Rio

@0x09AL

POC || GTFO

https://0x09al.github.io
Vrijeme pridruživanja: ožujak 2015.

Tweetovi

Blokirali ste korisnika/cu @0x09AL

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x09AL

  1. Prikvačeni tweet
    10. sij

    I was able to reproduce the Citrix ADC Remote Command Execution in one day. Guess you need to patch ASAP. -2019-19781

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Happy to announce I'll be speaking at this summer demonstrating some novel approaches to post exploitation tradecraft

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Our first blog post of 2020 is out! Learn about how we discovered a heap overflow in the F-Secure Internet Gatekeeper, which leads to unauthenticated RCE

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Also a huge thanks to , Matthew Pepe & for 2x signed copies of their books which we donated to (Tirana, Albania) & (Prishtina, Kosovo) as a "thank you" for hosting last week's infosec meetups. Sharing is caring!! 💙

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    3.5 years on still waiting for a single tangible benefit

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    "This course is not just about learning how to run tools, students will learn how the tools work under the hood as well as how to develop and customise their own; an essential skill for any red teamer." <--- this right here. 👌 Looking for a red team training? Look no further.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    31. sij
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Awesome work finding an RCE in SharePoint by which also affected SharePoint Online

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.

    Poništi
  11. proslijedio/la je Tweet
    31. sij

    Very excited to announce and me will be bringing our training to Vegas this August for - we'll follow up soon with some revelations on what makes this course so exciting!

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation.

    Poništi
  13. proslijedio/la je Tweet

    Well for one, I felt the attention to detail was slipping.

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  16. proslijedio/la je Tweet
    28. sij
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    25. sij

    Got my hands on an cable from Currently writing a tool that will extract firmware and output the WiFi config + any custom payloads. Is this useful to others?

    Poništi
  20. proslijedio/la je Tweet
    25. sij

    Congratulations to ph0well for winning our CTF, we’ll be in touch shortly with details on how to claim your prize!

    Poništi
  21. proslijedio/la je Tweet
    24. sij

    Open Wifi Security (Friday evening rant) 1) Yes, at our hotels we have open wifi as standard. No Client<->AP encryption (WPA/23), and no captive portal to logon to. Let me first explain some obvious reasons for doing so. (Often disregarded by infosec pros.)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·