Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @EliteMocca
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EliteMocca
-
Elite Mocca proslijedio/la je Tweet
This is exactly how we solved the challenge. It's crazy that two teams independently solved the challenge with a CPU bug. I wanted to write a write-up earlier but I've been lazy :( Nevertheless this posts pretty much sums it up. Worth reading!http://blog.ret2.io/2019/06/26/attacking-intel-tsx/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Elite Mocca proslijedio/la je Tweet
What kickstarted my Threat Hunting career by Developing advanced algorithms to detect anomalies and patterns in DNS traffic. https://sites.cs.ucsb.edu/~chris/research/doc/ndss11_exposure.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
The Google Omega paper: https://research.google.com/pubs/archive/41684.pdf … The CALM paper: https://arxiv.org/abs/1901.01930 Site Reliability Engineering Architecting For Scale A Philosophy of Software Design
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
A threat actor encyclopedia listing APT groups prepared by
@ThaiCERT:https://www.dropbox.com/s/ds0ra0c8odwsv3m/Threat%20Group%20Cards.pdf?dl=0 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
XXEs in the wild: -Read access to Google: https://blog.detectify.com/2014/04/11/how-we-got-read-access-on-googles-production-servers/ … -A Facebook XXE with Word: https://www.bram.us/2014/12/29/how-i-hacked-facebook-with-a-word-document/ … -The Wikiloc XXE: https://www.davidsopas.com/wikiloc-xxe-vulnerability/ …
#BugBounty#Hacking#pentest#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
Lots of new Windows Defender Application Control (WDAC) features documented for 1903! Multiple policy support: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies … Path-based rules: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/create-path-based-rules … COM class whitelisting:https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
Such a cool blog on debugging exploit UEFI via Intel DCI https://casualhacking.io/blog/2019/6/2/debug-uefi-code-by-single-stepping-your-coffee-lake-s-hardware-cpu …
@teddyreedv is the manPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
I've got reliable RCE on Windows 7 / Server 2008 and I have very little experience with kernel exploitation... Now I understand why MSRC considers CVE-2019-0708 so dangerous.pic.twitter.com/ChGYTgyetV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
How Red Teams Bypass AMSI and WLDP for .NET Dynamic Codehttps://modexp.wordpress.com/2019/06/03/disable-amsi-wldp-dotnet/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
Added process tree and version "sysinfo" module to MemProcFS. Connect to live memory or double click on memory dump file to analyze Windows memory in convenient easy to use and extremely fast file system! https://github.com/ufrisk/MemProcFS …pic.twitter.com/cu35yrOXwT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
Trying to follow along the great browser exploitation series of
@LiveOverflow, but on V8 instead of JSC, and using Windows/WinDbg instead of Mac/lldb :) Making some notes here:https://medium.com/@stankoja/v8-bug-hunting-part-1-setting-up-the-debug-environment-7ef34dc6f2de …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
Awesome blog post by
@MrUn1k0d3r! Blog talks about finding COM objects that allows an attacker to get arbitrary command execution:https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
Any guess how to find races through fuzzing? Here's our approach, Razzer (https://github.com/compsec-snu/razzer …), which found 16 new race bugs in the Linux kernel
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
GitHub - lr3800/CVE-2019-0708: CVE-2019-0708 exploit https://github.com/lr3800/CVE-2019-0708/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
One of my favorite things about
#BloodHound is visualizing how GPOs apply to any given user or computer. In this image you see quite clearly how the GPOs (purple) apply to the computer (red) by being linked to the domain (teal) and OUs (orange) in the OU tree above the computerpic.twitter.com/tCNKv7N5KB
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
Are you wondering what free available data sources you could use to detect the
@MITREattack Round 1- APT3 (Second Scenario) playbook?@Cyb3rPandaH & I just released the APT3 Mordor dataset
here https://github.com/Cyb3rWard0g/mordor/tree/master/large_datasets/apt3 … 


@x33fcon#ThreatHunting Demo:https://youtu.be/5fpQfpScdnUHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
So I have started working on a ghidra tutorial series. The first tutorial is about the installation process.
#learnit,#securityhttps://www.reddit.com/r/LiveOverflow/comments/bnrnye/so_i_have_started_working_on_a_ghidra_tutorial/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Elite Mocca proslijedio/la je Tweet
We've confirmed exploitability of Windows Pre-Auth RDP bug (CVE-2019-0708) patched yesterday by Microsoft. Exploit works remotely, without authentication, and provides SYSTEM privileges on Windows Srv 2008, Win 7, Win 2003, XP. Enabling NLA mitigates the bug. Patch now or GFY!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New research links the theft of sensitive European Union diplomatic cables by an alleged Chinese APT to a whole host of additional attacks on internal Chinese political targets thought to have been carried out by different Chinese APT groups.https://threatvector.cylance.com/en_us/home/reaver-mapping-connections-between-disparate-chinese-apt-groups.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.