Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0x00dtm
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x00dtm
-
Prikvačeni tweet
New article! Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPChttps://0x00sec.org/t/anti-virus-exploitation-malwarebytes-4-0-4-protection-not-found-hijacking-malwarebytes-via-com-ipc/18766 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
UPDATED FOR 2020: The Infosec Introvert Travel Blog https://tisiphone.net/2017/11/27/the-infosec-introvert-travel-blog/ … viahttp://tisiphone.net
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability. https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
I constantly get asked on how to enter the
#infosec and#cybersecurity industry. In hopes of helping more people I wrote an article about it. Medium: https://medium.com/@drunkrhin0/a-graduates-thoughts-how-to-get-started-in-information-security-and-cyber-security-d01a1efaed0f … LinkedIn:https://www.linkedin.com/pulse/graduates-thoughts-how-get-started-information-security-rami-tawil …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
VB6 Packers are no joke, This one took me a while to write and I do hope you enjoy it! Analyzing Modern Malware Techniques - Part 3 Vb6 packershttps://0x00sec.org/t/analyzing-modern-malware-techniques-part-3/18943 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
Interested in learning Windows Kernel exploitation ?
@Synacktiv wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member. https://www.root-me.org/en/breve/New-set-of-challenges-in-Microsoft-Windows-kernel …pic.twitter.com/q8oSwfd5cC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
A curated list of resources for learning about deploying, managing and hunting with Microsoft Sysmon. Contains presentations, deployment methods, configuration file examples, blogs and additional github repositories.
#infosec#blueteam#dfir https://github.com/MHaggis/sysmon-dfir …pic.twitter.com/7Lg1XEWAVUHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, https://github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
Everyone you admire has made tradeoffs to get where they are, and every one of them has cautionary tales about the human costs of those tradeoffs When you get to where they are, they'll tell you. But by then you'll already know.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2020/01/chasing-polar-bears-part-2.html … Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
... skid who cries about not being able to bypass Defender. On that note, I believe Defender is sufficient (for my needs).
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
... being mindful of the dangers on the internet, not plugging in random USBs, etc. The threat model is also important - if a malicious user were to target a high profile target, an AV wouldn't be as helpful. If they targeted a random like me, it would most likely be some...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thinking about it in absolutes isn't useful. Despite hunting bugs in AV, I would still recommend it to the general public. Yes, AVs aren't perfect BUT they serve as a layer of defence - maybe not the *first* line of defence. It should complement safe practices like...https://twitter.com/LooseSecurity/status/1221964954552754177 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is). https://www.tiraniddo.dev/2020/01/dont-use-system-tokens-for-sandboxing.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!https://blog.layle.io/uncovering-cve-2020-0601/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZurehttps://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
If you're asking yourself "is this the first time an AV was targeted by someone to own someone", you need to check this Github repository by
@buheratorhttps://github.com/v-p-b/avpwnHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
Our simple and effective use of IDAPython to solve a ctf challenge: https://ctftime.org/writeup/18058?c=4282 …
@idatips#RiceTeaCatPanda#Pythonpic.twitter.com/PAV9W6sfS6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0x1337dtm proslijedio/la je Tweet
After examining and rereading
@tiraniddo, MS solution to most Elevation of Privilege (Symbolic\Hard Link) attacks is: Either keeping an open handle to the exploited resource or doing local impersonation correctly. Like in https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0635 … Or in https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1161 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.