Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ATeamJKR
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ATeamJKR
-
Thanks for the writeup. Actually this was my favorite challenge of the
#metasploitctfhttps://twitter.com/Jackson_T/status/1224508063111110656 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
#metasploitctf just ended and we scored 2nd! Well played everyone! Looking forward to receive our prizes from@metasploit :)pic.twitter.com/lTvhCV4mXx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
Another box solved the unintended way: RE. Once I had RCE after dropping an aspx webshell with the Winrar CVE, I used the UsoSvc service to gain SYSTEM and impersonated the Coby user to decrypt the root flag. Great box by
@0xdf_. https://snowscan.io/htb-writeup-re/#HackTheBoxHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
RE just retired from
@hackthebox_eu. As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.https://0xdf.gitlab.io/2020/02/01/htb-re.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just checked, but
@hackthebox_eu was not renamed to @hackthebox_uk yet. Wondering when this will happen?#Brexit#BrexitDayHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
ffuf 1.0 released! phew, this is a big one. Feature highlights in this thread Huge thanks for all the contributors, and special thanks to
@codingo_ for pulling off a feature bounty and@Ice3man543 for fulfilling it in a record time (and contributing said bounty to charity).Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
One more writeup for AI from
@hackthebox_eu is up: https://snowscan.io/htb-writeup-ai/ That SQL injection using text-to-speech gave me a hard time.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanks for writing this up! This means the (default) rpcNode password is known to the public as well now. Make sure to not ignore the warning about this. This can lead to straight RCE as root via the mgmt interface.
#CTX261055#shitrix#citrixhttps://twitter.com/dozernz/status/1217072757059358721 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
Ep 57: MS08-067 With special guest
@JohnLaTwC. Hear what goes on internally when Microsoft discovers a major vulnerability within Windows. https://darknetdiaries.com/episode/57/ pic.twitter.com/Dd2VrQTpMR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I saved my 111th tweet for today to say hello to all my 111111111 followers
. Hope from time to time you find interesting stuff in your timeline
! #thinkbinary#ilovenumbers#SymmetryOCD#ilovedigitspic.twitter.com/3kpTg7ASde
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
The latest in the
#shitrix saga - even if mitigations are applied, on some firmware versions the mitigations don't work as the rewrite policies Citrix supplied don't work due a bug.https://twitter.com/SecGuru_OTX/status/1217862423912251395 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Does this mean
@layle_ctf opened a CA business?
https://twitter.com/layle_ctf/status/1217379269082521600 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I was about to have a free weekend as
#CVE201919781 exploit work had been done by others already. Took the time to write about a more or less related project: Getting access to an encrypted appliance VM by modifying memory with help of VBoxDbg.https://github.com/ateamjkr/posts/blob/master/vboxdbg.md …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
Bitlab from
@hackthebox_eu was an opportunity to play with CICD, and to do some simple windows RE / debugging. https://0xdf.gitlab.io/2020/01/11/htb-bitlab.html … In Beyond Root, I'll show an alternative path from www-data to root, and look at how the exe mis-calls `GetUsernameW`.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
I didn't solve Bitlab the intended way but I still go over the initial shell with the PHP RCE. I used the git hooks method to gain root since git pull was sudo'ed root. Check out my writeup: https://snowscan.io/htb-writeup-bitlab/ …
#HackTheBoxHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag. https://github.com/trustedsec/cve-2019-19781 …
#TrustedSecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Now that
@TrustedSec released an exploit for#CVE201919781 I don’t need to write it myself. My plan for today was to put together the puzzle pieces after I found the undocumented TT2 code exec thing was posted on the project's GitHub issues page
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
I was able to reproduce the Citrix ADC Remote Command Execution in one day. Guess you need to patch ASAP.
#CVE-2019-19781#Citrixpic.twitter.com/KjsUOJQsLt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
jkr proslijedio/la je Tweet
As promised, I've documented some additional information from
@TripwireInc research into#citrix#netscaler#cve201919781. There is a bit of misleading information out there so I hope this will clear the air a bit. https://www.tripwire.com/state-of-security/vert/citrix-netscaler-cve-2019-19781-what-you-need-to-know/ … cc:@sans_isc@johullrichHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.