Tweetovi

Blokirali ste korisnika/cu @404death

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @404death

  1. Prikvačeni tweet
    8. pro 2019.

    you can UAC bypass all executable files which are autoelevate true base on my first article. UAC Bypass All the things POCs: sample: Bluetooth uninstall device task (UAC Bypass to administrator)

    Poništi
  2. proslijedio/la je Tweet
    prije 18 sati

    Stay positive Lolbins... not! rundll32 advpack.dll, RegisterOCX calc.exe rundll32 advpack.dll, #12 calc.exe rundll32 advpack.dll, #+12 calc.exe rundll32 advpack.dll, #-4294967284 calc.exe

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    Exploiting Format Strings in Windows

    Poništi
  4. proslijedio/la je Tweet
    2. velj
    Poništi
  5. proslijedio/la je Tweet
    3. sij
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  8. 30. sij

    Logical bugs are more fun than memory corruption bugs. bug and bug I will disclose details after vendor is fix.

    Poništi
  9. proslijedio/la je Tweet
    26. sij
    Poništi
  10. proslijedio/la je Tweet
    27. sij
    Poništi
  11. 27. sij

    I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed.

    Poništi
  12. proslijedio/la je Tweet
    25. sij

    Just finished the writeup for my learning process to replicate the CVE-2019-19470, I also public the source code for exploit and a Masquerade-PEB C#. Hope you enjoy!

    Poništi
  13. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    25. sij

    [Blog] Offensive Security - AWE/OSEE Review cc

    Poništi
  15. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Oh nice, just released their Powershell Adversary Tactics course material to the public for free \o/ "PowerShell is still used extremely heavily in the wild and defenders need to be equipped to detect all of the tactics they may employ. "

    Poništi
  17. proslijedio/la je Tweet
    22. sij

    Local Privilege Escalation in many Ricoh Printer Drivers for Windows (CVE-2019-19363) + Exploit

    Poništi
  18. proslijedio/la je Tweet
    17. sij

    Rumble in the pipe - a nice writeup about a vuln in by our teammate

    Poništi
  19. proslijedio/la je Tweet
    21. sij

    Added 2 more PoC scripts to the OffensiveDLR repo. One of which embeds the SSharp Compiler within a Posh script (Can be easily embedded from within any .NET language.) SSharp code compilation does not call csc.exe :)

    Poništi
  20. proslijedio/la je Tweet
    21. sij

    Senior Security Consultant describes the discovery of a privilege escalation in the Intel Trusted Connect Service Client and how to complete the in order to obtain local admin access

    Poništi
  21. proslijedio/la je Tweet
    21. sij

    Hey Defender friends. Turns out that removing those services with Unicode/non-printable characters is pretty hard, so I wrote you a tool to help with that. I'll be releasing the offensive PoC later this week or early next week.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·