Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0x09AL
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x09AL
-
Prikvačeni tweet
I was able to reproduce the Citrix ADC Remote Command Execution in one day. Guess you need to patch ASAP.
#CVE-2019-19781#Citrixpic.twitter.com/KjsUOJQsLt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Happy to announce I'll be speaking at
@x33fcon this summer demonstrating some novel approaches to post exploitation tradecraft https://www.x33fcon.com/#!s/dominicc.mdHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Our first blog post of 2020 is out! Learn about how we discovered a heap overflow in the F-Secure Internet Gatekeeper, which leads to unauthenticated RCE https://blog.doyensec.com/2020/02/03/heap-exploit.html …
#infosecpic.twitter.com/z5ZUEETMnp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. https://djangoproject.com/weblog/2020/feb/03/security-releases/ … FIX: https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136 …pic.twitter.com/NljqLmin93
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Also a huge thanks to
@mikesiko, Matthew Pepe &@Lee_Holmes for 2x signed copies of their books which we donated to@OpenLabsAlbania (Tirana, Albania) &@PRNHackerspace (Prishtina, Kosovo) as a "thank you" for hosting last week's infosec meetups. Sharing is caring!!
pic.twitter.com/Hsf5gNYp10
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
3.5 years on still waiting for a single tangible benefitpic.twitter.com/WWrh3jVGKH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
"This course is not just about learning how to run tools, students will learn how the tools work under the hood as well as how to develop and customise their own; an essential skill for any red teamer." <--- this right here.
Looking for a red team training? Look no further.https://twitter.com/MDSecLabs/status/1223190591934279682 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
@irsdl’s first post is a writeup for an RCE in SharePoint https://www.mdsec.co.uk/2020/01/code-injection-in-workflows-leading-to-sharepoint-rce-cve-2020-0646/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Awesome work finding an RCE in SharePoint by
@irsdl which also affected SharePoint Onlinehttps://twitter.com/MDSecLabs/status/1223280822700138497 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.https://www.matteomalvica.com/blog/2020/01/20/mimikatz-lsass-dump-windg-pykd/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Very excited to announce
@_xpn_ and me will be bringing our#redteam training to Vegas this August for@BlackHatEvents https://www.blackhat.com/us-20/training/schedule/index.html#adversary-simulation-and-red-team-tactics-18511 … - we'll follow up soon with some revelations on what makes this course so exciting!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation. https://doar-e.github.io/blog/2018/11/19/introduction-to-spidermonkey-exploitation/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Well for one, I felt the attention to detail was slipping.pic.twitter.com/EjeFkXGOeW
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: https://www.openwall.com/lists/oss-security/2020/01/28/3 … PS: "Did you ever play tic-tac-toe?"
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Rio proslijedio/la je Tweet
If
@tiraniddo's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:https://github.com/outflanknl/Scripts/blob/master/ShellcodeToJScript.js …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"https://www.zdnet.com/article/trend-micro-antivirus-zero-day-used-in-mitsubishi-electric-hack/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Got my hands on an http://O.mg.lol cable from
@hak5 Currently writing a#blueteam tool that will extract firmware and output the WiFi config + any custom payloads. Is this useful to others?pic.twitter.com/QjidWby741
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Congratulations to ph0well for winning our
@bsidesleeds CTF, we’ll be in touch shortly with details on how to claim your prize!pic.twitter.com/3QHHJfn1sW
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rio proslijedio/la je Tweet
Open Wifi Security (Friday evening rant) 1) Yes, at our
@nordic_choice hotels we have open wifi as standard. No Client<->AP encryption (WPA/23), and no captive portal to logon to. Let me first explain some obvious reasons for doing so. (Often disregarded by infosec pros.)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.