GRUzzly Bear

@1nternaut

-Bear following the *ptr to nirvana. Emerging Threat. lvl.42.Hide your EIP! Founder of Cleaning Crew.

Insert shellcode here[ ]
Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @1nternaut

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @1nternaut

  1. proslijedio/la je Tweet

    This is by far the best sticker I got

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Why are people not OK with Huawei, but everyone uses Lenovo laptops anyways? 🤓

    Poništi
  3. 2. velj
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  7. 2. velj

    Welcome to the USA where the definition of "good" or "bad" person is left to dodgy companies.

    Prikaži ovu nit
    Poništi
  8. 2. velj

    The next time someone blames china for their social credit system show them this:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    27. sij

    A major cyber espionage campaign in Europe and the Middle East is attributed to Turkish services. The effort, which featured large-scale DNS hijacking, targeted some thirty organizations, including government agencies in Albania, Greece, Iraq, and Cyprus

    Poništi
  11. proslijedio/la je Tweet
    26. sij

    Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring

    Poništi
  12. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  13. proslijedio/la je Tweet

    "DAX30-Konzerne hatten schon früher Kenntnis von der – entschieden sich aber, diese nicht dem zu melden; angels Vertrauen, dass diese Erkenntnisse nicht auch über das an die zur Ausnutzung gelangen würden!"

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    This is the top search result on shutterstock for the phrase "hacker." I remember the first time I popped a shell using the power of algebra.

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    25. sij

    Von wegen Punk ist tot...

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  19. proslijedio/la je Tweet
    24. sij

    5MB Hard Disk Drive, 1956.

    Poništi
  20. proslijedio/la je Tweet
    24. sij

    A SOC operator notices an anomaly on a dashoard

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·