Tweetovi

Blokirali ste korisnika/cu @DigitalResidue

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @DigitalResidue

  1. prije 8 sati

    With their preferred webshells, the actors moved laterally to other systems on the network by dumping credentials with a variant of the notorious Mimikatz tool and using Impacket’s atexec tool to use dumped credentials to run commands on other systems.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  3. prije 12 sati

    . A utility to fake the Windows logon screen in order to obtain the user's password. The password entered is validated against the or local machine to make sure it is correct and is then saved to disk.

    Poništi
  4. proslijedio/la je Tweet
    prije 17 sati

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  5. prije 12 sati

    Dropbox bug bounty program has paid out over $1,000,000. To celebrate this momentous occasion, the Dropbox Production Security team wanted to disclose, in-depth, five of our favorite reports we’ve ever received.

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry.

    Poništi
  7. proslijedio/la je Tweet
    prije 14 sati

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  8. prije 13 sati
    Prikaži ovu nit
    Poništi
  9. prije 13 sati

    (Another Sudo bug). The discovered privilege escalation vulnerability, tracked as CVE-2019-18634, in question stems from a stack-based issue that resides in Sudo versions before 1.8.26. Exploited when the "pwfeedback" option is enabled.

    Prikaži ovu nit
    Poništi
  10. prije 14 sati

    The emails contain an Excel spreadsheets that once downloaded, asks the victim to enable macros. Now in the background, the (VBA) programming code for macros is being enabled for the malware to download to a directory.

    Poništi
  11. prije 14 sati

    The API endpoint targeted allows people who have created new accounts to find their friends on Twitter. The API queries which users have a phone number associated with their accounts. Someone was using a large network of fake accounts to exploit this API

    Poništi
  12. prije 14 sati

    SOAP API is made of an official standard while REST API is not. This makes REST API easy to use and deploy uses: HTTP, JSON , URL and XML uses: mostly HTTP and XML REST is more popular among developers than SOAP. But SOAP has better security

    Poništi
  13. prije 17 sati

    Mr. Schulte, 31 years old, faces 11 criminal counts, including illegal gathering and transmission of national defense information—charges that derive from the Espionage Act, a statute that has been applied in other WikiLeaks cases.

    Poništi
  14. 3. velj

    Sun told Raytheon that he went to Singapore and the Philippines. However, after providing inconsistent information as to his travel itinerary, Sun eventually admitted that he had travelled to China, Cambodia, and Hong Kong.

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  16. 2. velj

    is an extension built into for lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies. Users can execute a command on a remote system through WMI, DCOM, RDP, etc.

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  18. proslijedio/la je Tweet
    31. sij

    Wow! "Resources for Beginner Bug Bounty Hunters" has over 1000 stars on GitHub now and we just pushed a new update! Check it out:

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    The 30th HTB box I solve in preparation for the OSCP. Initial Foothold - XXE injection + lack of input validation on user supplied input into the pickle serialization library. Privilege Escalation - Root RSA private key in git history.

    Poništi
  20. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·