Tweetovi

Blokirali ste korisnika/cu @B51404EE

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @B51404EE

  1. proslijedio/la je Tweet
    24. sij

    On a évoqué l'idée il y a un an, on a concrétisé un groupe de travail il y a 9 mois. et sont très heureux de vous annoncer la présentation publique de leur nouveau livre blanc pour les décideurs et dirigeants le 28 janvier au

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    18. sij

    Here my GitHub with many scripts useful for red teamers - Enjoy!

    Poništi
  3. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  4. proslijedio/la je Tweet
    2. sij

    lsassy 1.0.0 is finally out ! 🔸 Remotely dump **with built-in Windows tools only**, procdump is no longer necessary 🔸 Remotely parse lsass dumps to extract credentials 🔸 Link to to detect compromised users with path to Domain Admin

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  6. proslijedio/la je Tweet
    3. pro 2019.

    Plutôt cool : release de IAM Access Analyser 🔐🔗 Une fonction attendue depuis très longtemps !! 👍 ➡️ Audit et surveillance continue des des accès et permissions aux services et ressource AWS (Bucket S3, Lambda, SQS...) ☁️

    Poništi
  7. proslijedio/la je Tweet
    3. pro 2019.

    Today I'm releasing a novel DNS covert channel implant. Everything is done over encoded AAAA requests (hostnames) and responses (IPv6 addresses) so it evades existing DNS detections. Low bandwidth, 100% Python3 with no dependencies, run it anywhere

    Poništi
  8. proslijedio/la je Tweet

    SCShell SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. The beauty of this tool is that it does not perform authentication against SMB. Everything is performed over DCERPC.

    Poništi
  9. proslijedio/la je Tweet
    18. stu 2019.

    We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter

    Poništi
  10. proslijedio/la je Tweet
    7. stu 2019.
    Poništi
  11. proslijedio/la je Tweet
    23. lis 2019.

    Amazing work by Miriam Wiesner () on creating visibility and mapping between MITRE and windows event logs allowing to create GPOs for better and more intelligent choices

    Poništi
  12. proslijedio/la je Tweet
    5. lis 2019.

    Fingerprint detailed Windows version, gather exact server time, check if SMB signing and IPC$ null sessions are enabled, and finally if RDP is open for all machines on a class C network takes ./Runfinger.py ~2,5 seconds :)

    Poništi
  13. proslijedio/la je Tweet
    4. lis 2019.

    Confluence Unauthorized RCE Vulnerability (CVE-2019-3396) Analysis

    Poništi
  14. proslijedio/la je Tweet
    13. ruj 2019.

    New post. Coding a powershell bind shell that bypass that troublesome Windows Firewall pop-up when binding tcp sockets! No need for Local admin either.

    Poništi
  15. proslijedio/la je Tweet
    12. ruj 2019.

    Procdump alternative that may come handy during There is a C and a C# version that can be used with execute-assembly ❤

    Poništi
  16. proslijedio/la je Tweet
    9. ruj 2019.
    Poništi
  17. proslijedio/la je Tweet
    Poništi
  18. proslijedio/la je Tweet
    27. kol 2019.

    Super helpful cheatsheet on kerberos based attacks (rubeus/impacket).

    Poništi
  19. proslijedio/la je Tweet
    23. kol 2019.

    [Blog] RACE - Minimal Rights and ACE for Active Directory Dominance

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    24. lip 2019.

    Red Team attacks & Blue Team Defenses

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·