Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @FuzzySec
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @FuzzySec
-
Prikvačeni tweet
Myself and
@TheRealWover are super excited to head out to BHIL to talk about covert injection tradecraft in .NET

https://twitter.com/BlueHatIL/status/1219306208554889216 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
The
#BlueHatIL venue is a mind blowing, dystopian take on the state of the world. Easily the best BlueHat of the 8 I’ve now been to zomg
pic.twitter.com/3nGRnqH6vz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
Custom Signed Kernel Driver's Pretty cool
Without the need to enable TestSigning.
Sample Project:
https://github.com/HyperSine/Windows10-CustomKernelSigners …pic.twitter.com/opyM91m1HI
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
https://whynotsecurity.com/blog/teamviewer/ … Teamviewer has been storing user passwords encrypted with AES, not hashed, in the registry accessible to low privilege users on the machine. This works for versions dating back from at least as far back as 2012 to the latest version.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
Our first blog post of 2020 is out! Learn about how we discovered a heap overflow in the F-Secure Internet Gatekeeper, which leads to unauthenticated RCE https://blog.doyensec.com/2020/02/03/heap-exploit.html …
#infosecpic.twitter.com/z5ZUEETMnp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
b33f proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, https://github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working. https://github.com/inv-ds-research/yaraml_rules …pic.twitter.com/sfuXEkHeNO
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
[Excellent Read] Was reviewing some of the data in this blog. Solid Write up. https://posts.specterops.io/mimidrv-in-depth-4d273d19e148 … by
@matterpreterHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
The code to execute in JS via "System.Runtime.InteropServices.RegistrationServices" here: https://ghostbin.co/paste/krdqe You need to expose a static method public static void UnRegisterClass(string key) And of course you need an assembly object :) Cheers
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
Want to see how the
@Mandiant red team weaponizes@FireEye threat intel for R&D and TTP development? Check out some research I did with@evan_pena2003 and@FuzzySec. Also includes some new executables that can be used for DLL abuse.https://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation. https://doar-e.github.io/blog/2018/11/19/introduction-to-spidermonkey-exploitation/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is). https://www.tiraniddo.dev/2020/01/dont-use-system-tokens-for-sandboxing.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
An attempt to demystify the process of security research and to shine a light on how close within one's reach it is. A specific example of advice I'd offer myself: 1/3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
Tell me again how hacking is not arthttps://twitter.com/pozdnychev/status/1222297493339361281 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I added a mimikatz MemSSP style hook to Fermion, you can check out the code here => https://github.com/FuzzySecurity/Fermion/blob/master/Examples/MemSSP.js … This is based on the great write-ups by
@spotheplanet &@_xpn_pic.twitter.com/8Ny4lsc2Bj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
We’re doing it again
https://twitter.com/MDSecLabs/status/1221771854509199360 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b33f proslijedio/la je Tweet
Move Faster, Stay Longer https://posts.specterops.io/move-faster-stay-longer-6b4efab9c644 … blog about extending CS and tools to go with it.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'm teaching myself some automation with Chef. I wrote my first cookbook today
. I'll add some code as I go on GitHub if people are interested => https://github.com/FuzzySecurity/AdventuresWithChef …pic.twitter.com/EBCGkh55Gj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
/ Undocumented / I rewrite pointers and read memory / Tempora mutantur, nos et mutamur in illis