CVE STALKER

CVE-2021-42287

CVSS
DESCRIPTIONActive Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291.
HEAT SCORE2623

WORDS

TWEETS

DATE TWEETS USER
2022-06-20 13:21:04@DebugPrivilege - password in clear as comment on LDAP - CVE-2021-42287/CVE-2021-42278 from regular user (responder/relay)crittico
2022-05-19 03:40:20CVE-2021-42287 Windows域内提权漏洞分析 https://t.co/0Ux6twuuov https://t.co/ao0iAuPRiK https://ift.tt/LxplrXA https://ift.tt/Oz4aSQbbuaqbot
2022-05-11 06:21:46CVE-2021-42287 addresses a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate… https://t.co/oVyKl4uWb9 https://twitter.com/i/web/status/1524270791587766277OvidiuPismac
2022-05-10 20:23:40eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IYhhJkeuZx https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlK3vinLuSec
2022-04-18 19:50:24I'm so excited for MS's fix of CVE-2021-42287 to roll out in July. AD-connected NASs everywhere are gonna break gloriously.hippyvanstorage
2022-04-14 01:16:05https://t.co/RJ6a9f55db The Microsoft issues - CVE-2021-42287 and CVE-2021-42278 - also concern privilege escal… https://t.co/867UH3OULJ https://therecord.media/cisa-adds-google-microsoft-and-qnap-bugs-to-exploited-vulnerabilities-list/ https://twitter.com/i/web/status/1514408986040156161eagerbeavertech
2022-04-12 14:50:08Of the 8 new Vulns that @CISAgov added to their catalog, CVE-2021-42287 & CVE-2021-42278 related to AD privilege es… https://t.co/OwVDNRBayE https://twitter.com/i/web/status/1513892134939680771NeedPizzaNow
2022-04-12 10:21:28> 影響を受けたマシンは、ADドメインコントローラとの通信ができなくなり、ユーザのロックアウトやデータ損失が発生します Mac の AD バインド、滅ぼさねばならない🗡 CVE-2021-42287とActive Direct… https://t.co/xgzRVpD32l https://twitter.com/i/web/status/1513822582973558784rotomx
2022-04-11 21:40:15The latest update for #CalComSoftware includes "CVE-2021-42278 SAM & CVE-2021-42287 KDC vulnerability" and "… https://t.co/ek4WDRmtMf https://twitter.com/i/web/status/1513632406116487176opsmatters_uk
2022-04-06 21:30:48Good catch Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and we… https://t.co/9trI9l7XNE https://twitter.com/i/web/status/1511818340402032640SaidBisri
2022-04-06 19:50:16Good catch 👌🏼 Btw, Conti are actively exploiting CVE-2021-42278 and CVE-2021-42287 for privilege escalation, and w… https://t.co/UrTLArZRpB https://twitter.com/i/web/status/15117929396802887800xtornado
2022-04-01 18:30:05Invoke-sAMSpoofing CVE-2021-42287/CVE-2021-42278 exploits in powershell https://t.co/28JJTNZhGq #infosec #CyberSecurity #bugbountytips https://github.com/XiaoliChan/Invoke-sAMSpoofingKsecureteamlab
2022-03-29 08:15:06CVE-2021-42287 addresses a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate… https://t.co/zkRKv4q0bV https://twitter.com/i/web/status/1508716490970828806melihozhan
2022-03-19 21:40:04Fully automated CVE-2021-42278 and CVE-2021-42287 (NoPac) exploit that bypasses Defender/AMSI and dumps stored cred… https://t.co/b6cJtrgKpP https://twitter.com/i/web/status/1505298000146571264assume_breach
2022-03-08 18:01:59@TimMedin @RedSiege Any thoughts regarding the fixes that are planned for ActiveDirectory. CVE-2021-42287 and CVE-… https://t.co/xnWRE3CsIG https://twitter.com/i/web/status/1501255726416596996RogerBergling
2022-03-04 13:22:04noPac : CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter AD Domain admin exploit https://t.co/pDiUzvZMNi https://t.co/mSdKWMHEPn https://github.com/cube0x0/noPacbrianlinux
2022-02-28 09:10:06ZeroDayLab | CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/7eJrTo3u9l https://bit.ly/3hqdIKMStopMalvertisin
2022-02-26 14:00:24Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2022-0732: 281.9K (audience size) CVE-2021-42287: 144.2K CVE-2021-… https://t.co/t54pCVMoy6 https://twitter.com/i/web/status/1497572166572851204CVEtrends
2022-02-25 14:50:06Good reminder that since November 2021 update (in particular, KB5008380 / CVE-2021-42287), a golden ticket for a us… https://t.co/RVem6jFJIO https://twitter.com/i/web/status/1497220877548666891cnotin
2022-02-14 18:30:56Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no longer allowed ma… https://t.co/h9gl579PTe https://twitter.com/i/web/status/1493289891467304966Smonroe02
2022-02-14 18:20:52HCSTechnology: Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no lo… https://t.co/D5lb59hjeN https://twitter.com/i/web/status/1493287930919534595Smonroe02
2022-02-14 18:00:52Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no longer allowed ma… https://t.co/rfpimRfXI8 https://twitter.com/i/web/status/1493283637894201345HCSTechnology
2022-02-14 18:00:13Advisory: macOS devices bound to Active Directory and CVE-2021-42287 NOTE: Remediated servers no longer allowed ma… https://t.co/se388cV7t3 https://twitter.com/i/web/status/1493283700632690697ccohen
2022-02-11 15:30:20Exploiting the CVE-2021-42278 (sAMAccountName spoofing) and CVE-2021-42287 (deceiving the KDC) #ActiveDirectory vu… https://t.co/9agJw29Dfq https://twitter.com/i/web/status/1492154082160783361Olya_moskovchen
2022-02-02 15:21:25Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/aVZoCZSWET https://github.com/WazeHell/sam-the-adminJacobDjWilson
2022-01-31 07:10:04CVE-2021-42287 Active Directory Domain Services Elevation of Privilege Vulnerability Th...… https://t.co/zTzKKpdhcj https://twitter.com/i/web/status/1488046783305588743VulmonFeeds
2022-01-27 10:32:13“60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287” https://t.co/YVSK5W0ln5 https://htn.to/rojsYKAi4owaiha8
2022-01-27 07:44:11ブログ | 60秒(以内)でユーザーからドメイン管理者に:CVE-2021-42278 / CVE-2021-42287 https://t.co/tZCdXnU9oB https://ftnt.net/6014KyZtIFortinetJapan
2022-01-26 17:42:07CVE-2021-42287 Security bypass in Kerberos PAC that allows DC impersonation. Domain account can create KDC service… https://t.co/IacUzB5apz https://twitter.com/i/web/status/1486392411555250176FrankMcG
2022-01-18 07:14:33CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/lCPpRAyLMw #infosec #pentest #bugbounty @Dinosn https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlbeingsheerazali
2022-01-18 05:10:49CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Xp2LPb8zfA https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlDinosn
2022-01-17 06:50:29Microsoft recently published two critical CVEs related to Active Directory (CVE-2021-42278 and CVE-2021-42287), whi… https://t.co/Nx9B0T2rzd https://twitter.com/i/web/status/1482966595915816961TowardsCybersec
2022-01-14 18:40:35noPac Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/AfddOnyXMn https://twitter.com/i/web/status/1482058989340925956hack_git
2022-01-14 15:12:05Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/VWCoH6YT5h https://twitter.com/i/web/status/1482006235071365123reverseame
2022-01-13 13:42:38Adversarial #CVE Targeting - CVE-2021-42278 & CVE-2021-42287 Discussion is less about two CVEs & more about patchi… https://t.co/nxVgSaZOUg https://twitter.com/i/web/status/1481619676455223297y_advintel
2022-01-13 11:53:22This post discusses how CVE-2021-42287 allows potential attackers to gain high privileged user access (domain contr… https://t.co/braVSgsB02 https://twitter.com/i/web/status/1481593116415172613Shubham_pen
2022-01-11 21:10:32@DirTeamCom Two of those in three month. I'm very curious if CVE-2022-21920 is as easy to exploit as CVE-2021-42287 wasfabian_bader
2022-01-11 09:51:51.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/61AxgCLWZ3 https://twitter.com/i/web/status/1480837463044206602ChrisRobertsSec
2022-01-10 22:50:09From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/sgdIntLAjt https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.Ydy3O0DdfaM.twitterDennisFernandes
2022-01-10 17:41:39“From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs” https://t.co/F6Pucwelhl https://htn.to/4sKT8teGqEwaiha8
2022-01-10 17:41:08.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/RpLG1fXHd0 https://twitter.com/i/web/status/1480594127687409673SDCarter10
2022-01-10 11:30:11From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs… https://t.co/7fSFSxh91k https://twitter.com/i/web/status/1480499899355607050DominikGeimer
2022-01-09 23:10:12CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.htmlHar_sia
2022-01-09 13:00:21From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/hznYOYVW6L https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondslalit_1985
2022-01-09 08:20:06.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/MWVV2kvWiS https://twitter.com/i/web/status/1480091093509234692Scheehan
2022-01-07 12:40:39The Windows Active Directory Domain Services (AD DS) escalation vulnerability (CVE-2021-42287 and CVE-2021-42278 co… https://t.co/AwxlUFm12C https://twitter.com/i/web/status/1479431078532169729sunnynehrabro
2022-01-07 12:10:25.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/3AJdxx7XQn https://twitter.com/i/web/status/1479423355476402180gagjunior
2022-01-07 10:00:03From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/DVXNRpNAUj https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds#.YdgOc6e55fA.twitterGeeKo0
2022-01-07 07:00:21.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/ufajZULr4T https://twitter.com/i/web/status/1479345987948879875kathleenb03
2022-01-06 23:53:34.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/kfVjmUjNX3 https://twitter.com/i/web/status/1479237303289761798W_Gartner
2022-01-06 19:23:45From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/GwFmuoopOl… https://t.co/pEHifW78Ys https://buff.ly/3HDQZG8 https://twitter.com/i/web/status/1479168906048815104NcuIsao
2022-01-06 18:54:17.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/8M0rfnPohr https://twitter.com/i/web/status/1479161583553159173dkBrianAndersen
2022-01-06 14:20:08Vom Benutzer zum Domänenadministrator in 60 Sekunden: : CVE-2021-42278/CVE-2021-42287 In diesem Beitrag beschreibe… https://t.co/J7o6NyDfdP https://twitter.com/i/web/status/1479095243123281924ThorstenHenning
2022-01-06 11:30:09CVE-2021-42278 and CVE-2021-42287 Exploits are Shared #Exploit #darkweb https://t.co/XS8aEXb2Fecyberguideme
2022-01-06 08:50:04From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 | FortiGuard Labs https://t.co/SPMK9Fc5X4 https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondsSecnewsbytes
2022-01-06 03:30:18.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/IlHg6RR5pr https://twitter.com/i/web/status/1478929422912831491mdfaridulalam
2022-01-06 02:20:35.@FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analy… https://t.co/wzYzGFxkkk https://twitter.com/i/web/status/1478912037480771587gabrielauyong
2022-01-06 00:10:31#FortiGuardLabs analyzes vulnerabilities in #Microsoft Active-Directory (CVE-2021-42278 and CVE-2021-42287). Analys… https://t.co/fRQTRr24Il https://twitter.com/i/web/status/1478879238438764544FortiGuardLabs
2022-01-05 21:30:04From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/2KI7a328cZ https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondsaxcheron
2022-01-05 19:10:10From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287 https://t.co/btn7cRC6Mg https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-secondsWhitehead4Jeff
2022-01-04 23:00:23On tonight's #AttackOnTuesday, we're going after a domain controller, using the noPAC CVE-2021-42287/CVE-2021-42278… https://t.co/mCL4Whhwde https://twitter.com/i/web/status/1478499506186440705mttaggart
2022-01-04 10:10:05CVE-2021-42287/CVE-2021-42278 Weaponisation、T... 这就是今日安全热帖! https://t.co/khbQmSYHkj https://t.co/jz8y5A4Gmn https://ift.tt/3HDayyr https://ift.tt/3FVDgtEbuaqbot
2022-01-04 07:10:34I've just finished the 'CVE-2021-42287/CVE-2021-42278 Weaponisation' blog post done by @exploitph the blog was high… https://t.co/UwpRCmuJJ8 https://twitter.com/i/web/status/1478261116316880898Nimrodinger1
2021-12-30 23:30:54@cyb3rops Can we talk about noPac tho ? (CVE-2021-42278 and CVE-2021-42287) It's crazy how it's not getting the exposure it needs !meriem_laroui
2021-12-29 17:00:06Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio… https://t.co/5DmdVlPIFB https://twitter.com/i/web/status/1476235470862307328AEtchegoncelay
2021-12-29 09:28:02域内提权漏洞CVE-2021-42287与CVE-2021-42278原理分析 https://t.co/6W5383REnB https://t.co/nXBGyHwOSA https://ift.tt/3ED2prV https://ift.tt/3pANyK3buaqbot
2021-12-29 06:21:35Original article on CVE-2021-42287 https://t.co/4jZho6rfTc https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlSVSoldatov
2021-12-28 09:00:122 @Microsoft Active Directory Bugs: CVE-2021-42287 & CVE-2021-42278, can be chained to gain privileges that lead to… https://t.co/vDhsHbyjTM https://twitter.com/i/web/status/1475751544163295235CswWorks
2021-12-26 18:40:33🔹 این باگ‌ها که دارای شناسه‌های CVE-2021-42287 و CVE-2021-42278 هستند، توسط اندرو بارلت (Andrew Bartlett) از شرکت ک… https://t.co/02Amu22zsp https://twitter.com/i/web/status/1475172092035452932semcert
2021-12-25 17:50:07CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/MmBtGbvmI0 https://twitter.com/i/web/status/1474799254099083272ksg93rd
2021-12-25 16:02:27CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/kqu93SbBiU #InfoSec #CyberSecurity #Security #Microsoft… https://t.co/rwKvSE5h1Q https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html https://twitter.com/i/web/status/1474771426494267396s3xcur1ty
2021-12-23 20:40:10Hoy en #CiberAlertas_EcuCERT: Microsoft, para 2 vulnerabilidades, CVE-2021-42287 y CVE-2021-42278; "vulnerabilidad… https://t.co/AyRkfv8TRt https://twitter.com/i/web/status/1474115482047463437EcuCERT_EC
2021-12-23 19:26:22NEW BLOG 🚨 @elad_shamir takes a look behind the scenes of CVE-2021-42278 and CVE-2021-42287 and offers a couple of… https://t.co/m7FiH6urly https://twitter.com/i/web/status/1474096648120844292SemperisTech
2021-12-23 18:02:33Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/EA5qLV3t6q https://twitter.com/i/web/status/1474076077609959425ksg93rd
2021-12-23 15:22:42ثغره تسمح للمخترق تصعيد صلاحياته لدومين ادمن بسهوله في انظمه ويندوز CVE-2021-42287: KDC bamboozling CVE-2021-42278… https://t.co/MLWSbxAjIJ https://twitter.com/i/web/status/1474036583443705858buhaimedi
2021-12-23 15:02:56Microsoft waarschuwt dat voor de twee kwetsbaarheden ( CVE-2021-42287 / CVE-2021-42278) exploit code beschikbaar we… https://t.co/PSVizkxpJz https://twitter.com/i/web/status/1474031006743150592commandline_be
2021-12-23 11:00:18noPac - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/LHVzrhKtS0 http://github.com/Ridter/noPacpythontrending
2021-12-23 09:30:14CVE-2021-42287/CVE-2021-42278はVBScriptで実現できないか軽く調べたけどS.DS.Pを触るのにいろいろ苦労がありそうなので妥協してPowerShellで再発明したという話がな...(遠い目nknskn
2021-12-22 22:41:15HackGit noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admi… https://t.co/6D67r9B54H https://twitter.com/i/web/status/1473784443269693445hack_git
2021-12-22 18:32:02CVE-2021-42278とCVE-2021-42287 の2つを組み合わせることで、通常のドメインユーザからdomain adminに権限昇格させられる…。PoCも出てます。 / Active Directory Bugs C… https://t.co/RqSHVKvguk https://twitter.com/i/web/status/1473719815202574336wakatono
2021-12-22 17:44:28Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio (vía @hackplayers) https://t.co/b1ZovEGD9C https://buff.ly/32ePbnZlordman1982
2021-12-22 16:31:14#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/ipxXXC3LHu https://twitter.com/i/web/status/1473690441732304909YourAnonRiots
2021-12-22 16:00:29⚠️ Microsoft advierte que dos vulnerabilidades reportadas recientemente (CVE-2021-42278 y CVE-2021-42287) en Active… https://t.co/fEBNonFzXr https://twitter.com/i/web/status/1473683256692416519jpcarsi
2021-12-22 15:11:21CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.htmlHar_sia
2021-12-22 15:00:40Компания Microsoft предупредила клиентов о двух уязвимостях повышения привилегий ( CVE-2021-42287 и CVE-2021-42278… https://t.co/WZnEp9rJ9x https://twitter.com/i/web/status/1473667492413386757infosecmedia_
2021-12-22 14:00:08Top 3 trending CVEs on Twitter Past 24 hrs: CVE-2021-42287: 1.4M (audience size) CVE-2021-42278: 1.4M CVE-2021-442… https://t.co/aRBqxXlP5I https://twitter.com/i/web/status/1473654564939309057CVEtrends
2021-12-22 13:10:06Вышедший в свет PoC для CVE-2021-42287 и CVE-2021-42278 вызывает большую обеспокоенность у разработчиков и клиентов… https://t.co/KggkJ9KRIK https://twitter.com/i/web/status/1473641846723252228IT_news_for_all
2021-12-22 12:40:13A great blog post with some hunting ideas CVE-2021-42278 & CVE-2021-42287. @exploitph #ThreatHunting #BlueTeam… https://t.co/WubQlwuJHM https://twitter.com/i/web/status/1473632658366287883Oran_Yitzhak
2021-12-22 12:30:18#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/7XfjdAgCKl https://twitter.com/i/web/status/1473630649772822530security_wang
2021-12-22 10:30:06#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/83S112fAVz https://twitter.com/i/web/status/1473600450419064833unix_root
2021-12-22 10:20:22Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/bkJTjlP4l6 https://github.com/WazeHell/sam-the-adminp0p0pr3t
2021-12-22 10:20:12Microsoft a alerté ses clients sur deux vulnérabilités d' élévation de privilèges ( CVE-2021-42287 et CVE-2021-4227… https://t.co/6frInVKLvm https://twitter.com/i/web/status/1473598688454922240HaboubiAnis
2021-12-22 09:40:09By combining CVE-2021-42278 and CVE-2021-42287 #privilegeescalation to domain administrator is possible. #Patch now… https://t.co/o787i7a8Z3 https://twitter.com/i/web/status/1473588535726952448istrosec
2021-12-22 08:30:19PoC released for CVE-2021-42278 & CVE-2021-42287 patches were released by MS in November. Could lead to domain take… https://t.co/Cze8X3qezu https://twitter.com/i/web/status/1473570248318238721sailingbikeruk
2021-12-22 08:30:17#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/9CKSwEZYsy https://twitter.com/i/web/status/1473570251463749632Swati_THN
2021-12-22 08:30:04#Microsoft warns that two recently reported #vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/mjxWmveEq2 https://twitter.com/i/web/status/1473571480550182914AntiVirusLV
2021-12-22 08:20:21Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/C4iUY9SUqS https://twitter.com/i/web/status/1473567766904983562mis_config
2021-12-22 08:10:43Sam the Admin. Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user is in the w… https://t.co/zt0cPFZB8J https://twitter.com/i/web/status/1473566261288259588mis_config
2021-12-22 08:00:18Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Acti… https://t.co/bdATOwBSgh https://twitter.com/i/web/status/1473562350900822018Osmanjohn10
2021-12-22 07:21:45"#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Ac… https://t.co/8oKaqHHJCh https://twitter.com/i/web/status/1473551969386127363trip_elix
2021-12-22 07:17:45#Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Act… https://t.co/8Z23f6EyXu https://twitter.com/i/web/status/1473549601525272581TheHackersNews
2021-12-22 07:16:11@TheHackersNews: #Microsoft warns that two recently reported vulnerabilities — tracked as CVE-2021-42278 and CVE-2021-42287 — in Active…McMcgregory
2021-12-22 05:30:16今度は CVE-2021-42278 と CVE-2021-42287 か。次から次へと仕事に割り込んでくる。これも一種のDoS攻撃だなあ。kkakinuma
2021-12-21 22:11:12SAM Name impersonation. Patch now. A POC leveraging CVE-2021-42287 and CVE-2021-42278 publicly disclosed https://t.co/ijXrWXxDfS https://techcommunity.microsoft.com/t5/security-compliance-and-identity/sam-name-impersonation/ba-p/3042699rodtrent
2021-12-21 21:25:36GitHub - ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/tX3WY2EGzz https://github.com/ricardojba/noPacn0ipr0cs
2021-12-21 21:14:49Fantastic work by exploit[.]ph on their CVE-2021-42287/CVE-2021-42278 Weaponisation post. One thing I didn't see in… https://t.co/98RJrG389w https://twitter.com/i/web/status/1473399255209545736TactiKoolSec
2021-12-21 17:12:17Forwarded from @Leakinfo ​#Microsoft предупредила клиентов, что необходимо исправить две уязвимости CVE-2021-42287… https://t.co/C7xki9w9fw https://twitter.com/i/web/status/1473338928296042497gebutcher
2021-12-21 16:14:59The company released security updates to address the two security vulnerabilities (tracked as CVE-2021-42287 and CV… https://t.co/Ux6F27R92Y https://twitter.com/i/web/status/1473323102817988615MalwarePatrol
2021-12-21 14:23:47"Tracked as CVE-2021-42287 and CVE-2021-42278, the two security errors can be chained to impersonate domain control… https://t.co/h3aPDZqMrJ https://twitter.com/i/web/status/1473295979764142081ohhara_shiojiri
2021-12-21 14:11:51Microsoft Urges Customers to Patch Recent Active Directory Vulnerab... (Securityweek) Tracked as CVE-2021-42287 an… https://t.co/Nn64eraahZ https://twitter.com/i/web/status/1473294016816975876InfoSec_b
2021-12-21 13:41:54#Microsoft reminding you to patch two vulnerabilities, CVE-2021-42287 and CVE-2021-42278, from its November… https://t.co/oLiFEkiaYl https://twitter.com/i/web/status/1473286646737121282LindseyOD123
2021-12-21 11:01:47CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/YH5cu5DnwR #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc0ve/cve202142287cve202142278_scanner_exploiter_fork/r_redteamsec
2021-12-21 10:51:10Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter… https://t.co/IdoIMhb1KS https://twitter.com/i/web/status/1473242228470398977AcooEdi
2021-12-21 10:51:05CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements https://t.co/un7VWhWBMZ https://t.co/hQHZatLZZp http://dlvr.it/SFmwKkAcooEdi
2021-12-21 10:40:08Powershell .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploiter https://t.co/OZTFx3P93G #redteamsec https://www.reddit.com/r/redteamsec/comments/rlc046/powershell_net_assembly_loader_for_the/r_redteamsec
2021-12-21 09:01:20Did you apply the November patches? Cause a PoC is out . These 2 are for your DC's, CVE-2021-42287 and CVE-2021-422… https://t.co/QgOrdJCqSa https://twitter.com/i/web/status/1473214336415977480MSetyler
2021-12-21 07:41:07During the November security update cycle, Microsoft released a patch for two new vulnerabilities, CVE-2021-42287 a… https://t.co/r9jKTPtZL0 https://twitter.com/i/web/status/1473194433596194818OvidiuPismac
2021-12-21 07:20:14Microsoft brīdina par to, ka novembrī izlabotie caurumi CVE-2021-42287 un CVE-2021-42278 kopā ļauj iegūt Active Dir… https://t.co/A2xjVygbgC https://twitter.com/i/web/status/1473190346326691843caurumi
2021-12-21 04:24:0311月のADの脆弱性(CVE-2021-42287、CVE-2021-42278)についてMSが警告。 2つの脆弱性組み合わせると容易にドメイン奪取可能で、12/11にPoCがTwitterとGitHubで拡散とな Micros… https://t.co/T048fFsE4o https://twitter.com/i/web/status/1473136310282252291test_user_css
2021-12-20 11:00:16CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/1WJhYJzdGk https://github.com/ricardojba/noPacAlexaChenowith
2021-12-20 10:10:22#Обучение От пользователя домена до прав админа: CVE-2021-42278, CVE-2021-42287... https://t.co/bAZgIFB3en https://t.co/PKZzTBTnYW https://t.me/s/it_news_for_all/37268IT_news_for_all
2021-12-20 05:01:10解析CVE-2021-42287与CVE-2021-42278 https://t.co/GyFzj1mqI2 https://t.co/JqJLmf9pwm https://ift.tt/3EbY12E https://ift.tt/3EbXYE0buaqbot
2021-12-19 15:13:00CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.htmlHar_sia
2021-12-19 12:00:54Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/UeGsADhrDl https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmln0ipr0cs
2021-12-18 15:50:06sAMAccountName spoofing (CVE-2021-42278, CVE-2021-42287) be like #log4j https://t.co/XaRaz94vcz_nwodtuhs
2021-12-18 11:00:52CVE-2021-42287 / CVE-2021-42278: impersonate DA from standard domain user Scanner and exploit in C # :… https://t.co/JL8MQuAbqV https://twitter.com/i/web/status/1472158868390174727n0ipr0cs
2021-12-18 09:20:14Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/19UL9qdpMt https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmljcgarciagamero
2021-12-18 08:21:51動くやん!(CVE-2021-42287/CVE-2021-42278のps1 PoCnknskn
2021-12-18 02:13:32Numerous public proof-of-concept exploits reveal that the #noPac vulnerabilities (CVE-2021-42278 and CVE-2021-42287… https://t.co/vbluBbT2mp https://twitter.com/i/web/status/1472024536400891904Cyber_O51NT
2021-12-18 01:02:48Hot off the press @Secureworks blog on the noPac #vulnerability, CVE-2021-42278 and CVE-2021-42287 #noPac… https://t.co/dkaDlxU9q5 https://twitter.com/i/web/status/1472006661078495238marcellelee
2021-12-18 00:02:29Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/PhJ2iuMto7 https://twitter.com/i/web/status/1471992055303966722ptracesecurity
2021-12-17 17:21:21Hunting Tip: A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) hunting. Looking… https://t.co/eg0nE2h9Wz https://twitter.com/i/web/status/1471892357209595909Mahdi_htm
2021-12-17 15:14:02CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.htmlHar_sia
2021-12-17 13:11:49[HackTip ⚒] A quick way to perform CVE-2021-42278 / CVE-2021-42287 (aka sAMAccountName Spoofing) controlled exploit… https://t.co/3aD6t0HKuT https://twitter.com/i/web/status/1471829627765239816snovvcrash
2021-12-17 10:15:33Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/UUU95yvKQJ https://github.com/Ridter/noPacBTshell
2021-12-17 06:45:38Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/hrbqDA2dAb https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmljccall80
2021-12-17 05:50:16あんまり話題になってないようだけど、ペンテスター的にはlog4jよりCVE-2021-42287の方が利用価値高い Microsoft Windows Server における権限を昇格される脆弱性 https://t.co/L8x95EsR7b https://jvndb.jvn.jp/ja/contents/2021/JVNDB-2021-004135.htmlsen_u
2021-12-17 05:50:04@LitMoose @brdpoker Especially since CVE-2021-42278 and CVE-2021-42287 would make an attack on krbtgt way easier th… https://t.co/7gDULFwGh1 https://twitter.com/i/web/status/1471719303703633924fabian_bader
2021-12-17 02:42:09Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/xXA4ob6NhM http://dlvr.it/SFX8jyhacktivos
2021-12-17 01:51:18Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/dzVlWD1mex https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmlhackplayers
2021-12-17 01:40:12Explotación de CVE-2021-42278 y CVE-2021-42287 para ownear el DA con cualquier usuario de dominio https://t.co/nxfVhT5p9s https://www.hackplayers.com/2021/12/explotacion-cve-2021-42278-y-42287.htmlsecurity_inside
2021-12-16 18:41:11CVE-2021-42287のやつ、もうちょいでいい感じにまとまりそうなんだがなぁnknskn
2021-12-16 14:34:49cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security via… https://t.co/yS2S1pRhWW https://twitter.com/i/web/status/1471485420601024513MnkeniFrancis
2021-12-16 14:12:17CVE-2021-42287/CVE-2021-42278 #Scanner & #Exploiter #CTI #DFIR #IncidentResponse https://t.co/OaHs13LcHW #DFIR #IncidentResponse https://github.com/ricardojba/noPacAcademicoCert
2021-12-16 14:02:02cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. #Cybersecurity #security https://t.co/RAnxlsM2oY https://github.com/cube0x0/noPaccybersecboardrm
2021-12-16 13:22:06CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/cPrLXgylOU #infosec… https://t.co/JhJ5hgI985 https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/ https://twitter.com/i/web/status/1471467908496650242beingsheerazali
2021-12-16 13:21:17GitHub – ricardojba/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rGKpKU9L4Y https://aeternusmalus.wordpress.com/2021/12/16/github-ricardojba-nopac-cve-2021-42287-cve-2021-42278-scanner-exploiter/d34dr4bbit
2021-12-16 13:01:05CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/Amqp0qSrru https://www.reddit.com/r/netsec/comments/rhpdci/cve202142287cve202142278_scanner_exploiter_fork/Dinosn
2021-12-16 13:00:31CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. via /r/netsec… https://t.co/KZ3gfEnqeb https://twitter.com/i/web/status/1471465019632144385CybrXx0
2021-12-16 12:50:16New post: "CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements." https://t.co/zmt4Udie8G https://ift.tt/3IUBIlKMyinfosecfeed
2021-12-16 12:20:50CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/ewQnMS8Seb https://github.com/ricardojba/noPac_r_netsec
2021-12-16 12:20:25CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter Fork with some improvements. https://t.co/A42eDnKGLx #infosec… https://t.co/DnHl11f9CQ https://github.com/ricardojba/noPac https://twitter.com/i/web/status/1471454258780250113beingsheerazali
2021-12-16 09:00:45@lkarlslund @kramse yeah, starting to mix things up, better get some rest ;) Was thinking of CVE-2021-42287martinboller
2021-12-16 08:07:00👨‍🏫 Buletinul CVE-2021-42287 adresează o vulnerabilitate critică în Kerberos Privilege Attribute Certificate (PAC)… https://t.co/fSXptT1jG1 https://twitter.com/i/web/status/1471387827531358210DNSC_RO
2021-12-16 07:23:00#Security #programming #Cybersecurity360 #js #cybersecurity #linux #coding #codenewbie #analytics CVE-2021-42287/… https://t.co/TzzNmwiig3 https://twitter.com/i/web/status/147137886193806540942Sz40
2021-12-15 23:31:48CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/sgNKSizo52 #Pentesting #CVE #Exploit… https://t.co/MR9zqYrGN9 https://github.com/cube0x0/noPac https://twitter.com/i/web/status/1471260965408813063ptracesecurity
2021-12-15 21:10:21eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlSecurityblog
2021-12-15 15:31:56Il PoC recentemente rilasciato illustra le modalità in cui sfruttare le vulnerabilità identificate CVE-2021-42287 e… https://t.co/rdxJn1dLj6 https://twitter.com/i/web/status/1471139286913359884trends_cyber
2021-12-15 13:24:52@Oran_Yitzhak Don't see that it includes the noPac vulns (CVE-2021-42287 and CVE-2021-42278) 😒. I guess let's wait for exploit Wednesday.MalFuzzer
2021-12-15 11:15:55CVE-2021-42287 - Microsoft / Windows - Privilege escalation - https://t.co/6efSyYqpga #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-microsoft-windows-privilege-escalation/RedPacketSec
2021-12-15 08:18:35HackGit Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows… https://t.co/VG3t6z0ZOo https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1471029593964433411hack_git
2021-12-15 04:23:49#Red_Team_Tactics Exploiting CVE-2021-42278/CVE-2021-42287 to impersonate DA from standard domain user https://t.co/kwSWpWEoyj https://github.com/WazeHell/sam-the-adminksg93rd
2021-12-15 02:22:25Writing profiling logic for CVE-2021-42287/CVE-2021-42278 weaponization…This one is interesting! See below for sign… https://t.co/rXwO4NpeRl https://twitter.com/i/web/status/1470939648474157062MongolCyber
2021-12-14 23:11:44📦 noPac ⭐ 791 (+121) 🗒 C# CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/XkZidi1GMe https://github.com/cube0x0/noPacgh_trending_
2021-12-14 22:26:48📦 sam-the-admin 👤 @safe_buffer ⭐ 377 (+135) 🗒 Python Exploiting CVE-2021-42278 and CVE-2021-42287 t... https://t.co/gOlU99CHzn https://github.com/WazeHell/sam-the-admingh_trending_
2021-12-14 22:01:02Varsel! 🟡KRITIKALITET: Øget risiko (Gul)🟡 CVE-2021-42278 og CVE-2021-42287 "Sam-the-admin" scriptet kan udnytte s… https://t.co/JKexv3yMas https://twitter.com/i/web/status/1470871803690205190DCIS_SUND
2021-12-14 15:55:30GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/4xlNM3fbyb https://twitter.com/i/web/status/1470781855112826888NeobeePaul
2021-12-14 15:17:36CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.htmlHar_sia
2021-12-14 13:53:51To all my hard at work cyber defenders, do not neglect #CVE-2021-42278 and #CVE-2021-42287, patch your domain controllers.zertux6
2021-12-14 12:51:19CVE-2021-42287 で追加されたイベント メッセージ ID 35 , 37 と脆弱性対応の流れについて https://t.co/34EdP4ER8f https://jpwinsup.github.io/blog/2021/11/30/ActiveDirectory/Authentication/audit-events-added-in-cve-2021-42287/moneymog
2021-12-14 12:36:22#Microsoft #ActiveDirectory: Rilasciato pubblicamente un Proof of Concept per lo sfruttamento delle CVE-2021-42287… https://t.co/nCGk4qpTvY https://twitter.com/i/web/status/1470731154810716164csirt_it
2021-12-14 12:01:08CVE-2021-42278 and CVE-2021-42287 critical for domain controllers, exploits POC. Please follow MS Guidance https://t.co/20MZwAoiSl https://support.microsoft.com/en-us/topic/kb5008380-authentication-updates-cve-2021-42287-9dafac11-e0d0-4cb8-959a-143bd0201041driekdesmet
2021-12-14 11:44:58GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/rAeRBM8JnM https://github.com/cube0x0/noPacn0ipr0cs
2021-12-14 11:44:01GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/xeYs1rAAeN https://twitter.com/i/web/status/1470719503344582664n0ipr0cs
2021-12-14 11:40:26Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/tMkU3EJoer https://github.com/WazeHell/sam-the-adminaxcheron
2021-12-14 11:32:14sam-the-admin - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/Fn3xCTldxC http://github.com/WazeHell/sam-the-adminpythontrending
2021-12-14 10:36:29Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/DB5yRTcEOP https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/Dinosn
2021-12-14 10:35:12Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/NZa8keKRsK… https://t.co/wlXaBFfqNQ https://www.reddit.com/r/netsec/comments/rg1lg5/exploiting_cve202142278_and_cve202142287_to/ https://twitter.com/i/web/status/1470701134977245193beingsheerazali
2021-12-14 10:34:37GitHub – WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/D8C9d5NpCF https://twitter.com/i/web/status/1470701262555516932d34dr4bbit
2021-12-14 09:43:30Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/2ERzvXxJKE https://twitter.com/i/web/status/1470688186548563974Andreagx
2021-12-14 08:20:27Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/sfoLkvdTOy… https://t.co/2auz6KU8HK https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470669556242735107beingsheerazali
2021-12-14 08:20:15Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/IoJ1huptoj #infosec #pentest #bugbounty RT @_r_netsec https://github.com/ricardojba/Invoke-noPacbeingsheerazali
2021-12-14 07:50:07New post: "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user" https://t.co/0E5jAu0W59 https://ift.tt/3oSUIsRMyinfosecfeed
2021-12-14 07:20:34(CVE-2021-42287, CVE-2021-42278) gave me an easy domain compromise on this pentest. Big yikes. Patch your machines people!FreeZeroDays
2021-12-14 07:01:13In case you missed it… Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user… https://t.co/SoAi4e8Sd1 https://twitter.com/i/web/status/14706476146181857290xdea
2021-12-14 07:00:24Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/rpxiV3SYBe https://github.com/WazeHell/sam-the-admin_r_netsec
2021-12-14 07:00:07Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user via /r/netsec… https://t.co/XvTqxCwuZk https://twitter.com/i/web/status/1470649568912150528CybrXx0
2021-12-14 01:14:47“Samir on Twitter: "detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278… https://t.co/PM6g5NLzXE https://twitter.com/i/web/status/1470560620110282753waiha8
2021-12-14 00:33:47Log4j zum Einstieg und CVE-2021-42287 zum Domain-Admin. Weihnachten geht dieses Jahr an die Ransomware-Gangs. https://t.co/rPsa1fyUkW https://twitter.com/arekfurt/status/1470338624315326466nhs281
2021-12-13 23:51:47Sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/ktXxB8oKSg #Python https://github.com/WazeHell/sam-the-adminJekiCode
2021-12-13 23:51:15https://t.co/1uYbItKuWj Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter #cybersecurity https://github.com/ricardojba/Invoke-noPacnetsecu
2021-12-13 23:13:56on a serious note patch your shit - CVE-2021-42287: https://t.co/A97E8aJ4KJ https://support.microsoft.com/en-us/topic/kb5008380-authentication-updates-cve-2021-42287-9dafac11-e0d0-4cb8-959a-143bd0201041BertieBrink
2021-12-13 21:52:57New post: "Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter" https://t.co/HRPRomFalt https://ift.tt/3ERTHXnMyinfosecfeed
2021-12-13 21:26:08Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter https://t.co/njwVfKIshz https://github.com/ricardojba/Invoke-noPac_r_netsec
2021-12-13 21:22:54Careful with sAMAccountName (CVE-2021-42278 and CVE-2021-42287) automatic exploits scripts They mostly automate so… https://t.co/3l0hNyjpPz https://twitter.com/i/web/status/1470499760419360773_nwodtuhs
2021-12-13 21:02:41Invoke-noPac - CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter via /r/netsec https://t.co/QzL9LQjbuZ #cybersecurity #netsec #news https://ift.tt/3ypBdeMCybrXx0
2021-12-13 20:26:29@Jean_Maes_1994 @netbiosX @ShitSecure ah right the context is CVE-2021-42287/CVE-2021-42278BenTyson16
2021-12-13 20:08:28Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate #DomainAdmin from standard #DomainUser -… https://t.co/AGi2RfkL8k https://twitter.com/i/web/status/1470482773471375370bemre
2021-12-13 19:47:55Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user https://t.co/lguqR1EfaL https://github.com/Ridter/noPacnetbiosX
2021-12-13 18:55:42■■■■□ noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/IEhOoXXg8a https://twitter.com/i/web/status/1470458892597538817cKure7
2021-12-13 16:43:04CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/fPndDqnPvn https://t.co/NtkTklnYSC https://ift.tt/3pQU9Pu https://ift.tt/3pVI6Aobuaqbot
2021-12-13 16:03:51CVE-2021-42287、wshに移植できたりしないかなーなんて思ってブログとコードを読んでみたけど...んーできるような、できないようなnknskn
2021-12-13 15:25:53CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.htmlHar_sia
2021-12-13 15:23:59CVE-2021-44228 + CVE-2021-42287 = Log4DomainAdmins0x009AD6_810
2021-12-13 14:50:27CVE-2021-42287, 42278 の件、PoC が出たみたいです: https://t.co/ZTOmGsZ5dq 2021年11月にでたパッチと下記の記事を合わせて対応を早めに進めたいところです。。 https://t.co/Skdn0PD9Js https://github.com/cube0x0/noPac https://jpwinsup.github.io/blog/2021/11/30/ActiveDirectory/Authentication/audit-events-added-in-cve-2021-42287/mimura1133
2021-12-13 14:12:16To detect sAMAccountName Spoofing CVE-2021-42287 [https://t.co/669zufg5Zg] look for eventId 4742 (A computer accoun… https://t.co/fjty1bfoUg https://nvd.nist.gov/vuln/detail/CVE-2021-42287 https://twitter.com/i/web/status/1470391292668559364VasiLisa_L_
2021-12-13 13:11:47Hackers weaponize CVE-2021-42287, CVE-2021-42278 to reach #ActiveDirectory domain admin rights from a standard user… https://t.co/0KeacU3zRE https://twitter.com/i/web/status/1470379966403645449SOC_Prime
2021-12-13 10:32:27Also, reminder to defenders in Windows environments, you're supposed to be doing this to mitigate CVE-2021-42287. T… https://t.co/aWg7cwsnrU https://twitter.com/i/web/status/1470338624315326466arekfurt
2021-12-13 10:20:29Oh, BTW, big thanks to the researchers who published ready-to-go exploitation for CVE-2021-42287 (AD PAC domain use… https://t.co/Tv0c3KmkuK https://twitter.com/i/web/status/1470337032576765955arekfurt
2021-12-13 09:43:03Ransomware in an hour: CVE-2021-44228(log4j) + CVE-2021-42287(NoPac/SAMAccountName spoofing) 👀Cyb3rMonk
2021-12-13 08:57:17Windows Active Directory: Diverse Lücken gefunden... CVE-2021-42287 und -42288 https://t.co/g8QxdyZqDL https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlBo_Datenschutz
2021-12-13 07:26:23Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/o9kPio6TTs https://twitter.com/i/web/status/1470291129660854272Dinosn
2021-12-13 07:22:32Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/QQN55mA0mS https://twitter.com/i/web/status/1470291782306910209beingsheerazali
2021-12-13 03:37:59Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/cvtPKEywHQ https://twitter.com/i/web/status/1470232277380595712AcooEdi
2021-12-13 03:21:14Researcher publishes PoC for Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2021-42287,… https://t.co/8sB6pZa5QR https://twitter.com/i/web/status/1470231745698095112the_yellow_fall
2021-12-12 20:03:22@nas_bench what about this CVE-2021-42287/CVE-2021-42278 , people are igoning it. Easy AD adminRaoufAbderrahm1
2021-12-12 19:59:37detection of exploitation of the CVE-2021-42287 (samAccountName spoofing)/CVE-2021-42278 https://t.co/xrpcK3qA2W… https://t.co/mqaOcRNMUz https://github.com/elastic/detection-rules/blob/a5359ca675267220afedf67795cd1fd04881b2c8/rules/windows/privilege_escalation_samaccountname_spoofing_attack.toml https://twitter.com/i/web/status/1470117387626291202SBousseaden
2021-12-12 18:14:11CVE-2021-42287/CVE-2021-42278 Weaponisation #log4j #Log4Shell https://t.co/jg3k7kyVna https://twitter.com/safe_buffer/status/14697426165059543230xba3ba4
2021-12-12 17:22:09GitHub - WazeHell/sam-the-admin: Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domai… https://t.co/rJhTCQAeUk https://twitter.com/i/web/status/1470077137155772423akaclandestine
2021-12-12 17:21:49Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/yuDNiMIXwf https://twitter.com/i/web/status/1470078325632606213beingsheerazali
2021-12-12 15:41:50Exploiting CVE-2021-42287/CVE-2021-42278 (Linux) https://t.co/081nTDJWpg #ad #pac #s4u2self #windows #redteam Git… https://t.co/toh6ziFnDu https://github.com/WazeHell/sam-the-admin https://twitter.com/i/web/status/1470055072403005448hack_git
2021-12-12 15:34:37eXploit – CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/IXyQXrjhH8 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlSecurityblog
2021-12-12 15:34:25GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/AZ9PyHK14s https://github.com/cube0x0/noPacSecurityblog
2021-12-12 15:20:16NoPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/5LRYM29Nqe #C# https://github.com/cube0x0/noPacJekiCode
2021-12-12 15:12:40CVE-2021-42287 https://t.co/zxiSXhTJrS #HarsiaInfo https://har-sia.info/CVE-2021-42287.htmlHar_sia
2021-12-12 12:22:35CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/Ue8MKqnIQq from @exploitph https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlZ0vsky
2021-12-12 12:10:54GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. - https://t.co/SYNbWatb5n https://github.com/cube0x0/noPacmoton
2021-12-12 09:11:43@2Obeto @zippy1981 @Microsoft Improper code is MS’s fault (CVE-2021-42287, CVE-2021-42278) Improper guidance is MS’… https://t.co/9jFnfmMv4X https://twitter.com/i/web/status/1469957286055534593_nwodtuhs
2021-12-12 08:41:30noPac CVE-2021-42287/CVE-2021-42278 #Scanner & Exploiter. Yet another low effort domain user to domain admin… https://t.co/8eIT0QTzeR https://twitter.com/i/web/status/1469949174812655617hack_git
2021-12-12 07:11:59Active Directory Privilege Escalation CVE-2021-42287 https://t.co/vUtk6l91z6 https://t.co/ozhmJkPUJ1 https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlPatrilic_X
2021-12-12 07:00:36#tools #Offensive_security 1. JNDI Exploit Kit https://t.co/9BMNP1RREo 2. CVE-2021-42287/CVE-2021-42278 Scanner & E… https://t.co/HqYlVmYHdO https://github.com/pimps/JNDI-Exploit-Kit https://twitter.com/i/web/status/1469924171337641985ksg93rd
2021-12-12 04:52:49log4j の件で話題が持ちきりですが、 AD 管理をしている場合は、こちらも目を通しておく必要があるかなと。 CVE-2021-42287/CVE-2021-42278 Weaponisation:… https://t.co/YZVETMwfxo https://twitter.com/i/web/status/1469889848832327680mimura1133
2021-12-12 04:01:20Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/NrzCO8aNBg https://twitter.com/i/web/status/1469875434670100480NandanLohitaksh
2021-12-12 02:00:32“CVE-2021-42287/CVE-2021-42278 Weaponisation” https://t.co/1qrYjvOp4Z https://htn.to/4nkd8PSNXGwaiha8
2021-12-11 21:11:46Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate Domain Admin from standard domain user https://t.co/T3MFmpMbHe https://github.com/WazeHell/sam-the-adminixmailsaygili
2021-12-11 20:51:55CVE-2021-42287/CVE-2021-42278 Weaponisation https://t.co/wuhXIe9Cew https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.htmlRapidSafeguard
2021-12-11 20:13:04GitHub - cube0x0/noPac: CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. https://t.co/Ee3chyeFFd https://github.com/cube0x0/noPacakaclandestine
2021-12-11 20:00:52Scanner and automated exploitation of the CVE-2021-42287/CVE-2021-42278. Yet another low effort domain user to doma… https://t.co/QfHoaoVmLw https://twitter.com/i/web/status/1469753978166685697cube0x0
2021-12-11 19:02:57Exploiting CVE-2021-42278 and CVE-2021-42287. From Standard AD User to a Domain Admin! (default configuration)… https://t.co/u5hStleCNn https://twitter.com/i/web/status/1469742616505954323safe_buffer
2021-12-11 16:32:17CVE-2021-42287 Active Directory Domain Services Elevation of Privilege V... https://t.co/pfaQHWB7XM Don't wait v… https://t.co/xutZB2KF50 http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-42287 https://twitter.com/i/web/status/1469704316009201669VulmonFeeds
2021-12-10 22:12:03** CVE-2021-42287 - KDC bamboozling Before patch, there was a weird behavior on the KDC. When requesting a service… https://t.co/JaBKHkiReb https://twitter.com/i/web/status/1469425836818378754_nwodtuhs
2021-12-10 22:11:42@BlackSnufkin42 Namaste, here is your unroll: So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278…… https://t.co/6Ct1CfJhCE https://twitter.com/i/web/status/1469426786165473280threadreaderapp
2021-12-10 14:52:48So here are my 2 cents on @exploitph's CVE-2021-42287/CVE-2021-42278 Weaponization - a quick & dirty way to exploit… https://t.co/0IKxwXf2l9 https://twitter.com/i/web/status/1469316932180619268snovvcrash
2021-12-10 13:24:11#ad #privesc #cve #pac #kerberos Разбор уязвимости CVE-2021-42287. P.S. Я правда сам еще не разобрался... Activ… https://t.co/gLEhqq3ddI https://twitter.com/i/web/status/1469295119283142659IT_news_for_all
2021-12-10 11:33:47Please make sure you have installed patches for CVE-2021-42287 / CVE-2021-42278. Exploitation itself is trivial and… https://t.co/VHNK8I0iLi https://twitter.com/i/web/status/1469268110683344905FuzzySec
2021-12-10 04:10:05So with some help from @_EthicalChaos_ I found a way to weaponise CVE-2021-42287/CVE-2021-42278 and more help from… https://t.co/eWfQDzEVzB https://twitter.com/i/web/status/1469157138928914432exploitph
2021-11-14 16:00:14CVE-2021-42287 - https://t.co/X6gjQmSdjY #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-2/RedPacketSec
2021-11-14 16:00:12CVE-2021-42287 - https://t.co/ITfQ8vyYSu #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-3/RedPacketSec
2021-11-14 16:00:11CVE-2021-42287 - https://t.co/4GuFI7d6hr #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-4/RedPacketSec
2021-11-14 16:00:08CVE-2021-42287 - https://t.co/GRIMippypB #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287-5/RedPacketSec
2021-11-13 16:01:07CVE-2021-42287 - https://t.co/zD7BkjQs80 #Uncategorized #cybersecurity https://www.redpacketsecurity.com/cve-2021-42287/RedPacketSec
2021-11-13 07:20:18New post from https://t.co/uXvPWJy6tj (CVE-2021-42287 (windows_server, windows_server_2008, windows_server_2012, wi… https://t.co/Zaw1eluxUU http://www.sesin.at https://twitter.com/i/web/status/1459417088842469379WolfgangSesin
2021-11-13 07:20:12New post from https://t.co/9KYxtdZjkl (CVE-2021-42287 (windows_server, windows_server_2008, windows_server_2012, wi… https://t.co/IE4wsUCVTT http://www.sesin.at https://twitter.com/i/web/status/1459417132886896640www_sesin_at
2021-11-13 04:51:02🚨 NEW: CVE-2021-42287 🚨 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique… https://t.co/6csZ4qMysA https://twitter.com/i/web/status/1459382906674106374threatintelctr
2021-11-11 01:30:07Watch out for current AD patch KB5008380/CVE-2021-42287. Kerberos delegation seems to be broken. Azure App Proxy SS… https://t.co/IB1bPgUj8B https://twitter.com/i/web/status/1458607124276154368RyanLNewington
2021-11-10 08:36:37New post from https://t.co/9KYxtdZjkl (CVE-2021-42287) has been published on https://t.co/Xu4SXQf5PB http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42287/www_sesin_at
2021-11-10 08:36:20New post from https://t.co/uXvPWJy6tj (CVE-2021-42287) has been published on https://t.co/OJrnFSJmPn http://www.sesin.at https://www.sesin.at/2021/11/10/cve-2021-42287/WolfgangSesin
2021-11-10 07:52:23CVE-2021-42287 shall henceforth be named Ravishing Grasshopper https://t.co/LjOXofhbZN https://nvd.nist.gov/vuln/detail/CVE-2021-42287vulnonym
2021-11-10 07:51:28"Active Directory Domain Services Elevation of Privilege Vulnerability. CVE-2021-42287 is unique from CVE-2021-4227… https://t.co/zt7fRihcI6 https://twitter.com/i/web/status/1458339928350334978circl_lu
2021-11-10 06:40:04CVE-2021-42287 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CV… https://t.co/55vFQYlMbj https://twitter.com/i/web/status/1458323440910413826VulmonFeeds
2021-11-10 01:51:33CVE-2021-42287 Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE… https://t.co/6AlsJGnio1 https://twitter.com/i/web/status/1458249425046888450CVEnew
2021-11-10 01:37:38@EurekaBerry CVE-2021-42287 not 42297attritionorg
2021-11-10 01:11:35CVE-2021-42287 : Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from C… https://t.co/JaP7zG18yt https://twitter.com/i/web/status/1458240091852267525CVEreport
2021-11-10 00:10:56IT Risk: https://t.co/y7kHxT5e6t月例アップデート2021年11月 -2/5 CVE-2021-42291 CVE-2021-42288 CVE-2021-42287 CVE-2021-42286 C… https://t.co/bmCaQ6dnAi http://Microsoft.Windows https://twitter.com/i/web/status/1458224857242423296management_sun
2021-11-10 00:10:27IT Risk: https://t.co/y7kHxT5e6t月例アップデート2021年11月 -2/4 CVE-2021-42291 CVE-2021-42288 CVE-2021-42287 CVE-2021-42286 C… https://t.co/6FmDfjDjbm http://Microsoft.Windows https://twitter.com/i/web/status/1458225298940391424management_sun
2021-11-09 23:50:08CVE-2021-42287 is worth paying attention is - if you install this patch on some domain controllers but not all, in… https://t.co/YHrQks3K4X https://twitter.com/i/web/status/1458220220376616960GossiTheDog