Rich Mirch

@0xm1rch

UNIX/Linux Sysadmin turned Penetration Tester, Red Teamer, Security Researcher

Vrijeme pridruživanja: kolovoz 2014.

Tweetovi

Blokirali ste korisnika/cu @0xm1rch

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xm1rch

  1. Prikvačeni tweet
    18. pro 2019.

    Earlier this month I discovered a privilege escalation vulnerability in the Signal Desktop Windows client. This vulnerability has been patched in v1.29.1 which was released yesterday. Write-up: 1/2

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    w00t! So excited to announce our new course at - Adversary Emulation and Active Defense! 4Day - Combining the spheres of offense and defense to teach core concepts.

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    Hello hunters ! last year i published my recon map, this year i share with you my checklist ! Feel free to ask questions and make comment to improve it ! and hope you enjoy ;)

    Poništi
  7. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  10. proslijedio/la je Tweet
    21. sij

    Our first intern, created a project called Satellite to automate C2 traffic redirection. In this post, he talks about some of the keying, proxying, and filtering options of the project. Read more here: Project link:

    Poništi
  11. proslijedio/la je Tweet
    17. sij
    Poništi
  12. 13. sij

    Kudos to SparkLabs for fast response, great communication, and for the design decision to limit privileges. Most VPN clients do not take this approach. I will post the technical details at a later date.

    Prikaži ovu nit
    Poništi
  13. 13. sij

    CVE-2020-5180 Viscosity macOS, Windows Limited Elevation of Privilege Vulnerability. This was a fun to research but was unable to leverage it to do much due to the dropping of privileges. It's refreshing to find an application with security baked in.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    13. sij

    Sources say Microsoft on Tuesday will fix an extraordinarily scary flaw in all Windows versions, in a core cryptographic component that could be abused to spoof the source of digitally signed software. Apparently DoD & a few others got an advance patch

    Prikaži ovu nit
    Poništi
  15. 10. sij
    Poništi
  16. proslijedio/la je Tweet
    9. sij

    I may not have many followers, but if anyone knows someone who needs an IT veteran with 20 years’ experience, who learned Cisco when telnetting to a switch was not a security risk, and who has a CISSP, SSCP, and several other certs, my DMs are open.

    Poništi
  17. proslijedio/la je Tweet
    8. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    How to drive someone completely nuts at Linux shell prompt (add to their ~/.bashrc): alias ls='ls -l | lolcat -a' ls

    Poništi
  19. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi
  20. proslijedio/la je Tweet
    31. pro 2019.

    New year gift 🎉 Set up a free server to exploit blind vulnerabilities! 1. 2. sudo apt-get install apache2 pagekite 3. add "ServerName localhost" to /etc/apache2/apache2.conf 4. 80->8080 in /etc/apache2/ports.conf 5. pagekite 8080

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    27. pro 2019.

    SharpSploit v1.5 is out! Includes amazing work from , , , , and . Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements. 🔥🔥🔥

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·