Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Big5_sec
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Big5_sec
-
Prikvačeni tweet
Given the feedback on the tweet from
@decalage2 about SourceFu (like@shotgunner101), i launched a little blog with a first post on how to contribute to SourceFu : https://big5-sec.github.io/SourceFu/blog/how-to-contribute-to-sourcefu-part-1-lets-parse-a-new-language.html … If there are any questions, don't hesitate to DM :)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Hello dear followers, nous recherchons un•e vacataire pour des cours sur la sécurité des services web à
@IMTAtlantique#Rennes#wanted contact en MP
Le retweet serait merveilleux
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
[New Post] Backdoor Schneider M340 PLC using
#Stuxnet -like attack based on DLL-Reflective. Deep dive from Grafcet/Ladder processing to#ARM assembly. Inject your own C payload into PLC to perform funny things like TCP port scanner, lateral movement... https://airbus-cyber-security.com/applying-a-stuxnet-type-attack-to-a-schneider-modicon-plc-airbus-cybersecurity/ …pic.twitter.com/hNo8CuXJB1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
We just updated the executive callback repo with a research on the callback used by PatchGuard
@0xcpuhttps://github.com/0xcpu/ExecutiveCallbackObjects/tree/master/542875F90F9B47F497B64BA219CACF69 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
As I've recently gotten into browser exploitation, I thought I'd solve and do a writeup for a CTF challenge from earlier this year that really doesn't have any detailed writeups. Hope someone finds my writeup for *CTF 2019 oob-v8 useful! DMs are open.https://syedfarazabrar.com/2019-12-13-starctf-oob-v8-indepth/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.https://gts3.org/2019/Real-World-CTF-2019-Safari.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Finally took the time to implement Base Relocation in my VBA RunPE. https://github.com/itm4n/VBA-RunPE Damn! That was challenging!
Big thanks to @hasherezade for sharing great content on Process Hollowing!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Big5 proslijedio/la je Tweet
We analyzed a scenario where a malicious user can exploit a vulnerable web app using the following methods: Simple Network Management Protocol (SNMP) > Cross-site scripting (XSS) > Remote Code Execution (RCE).https://hubs.ly/H0m01890
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
#oletools 0.55 is finally out, just in time for#BHEU! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: https://github.com/decalage2/oletools/releases/tag/v0.55 … How to install/update: pip install -U oletoolspic.twitter.com/zGEJqoQRUy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Today marks the release of the debugging and tracing library I have intermittently worked on over the years. The name is a tribute to the interface that has so generously provided us with local privilege escalation for several decades. May it be of use.https://github.com/immunityinc/libptrace …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
I just released "lsassy" ! Tool to remotely parse lsass dumps using
#impacket and#pypykatz Automate the whole process using my CME module
lsassy : https://github.com/Hackndo/lsassy
CME Module : https://gist.github.com/Hackndo/4326c724ef1e9b71b12f8d104973a799 …
French article about this technique : https://beta.hackndo.com/remote-lsass-dump-passwords/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Here's a quick script to check if an OpenXML file (docx/xlsx/pptx) contains any unusual URL/IP/executable filename: https://gist.github.com/decalage2/dce5be81df952ac746087207b42f3dc8 … It's a simple way to extract links for template injection used in some maldocs like the Donot campaign:https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Indian/APT/Donot/17-09-19/Malware%20analysis.md …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Thread on an interesting patch diffing session (CVE-2019-1429). Not too many modified matched functions between last vulnerable and first patched jscript.dll on Windows 10 v1809, and at closer inspection, only two types of changes deployed at ~10 locations each.https://twitter.com/0patch/status/1200078528710086665 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
If you’re into firmware exploitation the blog posts by
@d_olex are a goldmine: http://blog.cr4.shHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
(1/2) Here is my analysis of Tencent's Legu: https://blog.quarkslab.com/a-glimpse-into-tencents-legu-packer.html … Most of the analysis was done thanks to open source tools: - Frida (devkit) for hooking - QBDI (AArch64) for memory traces and instruction traces - Kaitai struct for reverse engineering the custom formatspic.twitter.com/dcWpjju4gl
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
You gotta be kidding Mi - We just published the Xiaomi Pwn2Own 2018 advisories, which were patched just before Pwn2Own 2019, for silent APK install in the Browser and WiFi categories by
@munmap https://labs.f-secure.com/advisories/xiaomi/ … and https://labs.f-secure.com/advisories/xiaomi-wifi/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Correction: Take a deep dive into a
#Pwn2Own winning#WebKit bug as@ziadrb breaks down an entry used by@fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver.http://bit.ly/2OMZNj5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Today I was able to release the first post of a series of blog posts about attacking FreeIPA, an open source alternative to Windows Active Directory inside of unix environments. This post covers authentication, and situational awareness.https://posts.specterops.io/attacking-freeipa-part-i-authentication-77e73d837d6a …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If some people are already using pcode2code, don't hesitate to update it.
@VessOnSecurity throw-back has been really useful to find out some uncompiled cases.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big5 proslijedio/la je Tweet
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movementhttps://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.