMedin @RedSiege Any thoughts regarding the fixes that are planned for ActiveDirectory. CVE-2021-42287 and CVE-… https://t.co/xnWRE3CsIG https://twitter.com/i/web/status/1501255726416596996 | RogerBergling |
2022-03-04 13:22:04 | noPac : CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter AD Domain admin exploit https://t.co/pDiUzvZMNi https://t.co/mSdKWMHEPn https://github.com/cube0x0/noPac | brianlinux |
2022-02-28 09:10:06 | ZeroDayLab | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/7eJrTo3u9l https://bit.ly/3hqdIKM | StopMalvertisin |
2022-02-26 14:00:24 | Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-0732: 281.9K (audience size) CVE-2021-42287: 144.2K CVE-2021-… https://t.co/t54pCVMoy6 https://twitter.com/i/web/status/1497572166572851204 | CVEtrends |
2022-02-25 14:50:06 | Good reminder that since November 2021 update (in particular, KB5008380 / CVE-2021-42287), a golden ticket for a us… https://t.co/RVem6jFJIO https://twitter.com/i/web/status/1497220877548666891 | cnotin |
2022-02-14 18:30:56 | Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no longer allowed ma… https://t.co/h9gl579PTe https://twitter.com/i/web/status/1493289891467304966 | Smonroe02 |
2022-02-14 18:20:52 | HCSTechnology: Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no lo… https://t.co/D5lb59hjeN https://twitter.com/i/web/status/1493287930919534595 | Smonroe02 |
2022-02-14 18:00:52 | Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no longer allowed ma… https://t.co/rfpimRfXI8 https://twitter.com/i/web/status/1493283637894201345 | HCSTechnology |
2022-02-14 18:00:13 | Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no longer allowed ma… https://t.co/se388cV7t3 https://twitter.com/i/web/status/1493283700632690697 | ccohen |
2022-02-11 15:30:20 | Exploiting the CVE-2021-42278 (sAMAccountName spoofing) and CVE-2021-42287 (deceiving the KDC) #ActiveDirectory vu… https://t.co/9agJw29Dfq https://twitter.com/i/web/status/1492154082160783361 | Olya_moskovchen |
2022-02-02 15:21:25 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/aVZoCZSWET https://github.com/WazeHell/sam-the-admin | JacobDjWilson |
2022-01-31 07:10:04 | CVE-2021-42287 Active Directory Domain Services Elevation of Privilege Vulnerability Th...… https://t.co/zTzKKpdhcj https://twitter.com/i/web/status/1488046783305588743 | VulmonFeeds |
2022-01-27 10:32:13 | “60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287” https://t.co/YVSK5W0ln5 https://htn.to/rojsYKAi4o | waiha8 |
2022-01-27 07:44:11 | ブログ | 60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287 https://t.co/tZCdXnU9oB https://ftnt.net/6014KyZtI | FortinetJapan |
2022-01-26 17:42:07 | CVE-2021-42287 Security bypass in Kerberos PAC that allows DC impersonation. Domain account can create KDC service… https://t.co/IacUzB5apz https://twitter.com/i/web/status/1486392411555250176 | FrankMcG |
2022-01-18 07:14:33 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/lCPpRAyLMw #infosec #pentest #bugbounty @Dinosn https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | beingsheerazali |
2022-01-18 05:10:49 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Xp2LPb8zfA https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Dinosn |
2022-01-17 06:50:29 | Microsoft recently published two critical CVEs related to Active Directory (CVE-2021-42278 and CVE-2021-42287), whi… https://t.co/Nx9B0T2rzd https://twitter.com/i/web/status/1482966595915816961 | TowardsCybersec |
2022-01-14 18:40:35 | noPac Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/AfddOnyXMn https://twitter.com/i/web/status/1482058989340925956 | hack_git |
2022-01-14 15:12:05 | Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/VWCoH6YT5h https://twitter.com/i/web/status/1482006235071365123 | reverseame |
2022-01-13 13:42:38 | Adversarial #CVE Targeting - CVE-2021-42278 & CVE-2021-42287 Discussion is less about two CVEs & more about patchi… https://t.co/nxVgSaZOUg https://twitter.com/i/web/status/1481619676455223297 | y_advintel |
2022-01-13 11:53:22 | This post discusses how CVE-2021-42287 allows potential attackers to gain high privileged user access (domain contr… https://t.co/braVSgsB02 https://twitter.com/i/web/status/1481593116415172613 | Shubham_pen |
2022-01-11 21:10:32 | @DirTeamCom Two of those in three month. I'm very curious if CVE-2022-21920 is as easy to exploit as CVE-2021-42287 was | fabian_bader |
2022-01-11 09:51:51 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/61AxgCLWZ3 https://twitter.com/i/web/status/1480837463044206602 | ChrisRobertsSec |
2022-01-10 22:50:09 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/sgdIntLAjt https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.Ydy3O0DdfaM.twitter | DennisFernandes |
2022-01-10 17:41:39 | “From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs” https://t.co/F6Pucwelhl https://htn.to/4sKT8teGqE | waiha8 |
2022-01-10 17:41:08 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/RpLG1fXHd0 https://twitter.com/i/web/status/1480594127687409673 | SDCarter10 |
2022-01-10 11:30:11 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs… https://t.co/7fSFSxh91k https://twitter.com/i/web/status/1480499899355607050 | DominikGeimer |
2022-01-09 23:10:12 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2022-01-09 13:00:21 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/hznYOYVW6L https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | lalit_1985 |
2022-01-09 08:20:06 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/MWVV2kvWiS https://twitter.com/i/web/status/1480091093509234692 | Scheehan |
2022-01-07 12:40:39 | The Windows Active Directory Domain Services (AD DS) escalation vulnerability (CVE-2021-42287 and CVE-2021-42278 co… https://t.co/AwxlUFm12C https://twitter.com/i/web/status/1479431078532169729 | sunnynehrabro |
2022-01-07 12:10:25 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/3AJdxx7XQn https://twitter.com/i/web/status/1479423355476402180 | gagjunior |
2022-01-07 10:00:03 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/DVXNRpNAUj https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.YdgOc6e55fA.twitter | GeeKo0 |
2022-01-07 07:00:21 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/ufajZULr4T https://twitter.com/i/web/status/1479345987948879875 | kathleenb03 |
2022-01-06 23:53:34 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/kfVjmUjNX3 https://twitter.com/i/web/status/1479237303289761798 | W_Gartner |
2022-01-06 19:23:45 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/GwFmuoopOl… https://t.co/pEHifW78Ys https://buff.ly/3HDQZG8 https://twitter.com/i/web/status/1479168906048815104 | NcuIsao |
2022-01-06 18:54:17 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/8M0rfnPohr https://twitter.com/i/web/status/1479161583553159173 | dkBrianAndersen |
2022-01-06 14:20:08 | Vom Benutzer zum Domänenadministrator in 60 Sekunden: : CVE-2021-42278/CVE-2021-42287 In diesem Beitrag beschreibe… https://t.co/J7o6NyDfdP https://twitter.com/i/web/status/1479095243123281924 | ThorstenHenning |
2022-01-06 11:30:09 | CVE-2021-42278 and CVE-2021-42287 Exploits are Shared #Exploit #darkweb https://t.co/XS8aEXb2Fe | cyberguideme |
2022-01-06 08:50:04 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/SPMK9Fc5X4 https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | Secnewsbytes |
2022-01-06 03:30:18 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/IlHg6RR5pr https://twitter.com/i/web/status/1478929422912831491 | mdfaridulalam |
2022-01-06 02:20:35 | .@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/wzYzGFxkkk https://twitter.com/i/web/status/1478912037480771587 | gabrielauyong |
2022-01-06 00:10:31 | #FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analys… https://t.co/fRQTRr24Il https://twitter.com/i/web/status/1478879238438764544 | FortiGuardLabs |
2022-01-05 21:30:04 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/2KI7a328cZ https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | axcheron |
2022-01-05 19:10:10 | From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/btn7cRC6Mg https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds | Whitehead4Jeff |
2022-01-04 23:00:23 | On tonight's #AttackOnTuesday, we're going after a domain controller, using the noPAC CVE-2021-42287/CVE-2021-42278… https://t.co/mCL4Whhwde https://twitter.com/i/web/status/1478499506186440705 | mttaggart |
2022-01-04 10:10:05 | CVE-2021-42287/CVE-2021-42278 Weaponisation、T... 这就是今日安全热帖! https://t.co/khbQmSYHkj https://t.co/jz8y5A4Gmn https://ift.tt/3HDayyr https://ift.tt/3FVDgtE | buaqbot |
2022-01-04 07:10:34 | I've just finished the 'CVE-2021-42287/CVE-2021-42278 Weaponisation' blog post done by @exploitph the blog was high… https://t.co/UwpRCmuJJ8 https://twitter.com/i/web/status/1478261116316880898 | Nimrodinger1 |
2021-12-30 23:30:54 | @cyb3rops Can we talk about noPac tho ? (CVE-2021-42278 and CVE-2021-42287) It's crazy how it's not getting the exposure it needs ! | meriem_laroui |
2021-12-29 17:00:06 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio… https://t.co/5DmdVlPIFB https://twitter.com/i/web/status/1476235470862307328 | AEtchegoncelay |
2021-12-29 09:28:02 | 域内提权漏洞CVE-2021-42287与CVE-2021-42278原理分析 https://t.co/6W5383REnB https://t.co/nXBGyHwOSA https://ift.tt/3ED2prV https://ift.tt/3pANyK3 | buaqbot |
2021-12-29 06:21:35 | Original article on CVE-2021-42287 https://t.co/4jZho6rfTc https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | SVSoldatov |
2021-12-28 09:00:12 | 2 @Microsoft Active Directory Bugs: CVE-2021-42287 & CVE-2021-42278, can be chained to gain privileges that lead to… https://t.co/vDhsHbyjTM https://twitter.com/i/web/status/1475751544163295235 | CswWorks |
2021-12-26 18:40:33 | 🔹 این باگها که دارای شناسههای CVE-2021-42287 و CVE-2021-42278 هستند، توسط اندرو بارلت (Andrew Bartlett) از شرکت ک… https://t.co/02Amu22zsp https://twitter.com/i/web/status/1475172092035452932 | semcert |
2021-12-25 17:50:07 | CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/MmBtGbvmI0 https://twitter.com/i/web/status/1474799254099083272 | ksg93rd |
2021-12-25 16:02:27 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/kqu93SbBiU #InfoSec #CyberSecurity #Security #Microsoft… https://t.co/rwKvSE5h1Q https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html https://twitter.com/i/web/status/1474771426494267396 | s3xcur1ty |
2021-12-23 20:40:10 | Hoy en #CiberAlertas_EcuCERT: Microsoft, para 2 vulnerabilidades, CVE-2021-42287 y CVE-2021-42278; "vulnerabilidad… https://t.co/AyRkfv8TRt https://twitter.com/i/web/status/1474115482047463437 | EcuCERT_EC |
2021-12-23 19:26:22 | NEW BLOG 🚨 @elad_shamir takes a look behind the scenes of CVE-2021-42278 and CVE-2021-42287 and offers a couple of… https://t.co/m7FiH6urly https://twitter.com/i/web/status/1474096648120844292 | SemperisTech |
2021-12-23 18:02:33 | Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/EA5qLV3t6q https://twitter.com/i/web/status/1474076077609959425 | ksg93rd |
2021-12-23 15:22:42 | ثغره تسمح للمخترق تصعيد صلاحياته لدومين ادمن بسهوله في انظمه ويندوز CVE-2021-42287: KDC bamboozling CVE-2021-42278… https://t.co/MLWSbxAjIJ https://twitter.com/i/web/status/1474036583443705858 | buhaimedi |
2021-12-23 15:02:56 | Microsoft waarschuwt dat voor de twee kwetsbaarheden ( CVE-2021-42287 / CVE-2021-42278) exploit code beschikbaar we… https://t.co/PSVizkxpJz https://twitter.com/i/web/status/1474031006743150592 | commandline_be |
2021-12-23 11:00:18 | noPac - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/LHVzrhKtS0 http://github.com/Ridter/noPac | pythontrending |
2021-12-23 09:30:14 | CVE-2021-42287/CVE-2021-42278はVBScriptで実現できないか軽く調べたけどS.DS.Pを触るのにいろいろ苦労がありそうなので妥協してPowerShellで再発明したという話がな...(遠い目 | nknskn |
2021-12-22 22:41:15 | HackGit noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admi… https://t.co/6D67r9B54H https://twitter.com/i/web/status/1473784443269693445 | hack_git |
2021-12-22 18:32:02 | CVE-2021-42278とCVE-2021-42287 の2つを組み合わせることで、通常のドメインユーザからdomain adminに権限昇格させられる…。PoCも出てます。 / Active Directory Bugs C… https://t.co/RqSHVKvguk https://twitter.com/i/web/status/1473719815202574336 | wakatono |
2021-12-22 17:44:28 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio (vía @hackplayers) https://t.co/b1ZovEGD9C https://buff.ly/32ePbnZ | lordman1982 |
2021-12-22 16:31:14 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/ipxXXC3LHu https://twitter.com/i/web/status/1473690441732304909 | YourAnonRiots |
2021-12-22 16:00:29 | ⚠️ Microsoft advierte que dos vulnerabilidades reportadas recientemente (CVE-2021-42278 y CVE-2021-42287) en Active… https://t.co/fEBNonFzXr https://twitter.com/i/web/status/1473683256692416519 | jpcarsi |
2021-12-22 15:11:21 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2021-12-22 15:00:40 | Компания Microsoft предупредила клиентов о двух уязвимостях повышения привилегий ( CVE-2021-42287 и CVE-2021-42278… https://t.co/WZnEp9rJ9x https://twitter.com/i/web/status/1473667492413386757 | infosecmedia_ |
2021-12-22 14:00:08 | Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2021-42287: 1.4M (audience size) CVE-2021-42278: 1.4M CVE-2021-442… https://t.co/aRBqxXlP5I https://twitter.com/i/web/status/1473654564939309057 | CVEtrends |
2021-12-22 13:10:06 | Вышедший в свет PoC для CVE-2021-42287 и CVE-2021-42278 вызывает большую обеспокоенность у разработчиков и клиентов… https://t.co/KggkJ9KRIK https://twitter.com/i/web/status/1473641846723252228 | IT_news_for_all |
2021-12-22 12:40:13 | A great blog post with some hunting ideas CVE-2021-42278 & CVE-2021-42287. @exploitph #ThreatHunting #BlueTeam… https://t.co/WubQlwuJHM https://twitter.com/i/web/status/1473632658366287883 | Oran_Yitzhak |
2021-12-22 12:30:18 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/7XfjdAgCKl https://twitter.com/i/web/status/1473630649772822530 | security_wang |
2021-12-22 10:30:06 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/83S112fAVz https://twitter.com/i/web/status/1473600450419064833 | unix_root |
2021-12-22 10:20:22 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/bkJTjlP4l6 https://github.com/WazeHell/sam-the-admin | p0p0pr3t |
2021-12-22 10:20:12 | Microsoft a alerté ses clients sur deux vulnérabilités d' élévation de privilèges ( CVE-2021-42287 et CVE-2021-4227… https://t.co/6frInVKLvm https://twitter.com/i/web/status/1473598688454922240 | HaboubiAnis |
2021-12-22 09:40:09 | By combining CVE-2021-42278 and CVE-2021-42287 #privilegeescalation to domain administrator is possible. #Patch now… https://t.co/o787i7a8Z3 https://twitter.com/i/web/status/1473588535726952448 | istrosec |
2021-12-22 08:30:19 | PoC released for CVE-2021-42278 & CVE-2021-42287 patches were released by MS in November. Could lead to domain take… https://t.co/Cze8X3qezu https://twitter.com/i/web/status/1473570248318238721 | sailingbikeruk |
2021-12-22 08:30:17 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/9CKSwEZYsy https://twitter.com/i/web/status/1473570251463749632 | Swati_THN |
2021-12-22 08:30:04 | #Microsoft warns that two recently reported #vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/mjxWmveEq2 https://twitter.com/i/web/status/1473571480550182914 | AntiVirusLV |
2021-12-22 08:20:21 | Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/C4iUY9SUqS https://twitter.com/i/web/status/1473567766904983562 | mis_config |
2021-12-22 08:10:43 | Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/zt0cPFZB8J https://twitter.com/i/web/status/1473566261288259588 | mis_config |
2021-12-22 08:00:18 | Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/bdATOwBSgh https://twitter.com/i/web/status/1473562350900822018 | Osmanjohn10 |
2021-12-22 07:21:45 | "#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/8oKaqHHJCh https://twitter.com/i/web/status/1473551969386127363 | trip_elix |
2021-12-22 07:17:45 | #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/8Z23f6EyXu https://twitter.com/i/web/status/1473549601525272581 | TheHackersNews |
2021-12-22 07:16:11 | @TheHackersNews: #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Active… | McMcgregory |
2021-12-22 05:30:16 | 今度は CVE-2021-42278 と CVE-2021-42287 か。次から次へと仕事に割り込んでくる。これも一種のDoS攻撃だなあ。 | kkakinuma |
2021-12-21 22:11:12 | SAM Name impersonation. Patch now. A POC leveraging CVE-2021-42287 and CVE-2021-42278 publicly disclosed https://t.co/ijXrWXxDfS https://techcommunity.microsoft.com/t5/security-compliance-and-identity/sam-name-impersonation/ba-p/3042699 | rodtrent |
2021-12-21 21:25:36 | GitHub - ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/tX3WY2EGzz https://github.com/ricardojba/noPac | n0ipr0cs |
2021-12-21 21:14:49 | Fantastic work by exploit[.]ph on their CVE-2021-42287/CVE-2021-42278 Weaponisation post. One thing I didn't see in… https://t.co/98RJrG389w https://twitter.com/i/web/status/1473399255209545736 | TactiKoolSec |
2021-12-21 17:12:17 | Forwarded from @Leakinfo #Microsoft предупредила клиентов, что необходимо исправить две уязвимости CVE-2021-42287… https://t.co/C7xki9w9fw https://twitter.com/i/web/status/1473338928296042497 | gebutcher |
2021-12-21 16:14:59 | The company released security updates to address the two security vulnerabilities (tracked as CVE-2021-42287 and CV… https://t.co/Ux6F27R92Y https://twitter.com/i/web/status/1473323102817988615 | MalwarePatrol |
2021-12-21 14:23:47 | "Tracked as CVE-2021-42287 and CVE-2021-42278, the two security errors can be chained to impersonate domain control… https://t.co/h3aPDZqMrJ https://twitter.com/i/web/status/1473295979764142081 | ohhara_shiojiri |
2021-12-21 14:11:51 | Microsoft Urges Customers to Patch Recent Active Directory Vulnerab... (Securityweek) Tracked as CVE-2021-42287 an… https://t.co/Nn64eraahZ https://twitter.com/i/web/status/1473294016816975876 | InfoSec_b |
2021-12-21 13:41:54 | #Microsoft reminding you to patch two vulnerabilities, CVE-2021-42287 and CVE-2021-42278, from its November… https://t.co/oLiFEkiaYl https://twitter.com/i/web/status/1473286646737121282 | LindseyOD123 |
2021-12-21 11:01:47 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/YH5cu5DnwR #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc0ve/cve202142287cve202142278_scanner_exploiter_fork/ | r_redteamsec |
2021-12-21 10:51:10 | Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter… https://t.co/IdoIMhb1KS https://twitter.com/i/web/status/1473242228470398977 | AcooEdi |
2021-12-21 10:51:05 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/un7VWhWBMZ https://t.co/hQHZatLZZp http://dlvr.it/SFmwKk | AcooEdi |
2021-12-21 10:40:08 | Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter https://t.co/OZTFx3P93G #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc046/powershell_net_assembly_loader_for_the/ | r_redteamsec |
2021-12-21 09:01:20 | Did you apply the November patches? Cause a PoC is out . These 2 are for your DC's, CVE-2021-42287 and CVE-2021-422… https://t.co/QgOrdJCqSa https://twitter.com/i/web/status/1473214336415977480 | MSetyler |
2021-12-21 07:41:07 | During the November security update cycle, Microsoft released a patch for two new vulnerabilities, CVE-2021-42287 a… https://t.co/r9jKTPtZL0 https://twitter.com/i/web/status/1473194433596194818 | OvidiuPismac |
2021-12-21 07:20:14 | Microsoft brīdina par to, ka novembrī izlabotie caurumi CVE-2021-42287 un CVE-2021-42278 kopā ļauj iegūt Active Dir… https://t.co/A2xjVygbgC https://twitter.com/i/web/status/1473190346326691843 | caurumi |
2021-12-21 04:24:03 | 11月のADの脆弱性(CVE-2021-42287、CVE-2021-42278)についてMSが警告。 2つの脆弱性組み合わせると容易にドメイン奪取可能で、12/11にPoCがTwitterとGitHubで拡散とな Micros… https://t.co/T048fFsE4o https://twitter.com/i/web/status/1473136310282252291 | test_user_css |
2021-12-20 11:00:16 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/1WJhYJzdGk https://github.com/ricardojba/noPac | AlexaChenowith |
2021-12-20 10:10:22 | #Обучение От пользователя домена до прав админа: CVE-2021-42278, CVE-2021-42287... https://t.co/bAZgIFB3en https://t.co/PKZzTBTnYW https://t.me/s/it_news_for_all/37268 | IT_news_for_all |
2021-12-20 05:01:10 | 解析CVE-2021-42287与CVE-2021-42278 https://t.co/GyFzj1mqI2 https://t.co/JqJLmf9pwm https://ift.tt/3EbY12E https://ift.tt/3EbXYE0 | buaqbot |
2021-12-19 15:13:00 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2021-12-19 12:00:54 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/UeGsADhrDl https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | n0ipr0cs |
2021-12-18 15:50:06 | sAMAccountName spoofing (CVE-2021-42278, CVE-2021-42287) be like #log4j https://t.co/XaRaz94vcz | _nwodtuhs |
2021-12-18 11:00:52 | CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/JL8MQuAbqV https://twitter.com/i/web/status/1472158868390174727 | n0ipr0cs |
2021-12-18 09:20:14 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/19UL9qdpMt https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | jcgarciagamero |
2021-12-18 08:21:51 | 動くやん!(CVE-2021-42287/CVE-2021-42278のps1 PoC | nknskn |
2021-12-18 02:13:32 | Numerous public proof-of-concept exploits reveal that the #noPac vulnerabilities (CVE-2021-42278 and CVE-2021-42287… https://t.co/vbluBbT2mp https://twitter.com/i/web/status/1472024536400891904 | Cyber_O51NT |
2021-12-18 01:02:48 | Hot off the press @Secureworks blog on the noPac #vulnerability, CVE-2021-42278 and CVE-2021-42287 #noPac… https://t.co/dkaDlxU9q5 https://twitter.com/i/web/status/1472006661078495238 | marcellelee |
2021-12-18 00:02:29 | Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/PhJ2iuMto7 https://twitter.com/i/web/status/1471992055303966722 | ptracesecurity |
2021-12-17 17:21:21 | Hunting Tip: A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) hunting. Looking… https://t.co/eg0nE2h9Wz https://twitter.com/i/web/status/1471892357209595909 | Mahdi_htm |
2021-12-17 15:14:02 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2021-12-17 13:11:49 | [HackTip ⚒] A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) controlled exploit… https://t.co/3aD6t0HKuT https://twitter.com/i/web/status/1471829627765239816 | snovvcrash |
2021-12-17 10:15:33 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/UUU95yvKQJ https://github.com/Ridter/noPac | BTshell |
2021-12-17 06:45:38 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/hrbqDA2dAb https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | jccall80 |
2021-12-17 05:50:16 | あんまり話題になってないようだけど、ペンテスター的にはlog4jよりCVE-2021-42287の方が利用価値高い Microsoft Windows Server における権限を昇格される脆弱性 https://t.co/L8x95EsR7b https://jvndb.jvn.jp/ja/contents/2021/JVNDB-2021-004135.html | sen_u |
2021-12-17 05:50:04 | @LitMoose @brdpoker Especially since CVE-2021-42278 and CVE-2021-42287 would make an attack on krbtgt way easier th… https://t.co/7gDULFwGh1 https://twitter.com/i/web/status/1471719303703633924 | fabian_bader |
2021-12-17 02:42:09 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/xXA4ob6NhM http://dlvr.it/SFX8jy | hacktivos |
2021-12-17 01:51:18 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/dzVlWD1mex https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | hackplayers |
2021-12-17 01:40:12 | Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/nxfVhT5p9s https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.html | security_inside |
2021-12-16 18:41:11 | CVE-2021-42287のやつ、もうちょいでいい感じにまとまりそうなんだがなぁ | nknskn |
2021-12-16 14:34:49 | cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security via… https://t.co/yS2S1pRhWW https://twitter.com/i/web/status/1471485420601024513 | MnkeniFrancis |
2021-12-16 14:12:17 | CVE-2021-42287/CVE-2021-42278 #Scanner & #Exploiter #CTI #DFIR #IncidentResponse https://t.co/OaHs13LcHW #DFIR #IncidentResponse https://github.com/ricardojba/noPac | AcademicoCert |
2021-12-16 14:02:02 | cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security https://t.co/RAnxlsM2oY https://github.com/cube0x0/noPac | cybersecboardrm |
2021-12-16 13:22:06 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/cPrLXgylOU #infosec… https://t.co/JhJ5hgI985 https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/ https://twitter.com/i/web/status/1471467908496650242 | beingsheerazali |
2021-12-16 13:21:17 | GitHub – ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rGKpKU9L4Y https://aeternusmalus.wordpress.com/2021/12/16/github-ricardojba-nopac-cve-2021-42287-cve-2021-42278-scanner-exploiter/ | d34dr4bbit |
2021-12-16 13:01:05 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/Amqp0qSrru https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/ | Dinosn |
2021-12-16 13:00:31 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. via /r/netsec… https://t.co/KZ3gfEnqeb https://twitter.com/i/web/status/1471465019632144385 | CybrXx0 |
2021-12-16 12:50:16 | New post: "CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements." https://t.co/zmt4Udie8G https://ift.tt/3IUBIlK | Myinfosecfeed |
2021-12-16 12:20:50 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/ewQnMS8Seb https://github.com/ricardojba/noPac | _r_netsec |
2021-12-16 12:20:25 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/A42eDnKGLx #infosec… https://t.co/DnHl11f9CQ https://github.com/ricardojba/noPac https://twitter.com/i/web/status/1471454258780250113 | beingsheerazali |
2021-12-16 09:00:45 | @lkarlslund @kramse yeah, starting to mix things up, better get some rest ;) Was thinking of CVE-2021-42287 | martinboller |
2021-12-16 08:07:00 | 👨🏫 Buletinul CVE-2021-42287 adresează o vulnerabilitate critică în Kerberos Privilege Attribute Certificate (PAC)… https://t.co/fSXptT1jG1 https://twitter.com/i/web/status/1471387827531358210 | DNSC_RO |
2021-12-16 07:23:00 | #Security #programming #Cybersecurity360 #js #cybersecurity #linux #coding #codenewbie #analytics CVE-2021-42287/… https://t.co/TzzNmwiig3 https://twitter.com/i/web/status/1471378861938065409 | 42Sz40 |
2021-12-15 23:31:48 | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/sgNKSizo52 #Pentesting #CVE #Exploit… https://t.co/MR9zqYrGN9 https://github.com/cube0x0/noPac https://twitter.com/i/web/status/1471260965408813063 | ptracesecurity |
2021-12-15 21:10:21 | eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Securityblog |
2021-12-15 15:31:56 | Il PoC recentemente rilasciato illustra le modalità in cui sfruttare le vulnerabilità identificate CVE-2021-42287 e… https://t.co/rdxJn1dLj6 https://twitter.com/i/web/status/1471139286913359884 | trends_cyber |
2021-12-15 13:24:52 | @Oran_Yitzhak Don't see that it includes the noPac vulns (CVE-2021-42287 and CVE-2021-42278) 😒. I guess let's wait for exploit Wednesday. | MalFuzzer |
2021-12-15 11:15:55 | CVE-2021-42287 - Microsoft / Windows - Privilege escalation - https://t.co/6efSyYqpga #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-microsoft-windows-privilege-escalation/ | RedPacketSec |
2021-12-15 08:18:35 | HackGit Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows… https://t.co/VG3t6z0ZOo https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1471029593964433411 | hack_git |
2021-12-15 04:23:49 | #Red_Team_Tactics Exploiting CVE-2021-42278/CVE-2021-42287 to impersonate DA from standard domain user https://t.co/kwSWpWEoyj https://github.com/WazeHell/sam-the-admin | ksg93rd |
2021-12-15 02:22:25 | Writing profiling logic for CVE-2021-42287/CVE-2021-42278 weaponization…This one is interesting! See below for sign… https://t.co/rXwO4NpeRl https://twitter.com/i/web/status/1470939648474157062 | MongolCyber |
2021-12-14 23:11:44 | 📦 noPac ⭐ 791 (+121) 🗒 C# CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/XkZidi1GMe https://github.com/cube0x0/noPac | gh_trending_ |
2021-12-14 22:26:48 | 📦 sam-the-admin 👤 @safe_buffer ⭐ 377 (+135) 🗒 Python Exploiting CVE-2021-42278 and CVE-2021-42287 t... https://t.co/gOlU99CHzn https://github.com/WazeHell/sam-the-admin | gh_trending_ |
2021-12-14 22:01:02 | Varsel! 🟡KRITIKALITET: Øget risiko (Gul)🟡 CVE-2021-42278 og CVE-2021-42287 "Sam-the-admin" scriptet kan udnytte s… https://t.co/JKexv3yMas https://twitter.com/i/web/status/1470871803690205190 | DCIS_SUND |
2021-12-14 15:55:30 | GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/4xlNM3fbyb https://twitter.com/i/web/status/1470781855112826888 | NeobeePaul |
2021-12-14 15:17:36 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2021-12-14 13:53:51 | To all my hard at work cyber defenders, do not neglect #CVE-2021-42278 and #CVE-2021-42287, patch your domain controllers. | zertux6 |
2021-12-14 12:51:19 | CVE-2021-42287 で追加されたイベント メッセージ ID 35 , 37 と脆弱性対応の流れについて https://t.co/34EdP4ER8f https://jpwinsup.github.io/blog/2021/11/30/ActiveDirectory/Authentication/audit-events-added-in-cve-2021-42287/ | moneymog |
2021-12-14 12:36:22 | #Microsoft #ActiveDirectory: Rilasciato pubblicamente un Proof of Concept per lo sfruttamento delle CVE-2021-42287… https://t.co/nCGk4qpTvY https://twitter.com/i/web/status/1470731154810716164 | csirt_it |
2021-12-14 12:01:08 | CVE-2021-42278 and CVE-2021-42287 critical for domain controllers, exploits POC. Please follow MS Guidance https://t.co/20MZwAoiSl https://support.microsoft.com/en-us/topic/kb5008380-authentication-updates-cve-2021-42287-9dafac11-e0d0-4cb8-959a-143bd0201041 | driekdesmet |
2021-12-14 11:44:58 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rAeRBM8JnM https://github.com/cube0x0/noPac | n0ipr0cs |
2021-12-14 11:44:01 | GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/xeYs1rAAeN https://twitter.com/i/web/status/1470719503344582664 | n0ipr0cs |
2021-12-14 11:40:26 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/tMkU3EJoer https://github.com/WazeHell/sam-the-admin | axcheron |
2021-12-14 11:32:14 | sam-the-admin - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/Fn3xCTldxC http://github.com/WazeHell/sam-the-admin | pythontrending |
2021-12-14 10:36:29 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/DB5yRTcEOP https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/ | Dinosn |
2021-12-14 10:35:12 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/NZa8keKRsK… https://t.co/wlXaBFfqNQ https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/ https://twitter.com/i/web/status/1470701134977245193 | beingsheerazali |
2021-12-14 10:34:37 | GitHub – WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/D8C9d5NpCF https://twitter.com/i/web/status/1470701262555516932 | d34dr4bbit |
2021-12-14 09:43:30 | Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/2ERzvXxJKE https://twitter.com/i/web/status/1470688186548563974 | Andreagx |
2021-12-14 08:20:27 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/sfoLkvdTOy… https://t.co/2auz6KU8HK https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470669556242735107 | beingsheerazali |
2021-12-14 08:20:15 | Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/IoJ1huptoj #infosec #pentest #bugbounty RT @_r_netsec https://github.com/ricardojba/Invoke-noPac | beingsheerazali |
2021-12-14 07:50:07 | New post: "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user" https://t.co/0E5jAu0W59 https://ift.tt/3oSUIsR | Myinfosecfeed |
2021-12-14 07:20:34 | (CVE-2021-42287, CVE-2021-42278) gave me an easy domain compromise on this pentest. Big yikes. Patch your machines people! | FreeZeroDays |
2021-12-14 07:01:13 | In case you missed it… Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/SoAi4e8Sd1 https://twitter.com/i/web/status/1470647614618185729 | 0xdea |
2021-12-14 07:00:24 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/rpxiV3SYBe https://github.com/WazeHell/sam-the-admin | _r_netsec |
2021-12-14 07:00:07 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user via /r/netsec… https://t.co/XvTqxCwuZk https://twitter.com/i/web/status/1470649568912150528 | CybrXx0 |
2021-12-14 01:14:47 | “Samir on Twitter: "detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278… https://t.co/PM6g5NLzXE https://twitter.com/i/web/status/1470560620110282753 | waiha8 |
2021-12-14 00:33:47 | Log4j zum Einstieg und CVE-2021-42287 zum Domain-Admin. Weihnachten geht dieses Jahr an die Ransomware-Gangs. https://t.co/rPsa1fyUkW https://twitter.com/arekfurt/status/1470338624315326466 | nhs281 |
2021-12-13 23:51:47 | Sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/ktXxB8oKSg #Python https://github.com/WazeHell/sam-the-admin | JekiCode |
2021-12-13 23:51:15 | https://t.co/1uYbItKuWj Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter #cybersecurity https://github.com/ricardojba/Invoke-noPac | netsecu |
2021-12-13 23:13:56 | on a serious note patch your shit - CVE-2021-42287: https://t.co/A97E8aJ4KJ https://support.microsoft.com/en-us/topic/kb5008380-authentication-updates-cve-2021-42287-9dafac11-e0d0-4cb8-959a-143bd0201041 | BertieBrink |
2021-12-13 21:52:57 | New post: "Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter" https://t.co/HRPRomFalt https://ift.tt/3ERTHXn | Myinfosecfeed |
2021-12-13 21:26:08 | Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/njwVfKIshz https://github.com/ricardojba/Invoke-noPac | _r_netsec |
2021-12-13 21:22:54 | Careful with sAMAccountName (CVE-2021-42278 and CVE-2021-42287) automatic exploits scripts They mostly automate so… https://t.co/3l0hNyjpPz https://twitter.com/i/web/status/1470499760419360773 | _nwodtuhs |
2021-12-13 21:02:41 | Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter via /r/netsec https://t.co/QzL9LQjbuZ #cybersecurity #netsec #news https://ift.tt/3ypBdeM | CybrXx0 |
2021-12-13 20:26:29 | @Jean_Maes_1994 @netbiosX @ShitSecure ah right the context is CVE-2021-42287/CVE-2021-42278 | BenTyson16 |
2021-12-13 20:08:28 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate #DomainAdmin from standard #DomainUser -… https://t.co/AGi2RfkL8k https://twitter.com/i/web/status/1470482773471375370 | bemre |
2021-12-13 19:47:55 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/lguqR1EfaL https://github.com/Ridter/noPac | netbiosX |
2021-12-13 18:55:42 | ■■■■□ noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/IEhOoXXg8a https://twitter.com/i/web/status/1470458892597538817 | cKure7 |
2021-12-13 16:43:04 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/fPndDqnPvn https://t.co/NtkTklnYSC https://ift.tt/3pQU9Pu https://ift.tt/3pVI6Ao | buaqbot |
2021-12-13 16:03:51 | CVE-2021-42287、wshに移植できたりしないかなーなんて思ってブログとコードを読んでみたけど...んーできるような、できないような | nknskn |
2021-12-13 15:25:53 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2021-12-13 15:23:59 | CVE-2021-44228 + CVE-2021-42287 = Log4DomainAdmins | 0x009AD6_810 |
2021-12-13 14:50:27 | CVE-2021-42287, 42278 の件、PoC が出たみたいです: https://t.co/ZTOmGsZ5dq 2021年11月にでたパッチと下記の記事を合わせて対応を早めに進めたいところです。。 https://t.co/Skdn0PD9Js https://github.com/cube0x0/noPac https://jpwinsup.github.io/blog/2021/11/30/ActiveDirectory/Authentication/audit-events-added-in-cve-2021-42287/ | mimura1133 |
2021-12-13 14:12:16 | To detect sAMAccountName Spoofing CVE-2021-42287 [https://t.co/669zufg5Zg] look for eventId 4742 (A computer accoun… https://t.co/fjty1bfoUg https://nvd.nist.gov/vuln/detail/CVE-2021-42287 https://twitter.com/i/web/status/1470391292668559364 | VasiLisa_L_ |
2021-12-13 13:11:47 | Hackers weaponize CVE-2021-42287, CVE-2021-42278 to reach #ActiveDirectory domain admin rights from a standard user… https://t.co/0KeacU3zRE https://twitter.com/i/web/status/1470379966403645449 | SOC_Prime |
2021-12-13 10:32:27 | Also, reminder to defenders in Windows environments, you're supposed to be doing this to mitigate CVE-2021-42287. T… https://t.co/aWg7cwsnrU https://twitter.com/i/web/status/1470338624315326466 | arekfurt |
2021-12-13 10:20:29 | Oh, BTW, big thanks to the researchers who published ready-to-go exploitation for CVE-2021-42287 (AD PAC domain use… https://t.co/Tv0c3KmkuK https://twitter.com/i/web/status/1470337032576765955 | arekfurt |
2021-12-13 09:43:03 | Ransomware in an hour: CVE-2021-44228(log4j) + CVE-2021-42287(NoPac/SAMAccountName spoofing) 👀 | Cyb3rMonk |
2021-12-13 08:57:17 | Windows Active Directory: Diverse Lücken gefunden... CVE-2021-42287 und -42288 https://t.co/g8QxdyZqDL https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Bo_Datenschutz |
2021-12-13 07:26:23 | Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/o9kPio6TTs https://twitter.com/i/web/status/1470291129660854272 | Dinosn |
2021-12-13 07:22:32 | Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/QQN55mA0mS https://twitter.com/i/web/status/1470291782306910209 | beingsheerazali |
2021-12-13 03:37:59 | Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/cvtPKEywHQ https://twitter.com/i/web/status/1470232277380595712 | AcooEdi |
2021-12-13 03:21:14 | Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/8sB6pZa5QR https://twitter.com/i/web/status/1470231745698095112 | the_yellow_fall |
2021-12-12 20:03:22 | @nas_bench what about this CVE-2021-42287/CVE-2021-42278 , people are igoning it. Easy AD admin | RaoufAbderrahm1 |
2021-12-12 19:59:37 | detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278 https://t.co/xrpcK3qA2W… https://t.co/mqaOcRNMUz https://github.com/elastic/detection-rules/blob/a5359ca675267220afedf67795cd1fd04881b2c8/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml https://twitter.com/i/web/status/1470117387626291202 | SBousseaden |
2021-12-12 18:14:11 | CVE-2021-42287/CVE-2021-42278 Weaponisation #log4j #Log4Shell https://t.co/jg3k7kyVna https://twitter.com/safe_buffer/status/1469742616505954323 | 0xba3ba4 |
2021-12-12 17:22:09 | GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/rJhTCQAeUk https://twitter.com/i/web/status/1470077137155772423 | akaclandestine |
2021-12-12 17:21:49 | Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/yuDNiMIXwf https://twitter.com/i/web/status/1470078325632606213 | beingsheerazali |
2021-12-12 15:41:50 | Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows #redteam Git… https://t.co/toh6ziFnDu https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470055072403005448 | hack_git |
2021-12-12 15:34:37 | eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Securityblog |
2021-12-12 15:34:25 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/AZ9PyHK14s https://github.com/cube0x0/noPac | Securityblog |
2021-12-12 15:20:16 | NoPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/5LRYM29Nqe #C# https://github.com/cube0x0/noPac | JekiCode |
2021-12-12 15:12:40 | CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.html | Har_sia |
2021-12-12 12:22:35 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Ue8MKqnIQq from @exploitph https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Z0vsky |
2021-12-12 12:10:54 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. - https://t.co/SYNbWatb5n https://github.com/cube0x0/noPac | moton |
2021-12-12 09:11:43 | @2Obeto @zippy1981 @Microsoft Improper code is MS’s fault (CVE-2021-42287, CVE-2021-42278) Improper guidance is MS’… https://t.co/9jFnfmMv4X https://twitter.com/i/web/status/1469957286055534593 | _nwodtuhs |
2021-12-12 08:41:30 | noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/8eIT0QTzeR https://twitter.com/i/web/status/1469949174812655617 | hack_git |
2021-12-12 07:11:59 | Active Directory Privilege Escalation CVE-2021-42287 https://t.co/vUtk6l91z6 https://t.co/ozhmJkPUJ1 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | Patrilic_X |
2021-12-12 07:00:36 | #tools #Offensive_security 1. JNDI Exploit Kit https://t.co/9BMNP1RREo 2. CVE-2021-42287/CVE-2021-42278 Scanner & E… https://t.co/HqYlVmYHdO https://github.com/pimps/JNDI-Exploit-Kit https://twitter.com/i/web/status/1469924171337641985 | ksg93rd |
2021-12-12 04:52:49 | log4j の件で話題が持ちきりですが、 AD 管理をしている場合は、こちらも目を通しておく必要があるかなと。 CVE-2021-42287/CVE-2021-42278 Weaponisation:… https://t.co/YZVETMwfxo https://twitter.com/i/web/status/1469889848832327680 | mimura1133 |
2021-12-12 04:01:20 | Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/NrzCO8aNBg https://twitter.com/i/web/status/1469875434670100480 | NandanLohitaksh |
2021-12-12 02:00:32 | “CVE-2021-42287/CVE-2021-42278 Weaponisation” https://t.co/1qrYjvOp4Z https://htn.to/4nkd8PSNXG | waiha8 |
2021-12-11 21:11:46 | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate Domain Admin from standard domain user https://t.co/T3MFmpMbHe https://github.com/WazeHell/sam-the-admin | ixmailsaygili |
2021-12-11 20:51:55 | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/wuhXIe9Cew https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html | RapidSafeguard |
2021-12-11 20:13:04 | GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/Ee3chyeFFd https://github.com/cube0x0/noPac | akaclandestine |
2021-12-11 20:00:52 | Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/QfHoaoVmLw https://twitter.com/i/web/status/1469753978166685697 | cube0x0 |
2021-12-11 19:02:57 | Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/u5hStleCNn https://twitter.com/i/web/status/1469742616505954323 | safe_buffer |
2021-12-11 16:32:17 | CVE-2021-42287 Active Directory Domain Services Elevation of Privilege V... https://t.co/pfaQHWB7XM Don't wait v… https://t.co/xutZB2KF50 http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-42287 https://twitter.com/i/web/status/1469704316009201669 | VulmonFeeds |
2021-12-10 22:12:03 | ** CVE-2021-42287 - KDC bamboozling Before patch, there was a weird behavior on the KDC. When requesting a service… https://t.co/JaBKHkiReb https://twitter.com/i/web/status/1469425836818378754 | _nwodtuhs |
2021-12-10 22:11:42 | @BlackSnufkin42 Namaste, here is your unroll: So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278…… https://t.co/6Ct1CfJhCE https://twitter.com/i/web/status/1469426786165473280 | threadreaderapp |
2021-12-10 14:52:48 | So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278 Weaponization - a quick & dirty way to exploit… https://t.co/0IKxwXf2l9 https://twitter.com/i/web/status/1469316932180619268 | snovvcrash |
2021-12-10 13:24:11 | #ad #privesc #cve #pac #kerberos Разбор уязвимости CVE-2021-42287. P.S. Я правда сам еще не разобрался... Activ… https://t.co/gLEhqq3ddI https://twitter.com/i/web/status/1469295119283142659 | IT_news_for_all |
2021-12-10 11:33:47 | Please make sure you have installed patches for CVE-2021-42287 / CVE-2021-42278. Exploitation itself is trivial and… https://t.co/VHNK8I0iLi https://twitter.com/i/web/status/1469268110683344905 | FuzzySec |
2021-12-10 04:10:05 | So with some help from @_EthicalChaos_ I found a way to weaponise CVE-2021-42287/CVE-2021-42278 and more help from… https://t.co/eWfQDzEVzB https://twitter.com/i/web/status/1469157138928914432 | exploitph |
2021-11-14 16:00:14 | CVE-2021-42287 - https://t.co/X6gjQmSdjY #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-2/ | RedPacketSec |
2021-11-14 16:00:12 | CVE-2021-42287 - https://t.co/ITfQ8vyYSu #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-3/ | RedPacketSec |
2021-11-14 16:00:11 | CVE-2021-42287 - https://t.co/4GuFI7d6hr #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-4/ | RedPacketSec |
2021-11-14 16:00:08 | CVE-2021-42287 - https://t.co/GRIMippypB #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-5/ | RedPacketSec |
2021-11-13 16:01:07 | CVE-2021-42287 - https://t.co/zD7BkjQs80 #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287/ | RedPacketSec |
2021-11-13 07:20:18 | New post from https://t.co/uXvPWJy6tj (CVE-2021-42287 (windows_server, windows_server_2008, windows_server_2012, wi… https://t.co/Zaw1eluxUU http://www.sesin.at https://twitter.com/i/web/status/1459417088842469379 | WolfgangSesin |
2021-11-13 07:20:12 | New post from https://t.co/9KYxtdZjkl (CVE-2021-42287 (windows_server, windows_server_2008, windows_server_2012, wi… https://t.co/IE4wsUCVTT http://www.sesin.at https://twitter.com/i/web/status/1459417132886896640 | www_sesin_at |
2021-11-13 04:51:02 | 🚨 NEW: CVE-2021-42287 🚨 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique… https://t.co/6csZ4qMysA https://twitter.com/i/web/status/1459382906674106374 | threatintelctr |
2021-11-11 01:30:07 | Watch out for current AD patch KB5008380/CVE-2021-42287. Kerberos delegation seems to be broken. Azure App Proxy SS… https://t.co/IB1bPgUj8B https://twitter.com/i/web/status/1458607124276154368 | RyanLNewington |
2021-11-10 08:36:37 | New post from https://t.co/9KYxtdZjkl (CVE-2021-42287) has been published on https://t.co/Xu4SXQf5PB http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42287/ | www_sesin_at |
2021-11-10 08:36:20 | New post from https://t.co/uXvPWJy6tj (CVE-2021-42287) has been published on https://t.co/OJrnFSJmPn http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42287/ | WolfgangSesin |
2021-11-10 07:52:23 | CVE-2021-42287 shall henceforth be named Ravishing Grasshopper https://t.co/LjOXofhbZN https://nvd.nist.gov/vuln/detail/CVE-2021-42287 | vulnonym |
2021-11-10 07:51:28 | "Active Directory Domain Services Elevation of Privilege Vulnerability. CVE-2021-42287 is unique from CVE-2021-4227… https://t.co/zt7fRihcI6 https://twitter.com/i/web/status/1458339928350334978 | circl_lu |
2021-11-10 06:40:04 | CVE-2021-42287 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CV… https://t.co/55vFQYlMbj https://twitter.com/i/web/status/1458323440910413826 | VulmonFeeds |
2021-11-10 01:51:33 | CVE-2021-42287 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE… https://t.co/6AlsJGnio1 https://twitter.com/i/web/status/1458249425046888450 | CVEnew |
2021-11-10 01:37:38 | @EurekaBerry CVE-2021-42287 not 42297 | attritionorg |
2021-11-10 01:11:35 | CVE-2021-42287 : Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from C… https://t.co/JaP7zG18yt https://twitter.com/i/web/status/1458240091852267525 | CVEreport |
2021-11-10 00:10:56 | IT Risk: https://t.co/y7kHxT5e6t月例アップデート2021年11月 -2/5 CVE-2021-42291 CVE-2021-42288 CVE-2021-42287 CVE-2021-42286 C… https://t.co/bmCaQ6dnAi http://Microsoft.Windows https://twitter.com/i/web/status/1458224857242423296 | management_sun |
2021-11-10 00:10:27 | IT Risk: https://t.co/y7kHxT5e6t月例アップデート2021年11月 -2/4 CVE-2021-42291 CVE-2021-42288 CVE-2021-42287 CVE-2021-42286 C… https://t.co/6FmDfjDjbm http://Microsoft.Windows https://twitter.com/i/web/status/1458225298940391424 | management_sun |
2021-11-09 23:50:08 | CVE-2021-42287 is worth paying attention is - if you install this patch on some domain controllers but not all, in… https://t.co/YHrQks3K4X https://twitter.com/i/web/status/1458220220376616960 | GossiTheDog |