Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @1nternaut
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @1nternaut
-
GRUzzly Bear proslijedio/la je Tweet
This is by far the best sticker I got
@ShmooConpic.twitter.com/aLymvQjWgM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
Why are people not OK with Huawei, but everyone uses Lenovo laptops anyways?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
GRUzzly Bear proslijedio/la je Tweet
#FakeLogonScreen is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with#CobaltStrike's execute-assembly command. https://github.com/bitsadmin/fakelogonscreen …pic.twitter.com/2pAOk9InLMHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!
#googlemapshacks http://www.simonweckert.com/googlemapshacks.html …pic.twitter.com/6KcMm1XgAF
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Welcome to the USA where the definition of "good" or "bad" person is left to dodgy companies.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The next time someone blames china for their social credit system show them this:https://twitter.com/kmlefranc/status/1221869659139366912 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2020/01/chasing-polar-bears-part-2.html … Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
A major cyber espionage campaign in Europe and the Middle East is attributed to Turkish services. The effort, which featured large-scale DNS hijacking, targeted some thirty organizations, including government agencies in Albania, Greece, Iraq, and Cyprushttps://www.reuters.com/article/us-cyber-attack-hijack-exclusive-idUSKBN1ZQ10X …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring
#SIEM#SecurityMonitoring#ThreatHuntingpic.twitter.com/wuWImWLB77
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
"DAX30-Konzerne hatten schon früher Kenntnis von der
#Sicherheitslücke – entschieden sich aber, diese nicht dem#BSI zu melden; angels Vertrauen, dass diese Erkenntnisse nicht auch über das#BMI an die#Sicherheitsbehörden zur Ausnutzung gelangen würden!" https://ag.kritis.info/2020/01/26/shitrix-was-kann-der-gesetzgeber-aus-dem-citrix-vorfall-lernen-und-fuer-kritis-betreiber-verbessern/ …pic.twitter.com/Ff8YWkxQne
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
This is the top search result on shutterstock for the phrase "hacker." I remember the first time I popped a shell using the power of algebra.pic.twitter.com/CH9quZbqio
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je Tweet
Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"https://www.zdnet.com/article/trend-micro-antivirus-zero-day-used-in-mitsubishi-electric-hack/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
GRUzzly Bear proslijedio/la je Tweet
Post-exploitation
#Friday tip: Do you know how to trivially & remotely hijack an#RDP session without prompt nor warning on user's side using#Microsoft signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details: https://github.com/kmkz/Pentesting/blob/master/Post-Exploitation-Cheat-Sheet …#Pentestingpic.twitter.com/wHVIYQo73A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GRUzzly Bear proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
GRUzzly Bear proslijedio/la je Tweet
A SOC operator notices an anomaly on a dashoard
#infosecpic.twitter.com/zgpZnGZU3yHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.