Mänu's Avatar

Mänu

@emanuelduss.ch

IT security. Linux & network protocols. Pentesting web applications, networks & AD infrastructures. Mostly technical stuff here. https://emanuelduss.ch

73
Followers
103
Following
22
Posts
22.12.2024
Joined
Posts Following

Latest posts by Mänu @emanuelduss.ch

Post image

WinGet can be more than a package manager. We show how .𝚠𝚒𝚗𝚐𝚎𝚝 configs + a self-referencing LNK become a viable initial access payload when Microsoft Store is enabled. Includes detection queries & mitigation tips.
blog.compass-security.com/2026/03/wing...
#RedTeam #Windows #LOLBins #InitialAccess

03.03.2026 16:15 👍 4 🔁 3 💬 0 📌 0
Post image

John Ostrowski (Compass Security) and Manuel Kiesel (Cyllective AG) worked together on CVE-2025-13154, a Lenovo Vantage LPE. Even after Microsoft closed a known primitive, collaboration led to a working PoC.

blog.compass-security.com/2026/02/from...

#Windows #CVE #SecurityResearch #PrivEsc

10.02.2026 08:33 👍 6 🔁 4 💬 0 📌 0

This was a really cool and awesome course ❤️! I learned so much in these two days and did a lot of stuff I never did and never heard about before. It was cool when (after some nasty debugging 🫠) the encryption key could finally be sniffed 🤘. Thanks a lot for your training, you guys rock!

31.01.2026 08:44 👍 6 🔁 2 💬 0 📌 0
Preview
Lenovo Vantage LPE/EoP (CVE-2025-13154) A write-up of CVE-2025-13154, a privilege escalation vulnerability in Lenovo Vantage.

🚨 New blog post!

Read about CVE-2025-13154, a privilege-escalation vulnerability in a Lenovo Vantage add-in called SmartPerformance.

cyllective.com/blog/posts/l...

#windows #cve #infosec #pentest

17.01.2026 13:36 👍 1 🔁 2 💬 1 📌 1
Output of the command showing multiple IP addresses and their hostnames assigned via reverse DNS entries.

Output of the command showing multiple IP addresses and their hostnames assigned via reverse DNS entries.

This is probably the easiest way to perform reverse DNS lookups over IP address ranges using the built-in tool getent and bash brace expansion:

getent hosts 130.59.{20,31}.{0..255}

Useful if you are on a system/container with limited tools.

#pentest #dns #linux

09.01.2026 08:49 👍 4 🔁 0 💬 0 📌 0
Post image

THC Release 💥: The world’s largest IP<>Domain database: ip.thc.org

All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free.

Updated monthly.

Try: curl ip.thc.org/1.1.1.1

Raw data (187GB): ip.thc.org/docs/bulk-da...

(The fine work of messede 👌)

17.12.2025 13:33 👍 44 🔁 20 💬 0 📌 0
Post image

Two blog posts just dropped - one with the details on the bloatware pwning shenanigans I was up to earlier in the year, and another on pipetap, a new Windows named pipe proxy/tool.

sensepost.com/blog/2025/pw...

sensepost.com/blog/2025/pi...

07.12.2025 07:01 👍 3 🔁 2 💬 0 📌 0
300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race
300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race YouTube video by Compass Security

New video out!

Security analyst John Ostrowski show the hands-on process behind discovering CVE-2025-24076 and CVE-2025-24994 described in our recent blog post.

Watch here: youtu.be/YwNcTuHxnAI

#security #pentest #windowsinternals #vulnresearch

02.12.2025 09:45 👍 4 🔁 2 💬 0 📌 0
Preview
Less Praying More Relaying - Enumerating EPA Enforcement for MSSQL and HTTPS - SpecterOps It's important to know if your NTLM relay will be prevented by integrity protections such as EPA, before setting up for and attempting the attack. In this post, we share how to solve this problem for ...

NTLM relays failing because of EPA? 😒

Nick Powers & @tw1sm.bsky.social break down how to enumerate EPA settings across more protocols + drop new tooling (RelayInformer) to make relays predictable.

Check out their blog for more: ghst.ly/4rqwpRs

25.11.2025 20:12 👍 4 🔁 2 💬 0 📌 0

The slides can be downloaded here: www.compass-security.com/fileadmin/Re...

06.11.2025 07:07 👍 1 🔁 0 💬 0 📌 0
Windows Access Tokens - From Authentication to Exploitation
Windows Access Tokens - From Authentication to Exploitation YouTube video by Compass Security

Want to understand how Windows handles authentication and access tokens? Security analyst @emanuelduss.ch explains how they’re created, used, and abused - with live demos.

🎥Presentation: youtu.be/_ODdwpxXRR4?...

#Security #Pentest #WindowsInternals

04.11.2025 12:37 👍 3 🔁 1 💬 1 📌 0
Preview
Create Evil Wi-Fi Access Point (802.11evil) Introduction In pentests, connecting devices to your own network can be very useful. This enables you to exfiltrate data, download tools, analyze the network traffic and even use a transparent HTTP pr...

802.11evil now shows a Wi-Fi QR code, sends router advertisements for IPv6 support, can set static routes via DHCP and disable Wi-Fi to only act as a router.

See changelog: emanuelduss.ch/posts/create...

#pentest #network #tls #mitm

27.10.2025 06:43 👍 1 🔁 0 💬 0 📌 0
Preview
Catching Credential Guard Off Guard - SpecterOps Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.

Credential Guard was supposed to end credential dumping. It didn't.

Valdemar Carøe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.

Read for more: ghst.ly/4qtl2rm

23.10.2025 17:45 👍 17 🔁 10 💬 0 📌 0

📢 Confirmed! Emanuele Barbeno, Cyrill Bannwart, Yves Bieri, Lukasz D., Urs Mueller of Compass Security combined an arbitrary file write & cleartext transmission of sensitive data to exploit the @home_assistant Green. Their third round win earns them $20,000 and 4 Master of Pwn points. #Pwn2Own

21.10.2025 16:27 👍 6 🔁 2 💬 0 📌 1
Post image

#Pentest of gRPC-Web apps is tricky due to the binary format. We are releasing bRPC-Web, a @portswigger.net @burpsuite.bsky.social extension developed by our @muukong.bsky.social that helps manipulate #gRPC-Web traffic, even in absence of #protobuf schemas. blog.compass-security.com/2025/10/brpc...

21.10.2025 11:38 👍 7 🔁 3 💬 0 📌 0
Vulnerability in FortiProxy Security analyst Emanuel Duss identified a vulnerability in FortiProxy.

Learn about a FortiProxy Domain Fronting Protection bypass discovered by our analyst @emanuelduss.ch. Details in the advisory: www.compass-security.com/en/news/deta...

Curious how web filters are evaded? Read his blog series: blog.compass-security.com/2025/03/bypa...

#cve #pentest #bypass

15.10.2025 11:03 👍 2 🔁 1 💬 0 📌 0
Preview
BalCCon2k25 - YouTube BalCCon2k25 - Against the current

Talks from the Balkan Computer Congress 2025 security conference, which took place last September, are available on YouTube

www.youtube.com/playlist?lis...

11.10.2025 22:54 👍 7 🔁 2 💬 0 📌 0
Post image

I’m excited to announce that I’ll be presenting The Fragile Lock: Novel Bypasses for SAML Authentication at Black Hat Europe! In this talk, I’ll show how I was able to continuously bypass security patches to achieve complete auth bypass for major libraries. #BHEU @blackhatevents.bsky.social

07.10.2025 14:55 👍 26 🔁 6 💬 0 📌 0
Kerberos Deep Dive Part 6 - Resource-Based Constrained Delegation
Kerberos Deep Dive Part 6 - Resource-Based Constrained Delegation YouTube video by Compass Security

The final episode of our Kerberos deep dive is live!

RBCD opens new attack paths in Kerberos. Learn how misconfigs enable privilege escalation and how to defend.

youtu.be/l97RDnzdrXY?...

#Kerberos #ActiveDirectory

18.09.2025 05:19 👍 4 🔁 3 💬 0 📌 0
One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise ...

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-gl...

17.09.2025 13:20 👍 87 🔁 37 💬 9 📌 5
Kerberos Deep Dive Part 5 - Constrained Delegation
Kerberos Deep Dive Part 5 - Constrained Delegation YouTube video by Compass Security

Episode 5 of our Kerberos deep dive is live. Constrained delegation isn’t bulletproof. See how attackers exploit it, and how to defend with monitoring & best practices.

youtu.be/rnhr02eKU0I?...

#Kerberos #ActiveDirectory

16.09.2025 06:55 👍 3 🔁 2 💬 0 📌 0
The proxy view for PipeTap, a Windows Named Pipe Analysis Tool

The proxy view for PipeTap, a Windows Named Pipe Analysis Tool

I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)

10.09.2025 13:41 👍 9 🔁 7 💬 2 📌 3
Kerberos Deep Dive Part 3 - AS-REP Roasting
Kerberos Deep Dive Part 3 - AS-REP Roasting YouTube video by Compass Security

Episode 3 of our Kerberos deep dive is live. AS-REP Roasting abuses accounts without pre-auth. Learn the risks, how attackers exploit it, and how to defend.

youtu.be/56BjmyOTN5o?...

#Kerberos #ActiveDirectory

09.09.2025 13:22 👍 3 🔁 3 💬 0 📌 0
Post image

We use @jameskettle.com Burp extension Collaborator Everywhere daily. Now our upgrades are in v2: customizable payloads, storage, visibility. Perfect for OOB bugs like SSRF.

Find out more here: blog.compass-security.com/2025/09/coll...

#AppSec #BurpSuite #Pentesting

09.09.2025 11:54 👍 8 🔁 6 💬 0 📌 0
Kerberos Deep Dive Part 2 - Kerberoasting
Kerberos Deep Dive Part 2 - Kerberoasting YouTube video by Compass Security

Episode 2 of our Kerberos deep dive is live.

Kerberoasting lets attackers steal AD service account credentials. See how it works and how to protect your systems: youtu.be/PhNspeJ0r-4?...

#Kerberos #ActiveDirectory

04.09.2025 07:39 👍 5 🔁 4 💬 0 📌 0
Preview
Fast and Easy File Sharing via IPv6 Link-Local Addresses Over a Network Cable (and Bypass/Abuse Corporate VPNs) Introduction There are a ton of ways to copy data between two systems. You can use a file sharing service on the Internet, transfer files via your self-hosted server or even use USB drives. This blog ...

New blog post about fast and easy file sharing via IPv6 link-local addresses over a network cable and how it can be used to bypass & abuse some always-on corporate VPNs: emanuelduss.ch/posts/fast-a... #ipv6

04.09.2025 06:04 👍 0 🔁 0 💬 0 📌 0
Post image

Kerberos powers auth in Windows and hides big security risks. We’re launching a 6-part deep dive: from protocol basics to attacks plus how to stop them.

Starts today → blog.compass-security.com/2025/09/tami... → Subscribe to our channel!

#Kerberos #ActiveDirectory

03.09.2025 06:39 👍 5 🔁 2 💬 1 📌 1
Post image

Passwords are dead, long live passkeys! 🔑

In our latest blog, we go hands-on: real-life setups, plus tips for recovery and avoiding pitfalls.

blog.compass-security.com/2025/08/into...

#Passkeys #CyberSecurity #Authentication

26.08.2025 09:48 👍 4 🔁 3 💬 0 📌 0
Preview
Juicing ntds.dit Files to the Last Drop - SpecterOps Discover the latest enhancements to the DSInternals PowerShell module, including the Golden dMSA Attack and support for LAPS, trust passwords, or BitLocker recovery keys.

The DSInternals PowerShell module just got an upgrade! 🔥

Updates include:
✅ Golden dMSA Attack
✅ Full LAPS support
✅ Trust password & BitLocker recovery key extraction
✅ Read-only domain controller database compatibility

Read more from Michael Grafnetter: ghst.ly/412rZ7F

14.08.2025 17:21 👍 5 🔁 4 💬 0 📌 0
Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982) AmberWolf Security Research Blog

Zscaler SAML SP Authentication Bypass via Certificate Cloning & Signature Spoofing (CVE-2025-54982) by @amberwolfsec.bsky.social: blog.amberwolf.com/blog/2025/au... #saml #zscaler

10.08.2025 20:01 👍 0 🔁 0 💬 0 📌 0