Martin Mielke Profile Banner
Martin Mielke Profile
Martin Mielke

@xct_de

5,704
Followers
869
Following
10
Media
431
Statuses

Windows Exploitation • OSCE3/OSEE • Labs @vulnlab_eu • Principal Red Teamer @MantodeaSec

🇩🇪
Joined January 2018
Don't wanna be here? Send us removal request.
@xct_de
Martin Mielke
2 years
I spent the last few months on windows exploitation and finally got my OSEE . Thank you @offsectraining !
28
26
414
@xct_de
Martin Mielke
4 years
I just passed my OSEP exam! I really enjoyed this course. A lot of good content about AV evasion & AD exploitation and good challenge labs to practice on (plan some time for these, they take a while to finish). OSED next🙂 #offsec @offsectraining
27
11
370
@xct_de
Martin Mielke
9 months
That's a wrap on Season 3 at @hackthebox_eu - Ranked 1st in both team and individual leaderboards. Big thanks to @ATeamJKR , @snowscan , @macz01590714 , @k0zmer - you guys are the best :)
Tweet media one
Tweet media two
Tweet media three
Tweet media four
19
8
239
@xct_de
Martin Mielke
5 years
I just passed my AWAE exam and obtained the OSWE certification! That was a fun challenge - I can recommend the course to anyone interested in finding vulnerabilities in web applications through code review & debugging. #offsec @offsectraining
15
10
191
@xct_de
Martin Mielke
2 years
My first three videos on testing a relatively large, custom active directory environment are out. To get started, check out the first part here:
4
28
132
@xct_de
Martin Mielke
2 years
Great find by @filip_dragovic 🔥! NetrDfsAddStdRoot seems to do the trick too.
@filip_dragovic
Filip Dragovic
2 years
Spooler service disabled, RPC filters installed to prevent PetitPotam and File Server VSS Agent Service not installed but you still want to relay DC authentication to ADCS? Don't worry MS-DFSNM have your back ;)
Tweet media one
30
531
1K
1
27
130
@xct_de
Martin Mielke
3 years
I just received a lovely email from @YouTube that one of my @hackthebox_eu walkthroughs violates the "harmful and dangerous policy". Put some effort into writing an appeal, which got rejected in under a minute after sending it. Nice. Does anyone have experience dealing with this?
18
15
108
@xct_de
Martin Mielke
4 years
After working through #BlackHatGo (awesome book!), I built a small windows reverse shell. Maybe someone finds it useful: .
4
31
101
@xct_de
Martin Mielke
2 years
Red Team Ops II ✔️ Another excellent course by @zeropointsecltd .
2
5
91
@xct_de
Martin Mielke
10 months
Reported a LPE on the Linux version of Papercut NG about 6 months ago. Still doesn't seem to be fixed on the current version (23.0.3). Here are the details:
0
20
83
@xct_de
Martin Mielke
5 months
@vulnlab_eu @offensive_con Might record a walkthrough for this one if enough people are interested :) I realize it's a pretty niche topic though.
7
0
74
@xct_de
Martin Mielke
3 years
Proper retired today on HackTheBox. @ATeamJKR and I had a lot of fun creating this box and watching the community solve it. It has SQLi, RFI, TOC/TOU, Golang Reversing & an Arbitrary File Write as SYSTEM. Here is my writeup & video of the box:
2
14
72
@xct_de
Martin Mielke
2 months
This is somewhat similar for domain-joined ubuntu machines - if you can create the AD group "admin" and use_fully_qualified_names is set to false in sssd.conf, you will be able to sudo to root due to the default "%admin ALL=(ALL) ALL" sudoers entry.
@PyroTek3
Sean Metcalf
2 months
In today's WTF?!?!? moment When a ESXi server is domain-joined, it assumes any "ESX Admins" group & its members should have full admin rights. So.... anyone who can create & manage a group in AD, can get full admin rights to the VMware ESX hypervisors!
43
430
2K
2
18
73
@xct_de
Martin Mielke
3 years
Attended was a pretty tricky OpenBSD machine on #HackTheBox . We get RCE via Vim, write a simple HTTP reverse shell and exploit a custom OpenBSD binary for root. Thanks, @ATeamJKR & @macz01590714 , for going over the details on this one again with me!
4
14
60
@xct_de
Martin Mielke
1 year
I'm starting a new video series on pentesting the new lab (Wutai). In the first one, we'll start from the perspective of an unauthenticated, external attacker and will mainly focus on enumeration and getting initial access.
0
15
52
@xct_de
Martin Mielke
4 years
We just got both bloods on Reel2 :) Thanks @snowscan @ATeamJKR @InfoSecJack ! Really awesome box by @cube0x0 ! @hackthebox_eu
2
1
48
@xct_de
Martin Mielke
3 years
Pivotapi by @CyberVaca_ & @3v4Si0N was a really enjoyable windows machine on #hackthebox . It involved a lot of small steps, including various active directory attacks & some light reverse engineering. At the end, I'm showing 2 unintended paths.
0
12
45
@xct_de
Martin Mielke
6 months
@RedTeamTactics @hackthebox_eu We do custom hiring challenges via @vulnlab_eu (for red teaming: small realistic environments with a couple of machines). Since those are private there are no writeups :)
1
3
29
@xct_de
Martin Mielke
6 months
On my way to #Zer0Con2024 organized by the wonderful @POC_Crew !
Tweet media one
0
1
42
@xct_de
Martin Mielke
3 years
My video on Bucket which retired today on #HackTheBox . This one was pretty unique, as we got the chance to play with DynamoDB & S3 buckets.
0
7
34
@xct_de
Martin Mielke
4 years
Another first blood for the ATeam on Breadcrumbs🥳 Thanks @snowscan @ATeamJKR @InfoSecJack @macz01590714 . I enjoyed this box by @helich0pper ! @hackthebox_eu #HackTheBox
2
0
37
@xct_de
Martin Mielke
1 year
Next Video on Wutai is up! We are writing a simple, custom shellcode loader and will get a sliver beacon on the initial machine.
0
10
36
@xct_de
Martin Mielke
4 years
New box by @ATeamJKR and me - I hope you enjoy this one! We certainly had fun building it. Although not being able to compete on a new box is a bit annoying for me ;)
@hackthebox_eu
Hack The Box
4 years
Hack it... but keep it clean 😎 Proper #Hard #Windows Machine created by xct & jkr will go live 13 March 2021 at 19:00:00 UTC. Reel2 will be retired! You still have time to hack your way in at: #HackTheBox #CyberSecurity #InfoSec #Hacking
Tweet media one
3
18
49
3
1
35
@xct_de
Martin Mielke
2 years
I'm heading to Vegas for #BlackHat - let me know if you want to chat!
8
1
30
@xct_de
Martin Mielke
2 years
Short writeup on a really cool windows challenge from @bluefrostsec for #EKO2022 .
0
9
28
@xct_de
Martin Mielke
3 years
And it happened again: Another one of my videos got removed, and the appeal got rejected seconds after hitting send (must be automated?). @TeamYouTube can you help? This is the third time now in just a few weeks.
2
2
25
@xct_de
Martin Mielke
5 months
Heading to @offensive_con - happy to be here again 🍷
0
1
23
@xct_de
Martin Mielke
2 years
Exploiting MTS HW Driver via MmMapLockedPages:
@SecuriTeam_SSD
SSD Secure Disclosure
2 years
🚨 New advisory is now out! 🚨 A vulnerability in MTS driver allows local users to write arbitrary data to sensitive areas of the kernel’s memory which can be exploited to gain elevated privileges:
Tweet media one
0
13
53
0
8
23
@xct_de
Martin Mielke
1 year
Awesome first training day! Learning about Azure AD Security with @_dirkjan
@cybersaiyanIT
Cyber Saiyan / RomHack Conference, Training, Camp
1 year
#RomHackTraining started this morning Dirk-jan Mollema (Azure AD Security) and Silvio Cesare (Code review) teaching our studends right now 🔥🔥🔥
Tweet media one
Tweet media two
0
8
30
1
0
21
@xct_de
Martin Mielke
5 months
0
0
2
@xct_de
Martin Mielke
4 months
Just booked my flights and tickets for @codeblue_jp ! Can't wait to attend for the first time. See you there!
0
0
20
@xct_de
Martin Mielke
6 months
💯
@snyff
Louis Nyffenegger
6 months
Too many people fall into the traps of gamification or certification, focusing on the wrong objectives. Your goal should be to learn, not to be at the top of the leaderboard or merely to pass an exam. [1/2]
9
80
353
0
4
19
@xct_de
Martin Mielke
3 years
@247CTF There is a great post by @_xpn_ using Terraform & DSC. I've built my own lab environment based on that one a while ago.
1
1
16
@xct_de
Martin Mielke
5 years
#OffensiveCon20 has been amazing! Top-notch content - looking forward to next year. Glad to have met @ATeamJKR , @v1p3r0u5 and many others!
1
2
16
@xct_de
Martin Mielke
5 years
Thank you @avast_antivirus for inviting me to @CyberSecAI . I enjoyed the conference and learned a lot!
0
1
15
@xct_de
Martin Mielke
4 months
@rayanlecat @x33fcon On the train to Gdynia right now :)
1
1
3
@xct_de
Martin Mielke
9 months
@sh3llvik @hackthebox_eu This almost never works, but if it does it's great fun :) The only other case I can remember is the "Armageddon" box shortly after Drupalgeddon2.
2
0
13
@xct_de
Martin Mielke
3 years
@thecybermentor I have a small YouTube channel with weekly videos on retiring HackTheBox machines. For the future, I was thinking about adding content for other platforms too.
1
0
13
@xct_de
Martin Mielke
5 years
Good job team :) Had a lot of fun on this one!
@excusemewtf_ctf
excusemewtf
5 years
#metasploitctf just ended and we scored 2nd! Well played everyone! Looking forward to receive our prizes from @metasploit :)
Tweet media one
3
5
43
0
0
12
@xct_de
Martin Mielke
4 years
@hackthebox_eu Good luck - hope you have fun with this one!
0
0
12
@xct_de
Martin Mielke
6 years
Just finished my short write-up about Ethereal on @hackthebox_eu . Great box by @egre55 and @MinatoTW_ . You can find it here:
0
3
10
@xct_de
Martin Mielke
3 years
Got mine ;-)
@offensive_con
offensivecon
3 years
#Offensivecon22 registration is OPEN! Remember tickets are limited.
0
32
50
0
0
9
@xct_de
Martin Mielke
3 years
Thank you guys, I talked to @gynvael and he is helping me on this issue. I hope it will be back soon.
0
0
9
@xct_de
Martin Mielke
2 years
This is going to be interesting 👀
@vulnlab_eu
Vulnlab
2 years
New machine "Dump" is going live today! Thank you @ATeamJKR for creating this machine for Vulnlab! This is already the second jkr box on the platform 🍾
0
1
20
0
1
9
@xct_de
Martin Mielke
3 years
0
0
8
@xct_de
Martin Mielke
5 years
@0xdf_ @hackthebox_eu Thanks for the great write-up and box! Another way to System is to use CVE-2019-1315 (which I think was published after the box was released).
1
0
7
@xct_de
Martin Mielke
4 years
1
0
7
@xct_de
Martin Mielke
2 years
After getting DA here, there are still 2 more domains to pwn :)
1
1
7
@xct_de
Martin Mielke
1 year
Excited for this one, this will be my first RomHack (and first time visiting Italy).
@cybersaiyanIT
Cyber Saiyan / RomHack Conference, Training, Camp
1 year
📢 📢 #RomHack2023 conference agenda is online 📢 📢 We are happy to announce this year’s incredible lineup Ticket sales will start on Monday, 3 July Check the thread #pleaseRT ⬇️ ⬇️ ⬇️
Tweet media one
2
22
37
1
0
6
@xct_de
Martin Mielke
2 years
Got mine 🎉 Don't miss it - OffensiveCon is epic!
@offensive_con
offensivecon
2 years
It's time everybody!!! the OffensiveCon23 ticket shop is now open! Get your tickets quickly, as they tend to run out pretty soon.
4
38
88
0
0
5
@xct_de
Martin Mielke
5 years
Just got back from #44CON - amazing conference! Particularly enjoyed the SAP security training by @jsantarsieri and the heap exploitation workshop by Max Kamper.
2
2
5
@xct_de
Martin Mielke
5 years
@hackthebox_eu I especially liked chainsaw by @w1zzcap and absolutezero!
1
0
4
@xct_de
Martin Mielke
3 years
@snowscan @ATeamJKR @InfoSecJack @macz01590714 Awesome job guys🥳 Thanks @tiyeuse for building this one!
0
1
5
@xct_de
Martin Mielke
5 years
@martinbydefault @offsectraining Thanks! I think 30 days are enough to work through the course and you could host the vulnerable applications yourself if you run out of lab time.
0
0
4
@xct_de
Martin Mielke
3 years
0
0
4
@xct_de
Martin Mielke
1 year
Does anyone know a way to modify the "whenChanged" and "whenCreated" attributes of an object (lab env with full access to DC)?
0
2
4
@xct_de
Martin Mielke
2 years
@33y0re @Steph3nSims Great stream - thank you!
0
0
4
@xct_de
Martin Mielke
6 years
Frolic just retired on @hackthebox_eu . Enjoyed the box a lot, thank you @_felamos ! Here is my short write-up:
0
2
4
@xct_de
Martin Mielke
4 years
@watcher_151 I like it. I did most of my stuff in python before and it's not too hard to switch. My favorite thing are definitely goroutines.
1
0
3
@xct_de
Martin Mielke
4 years
@chvancooten @offsectraining Thanks! I don't think I will write a blog post but feel free to reach out on discord, happy to share my thoughts.
2
0
3
@xct_de
Martin Mielke
3 months
@splinter_code Have fun! Reminds me I bought a copy 2 months ago but didn't start it yet..
2
0
3
@xct_de
Martin Mielke
4 years
@qtc_de @ATeamJKR @hackthebox_eu Congrats! Thanks for the feedback - glad you like it :)
0
0
3
@xct_de
Martin Mielke
1 year
@snowscan See you tomorrow!
0
0
3
@xct_de
Martin Mielke
7 months
0
0
3
@xct_de
Martin Mielke
3 years
@_CryptoCat Congrats - Love your content!
1
0
2
@xct_de
Martin Mielke
2 years
@farazsth98 Thank you! I really like these posts.
0
0
1
@xct_de
Martin Mielke
9 months
@thione_diouf @hackthebox_eu @ATeamJKR @snowscan @macz01590714 @k0zmer Hi, I answered your question on Patreon - If you need further help please send a private message.
0
0
0
@xct_de
Martin Mielke
2 years
@Void_Sec @offensive_con See you in Berlin!
1
0
1
@xct_de
Martin Mielke
4 years
@IanColdwater I'd say Reel2 for a challenging active windows box or really any box made by @ATeamJKR
0
0
2
@xct_de
Martin Mielke
5 years
@SecGus @jsantarsieri Ahh sorry, did not know you were there :)
0
0
1
@xct_de
Martin Mielke
4 years
@watcher_151 @snowscan @ATeamJKR @InfoSecJack @macz01590714 @helich0pper @hackthebox_eu I kind of lost interest in making them, need to find some motivation again. Glad you like them though!
1
0
1
@xct_de
Martin Mielke
1 year
@33y0re Congrats!
0
0
1
@xct_de
Martin Mielke
4 years
@AdrianInkblack Sure, I use kali with alacritty & i3-gaps.
0
0
1
@xct_de
Martin Mielke
2 years
@davidvalles007 Thanks! Yes, I'll create some more on the other domains & some interesting side vectors in the future.
0
0
1
@xct_de
Martin Mielke
4 years
@NETKLB @ATeamJKR It's an intentionally vulnerable system that will be released on @hackthebox_eu this week, allowing people to practice their hacking skills ;)
1
0
1
@xct_de
Martin Mielke
2 years
@Cyber_Nlnja @offsectraining Thank you! I think it is, AWE is the only 400-level course at the moment.
0
0
1
@xct_de
Martin Mielke
1 year
0
0
1
@xct_de
Martin Mielke
1 year
@Firzen14 Damn almost missed it, time to order a copy..
1
0
1
@xct_de
Martin Mielke
2 years
@andreyknvl @offensive_con Signed up, looking forward to it :)
0
0
1
@xct_de
Martin Mielke
1 year
@EricaZelic Thank you!
0
0
1
@xct_de
Martin Mielke
1 year
@matteomalvica Nice one! Is there a recording of the talk?
1
0
1
@xct_de
Martin Mielke
1 year
0
0
1
@xct_de
Martin Mielke
5 months
@Yunolay 美しいです
1
0
1
@xct_de
Martin Mielke
11 months
0
0
0
@xct_de
Martin Mielke
1 year
@electronicbots @q8fawazo @0x4148 A few slots get added every weekend (to not flood the labs and guarantee a good experience for everyone).
0
0
1
@xct_de
Martin Mielke
4 years
0
0
1