Iniquitous

@1n1qu170us

Infosec Noobie | OSCP | Security Researcher | ex Red Team| Blue Team |

Vrijeme pridruživanja: lipanj 2016.

Tweetovi

Blokirali ste korisnika/cu @1n1qu170us

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @1n1qu170us

  1. proslijedio/la je Tweet

    If Microsoft Teams is down for you... Remember it's Office *365* and there are 366 days in 2020.

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry.

    Poništi
  3. proslijedio/la je Tweet
    prije 14 sati

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  4. proslijedio/la je Tweet

    To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    The #1 cause of startup death is making something no one wants. The #2 cause is spending too much. Those two account for so many deaths that I'm not even sure what #3 is. If you merely make something people want and don't spend too much, you're way ahead.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    I once visited a high school to do a talk. At the start I asked how many of the kids wanted to be an author when they grew up. Out of about 120, only 1 hand went up. When I finished my talk, I asked again. I'm proud to say, hand on heart, 0 hands went up. Scared that one kid good

    Prikaži ovu nit
    Poništi
  7. 3. velj
    Poništi
  8. proslijedio/la je Tweet
    2. velj
    Poništi
  9. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Cutter v1.10.1 released! 🥳 Tomorrow, GitHub will capture and store every repository in an archival facility deep in an Arctic mountain. 🥶🗻 Today, we release a special edition for the benefit of future mankind and other beings 👽 Get it @ Highlights >>

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  12. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    I remember when I accidentally killed sshd while troubleshooting an issue. I was inconsolable.

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    31. sij
    Poništi
  16. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    31. sij

    How to hack yourself admin rights on any Autopilot installed Windows 10 - aka The Return of the Shift+F10!

    Poništi
  19. proslijedio/la je Tweet
    25. sij

    Threat Bus: a real-time pub/sub broker to get intelligence/indicators from and feed your in real-time & get sightings from your NIDS to MISP. A clever way to connect efficiently open source security tools. Thanks to

    Poništi
  20. proslijedio/la je Tweet
    29. sij

    How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·