Ben Ten (0xA)

@Ben0xA

Christian, Penetration Tester, Defender, Developer, Gamer, Not PowerShell (nps) & nps_payload Creator, PoLRBear Project || Views are my own!

Dallas
Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @Ben0xA

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Ben0xA

  1. Prikvačeni tweet
    9. ruj 2019.

    Check out Privilege De-escalation with from a meterpreter shell. had asked what would happen if you did an interactive shell via meterpreter, so I thought I'd share. Watch in 1080p.

    Poništi
  2. proslijedio/la je Tweet

    Come check us out at this year in Vegas for an intense 4-day training on Attack and Defense - Hands-on Purple Team Simulations. I'll be there with the team!

    Poništi
  3. 3. velj

    This game is so "in tents", I am camping! Go sportsball!

    Poništi
  4. 3. velj

    Hole in One Chiefs!!!!!!!!!!!! On a par 10 even.

    Poništi
  5. 2. velj

    Watch sportsball with the windows open because its 76 outside!

    Poništi
  6. 31. sij
    Prikaži ovu nit
    Poništi
  7. 31. sij

    When an entire government creates a law because everyone is tired of multiple different dongles for mobile devices.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    31. sij

    TrustedSec is breaking into a new building in 2021: our new HQ! "We want Fairlawn to be the center for for Northeast Ohio.” - Cybersecurity firm plans move to Fairlawn

    Poništi
  9. 31. sij

    So... I wasn't sure I was going to sign up for CBS All Access to watch it. Even at the end of the episode. Then they showed a preview of what was to come and now I have CBS All Access.... You have been warned :)

    Prikaži ovu nit
    Poništi
  10. 31. sij

    I am not ashamed to say I started drinking Earl-Grey tea because of Jean-Luc Picard. The first episode of Picard is free to watch on Youtube for a limited time! Happy Weekend.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    26. sij

    It is with great sadness that we learn of the death of Kobe Bryant and four others in a helicopter crash in Calabasas. The aircraft went down in a remote field off Las Virgenes around 10:00 this morning. Nobody on the ground was hurt. The FAA and NTSB are investigating.

    Poništi
  12. 24. sij

    In all seriousness, I thought he was farting a ton. Then I saw he was actually yawning the whole time.

    Prikaži ovu nit
    Poništi
  13. 24. sij

    What is the best possible way to inform the passenger sitting next to you that their halitosis almost requires medical attention?

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Ari, our new furensicat, is ready to dig into the IR first responder course. Want to join him? Let me know if this is something everyone is interested in!

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    Come join me in my first ever webinar. Topic is AppLocker

    Poništi
  16. proslijedio/la je Tweet
    20. sij

    Got hit with a new backdoor on the CVE-2019-19781 honeypot last night. Its a DDoS bot that comms over...IRC 😂 Watch out for conns to 50.71.90.246:4545 and files named /tmp/.perl

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. sij

    What about no directory traversal at all on CVE-2019-19781 ? 😨 GET /vpns/portal/scripts/picktheme.pl POST /vpns/portal/scripts/rmbm.pl POST /vpns/portal/scripts/newbm.pl

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    13. sij

    Oh boy, there is more ! You can also exploit CVE-2019-19781 using the file ! 🧐 The exploit can be done using only two GET requests and not one POST & one GET 🥴

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    We have a full working RCE for the Citrix vulnerability from our team (not releasing). Works extremely well. Patch your things.

    Prikaži ovu nit
    Poništi
  21. 1. sij

    Happy Year++;

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·