Elite Mocca

@EliteMocca

CTF Players

Everywhere
Vrijeme pridruživanja: studeni 2018.

Tweetovi

Blokirali ste korisnika/cu @EliteMocca

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EliteMocca

  1. proslijedio/la je Tweet
    27. lip 2019.

    This is exactly how we solved the challenge. It's crazy that two teams independently solved the challenge with a CPU bug. I wanted to write a write-up earlier but I've been lazy :( Nevertheless this posts pretty much sums it up. Worth reading!

    Poništi
  2. proslijedio/la je Tweet
    16. lip 2019.
    Poništi
  3. proslijedio/la je Tweet
    16. lip 2019.
    Odgovor korisnicima

    What kickstarted my Threat Hunting career by Developing advanced algorithms to detect anomalies and patterns in DNS traffic.

    Poništi
  4. proslijedio/la je Tweet
    16. lip 2019.

    The Google Omega paper: The CALM paper: Site Reliability Engineering Architecting For Scale A Philosophy of Software Design

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    16. lip 2019.

    A threat actor encyclopedia listing APT groups prepared by :

    Poništi
  6. proslijedio/la je Tweet
    15. lip 2019.
    Poništi
  7. proslijedio/la je Tweet
    Poništi
  8. proslijedio/la je Tweet
    3. lip 2019.
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    3. lip 2019.

    I've got reliable RCE on Windows 7 / Server 2008 and I have very little experience with kernel exploitation... Now I understand why MSRC considers CVE-2019-0708 so dangerous.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    3. lip 2019.

    How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code

    Poništi
  11. proslijedio/la je Tweet
    4. lip 2019.

    Added process tree and version "sysinfo" module to MemProcFS. Connect to live memory or double click on memory dump file to analyze Windows memory in convenient easy to use and extremely fast file system!

    Poništi
  12. proslijedio/la je Tweet
    4. lip 2019.

    Trying to follow along the great browser exploitation series of , but on V8 instead of JSC, and using Windows/WinDbg instead of Mac/lldb :) Making some notes here:

    Poništi
  13. proslijedio/la je Tweet
    4. lip 2019.

    Awesome blog post by ! Blog talks about finding COM objects that allows an attacker to get arbitrary command execution:

    Poništi
  14. proslijedio/la je Tweet
    26. svi 2019.

    Any guess how to find races through fuzzing? Here's our approach, Razzer (), which found 16 new race bugs in the Linux kernel

    Poništi
  15. proslijedio/la je Tweet
    15. svi 2019.

    GitHub - lr3800/CVE-2019-0708: CVE-2019-0708 exploit

    Poništi
  16. proslijedio/la je Tweet
    15. svi 2019.

    One of my favorite things about is visualizing how GPOs apply to any given user or computer. In this image you see quite clearly how the GPOs (purple) apply to the computer (red) by being linked to the domain (teal) and OUs (orange) in the OU tree above the computer

    Poništi
  17. proslijedio/la je Tweet
    15. svi 2019.

    Are you wondering what free available data sources you could use to detect the Round 1- APT3 (Second Scenario) playbook? & I just released the APT3 Mordor dataset 👿 here 😊🍻💜 Demo:

    Poništi
  18. proslijedio/la je Tweet
    14. svi 2019.

    So I have started working on a ghidra tutorial series. The first tutorial is about the installation process. ,

    Poništi
  19. proslijedio/la je Tweet

    We've confirmed exploitability of Windows Pre-Auth RDP bug (CVE-2019-0708) patched yesterday by Microsoft. Exploit works remotely, without authentication, and provides SYSTEM privileges on Windows Srv 2008, Win 7, Win 2003, XP. Enabling NLA mitigates the bug. Patch now or GFY!

    Poništi
  20. 15. svi 2019.

    New research links the theft of sensitive European Union diplomatic cables by an alleged Chinese APT to a whole host of additional attacks on internal Chinese political targets thought to have been carried out by different Chinese APT groups.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·