Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @404death
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @404death
-
Prikvačeni tweet
you can UAC bypass all executable files which are autoelevate true base on my first article. UAC Bypass All the things POCs: https://github.com/sailay1996/UAC_Bypass_In_The_Wild … sample: Bluetooth uninstall device task (UAC Bypass to administrator)pic.twitter.com/TawDPFRvLc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Stay positive Lolbins... not! http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/ …
#LOLBIN rundll32 advpack.dll, RegisterOCX calc.exe rundll32 advpack.dll, #12 calc.exe rundll32 advpack.dll, #+12 calc.exe rundll32 advpack.dll, #-4294967284 calc.exePrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
sailay(valen) proslijedio/la je Tweet
Chapter 6 has been published!https://leanpub.com/windows10systemprogramming …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Next Windows Internals (Remote) Traininghttp://scorpiosoftware.net/2020/01/03/next-windows-internals-remote-training/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Load encrypted PE from XML Attribute. MSBuild is still the best.
https://github.com/XwingAngel/PELoader/ …
MSBuild sets Property then calls Execute.
Use this example to decouple payloads & prove that all security products have a "Single File Bias".
Decouple payloads to subvert detection.pic.twitter.com/648rujlLQn
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2020/01/chasing-polar-bears-part-2.html … Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Logical bugs are more fun than memory corruption bugs.
#privilege_escalation bug and#privilege_file_deleted bug I will disclose details after vendor is fix.#LPEpic.twitter.com/wxcv02Eicx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
sailay(valen) proslijedio/la je Tweet
MSBuild without MSBuild.exehttps://pentestlaboratories.com/2020/01/27/msbuild-without-msbuild/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed. https://github.com/sailay1996/awesome_windows_logical_bugs …
#windows_logical_privilege_escalationpic.twitter.com/nRxvGq40LX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Just finished the writeup for my learning process to replicate the CVE-2019-19470, I also public the source code for exploit and a Masquerade-PEB C#. Hope you enjoy! https://plaintext.do/CVE-2019-19470_learning_journey/ …https://twitter.com/JulioUrena/status/1219460407653470208 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
[Blog] Offensive Security - AWE/OSEE Review https://tinyurl.com/tyeqlg3 cc
@h0mbre_@TJ_Null@offsectrainingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Post-exploitation
#Friday tip: Do you know how to trivially & remotely hijack an#RDP session without prompt nor warning on user's side using#Microsoft signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details: https://github.com/kmkz/Pentesting/blob/master/Post-Exploitation-Cheat-Sheet …#Pentestingpic.twitter.com/wHVIYQo73A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Oh nice,
@SpecterOps just released their Powershell Adversary Tactics course material to the public for free \o/ "PowerShell is still used extremely heavily in the wild and defenders need to be equipped to detect all of the tactics they may employ. "https://github.com/specterops/at-ps …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Local Privilege Escalation in many Ricoh Printer Drivers for Windows (CVE-2019-19363) + Exploithttps://www.pentagrid.ch/en/blog/local-privilege-escalation-in-ricoh-printer-drivers-for-windows-cve-2019-19363/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Rumble in the pipe - a nice writeup about a
#privesc vuln in#tinywall by our teammate@frycoshttps://codewhitesec.blogspot.com/2020/01/cve-2019-19470-rumble-in-pipe.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Added 2 more PoC scripts to the OffensiveDLR repo. One of which embeds the SSharp Compiler within a Posh script (Can be easily embedded from within any .NET language.) SSharp code compilation does not call csc.exe :)https://github.com/byt3bl33d3r/OffensiveDLR …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Senior Security Consultant
@Oddvarmoe describes the discovery of a privilege escalation in the Intel Trusted Connect Service Client and how to complete the#exploit in order to obtain local admin accesshttps://hubs.ly/H0mG7VY0Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sailay(valen) proslijedio/la je Tweet
Hey Defender friends. Turns out that removing those services with Unicode/non-printable characters is pretty hard, so I wrote you a tool to help with that. I'll be releasing the offensive PoC later this week or early next week. https://github.com/matterpreter/OffensiveCSharp/commit/089c1db4909ab365b45fb69e45abb1adcac2861e#diff-e8991566df61818c826e7964e3078579 …pic.twitter.com/SCEV9WtpnF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.