Gadix

@GadixCRK

Malware Analyst / RCE

Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @GadixCRK

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GadixCRK

  1. proslijedio/la je Tweet
    1. velj

    Cutter v1.10.1 released! 🥳 Tomorrow, GitHub will capture and store every repository in an archival facility deep in an Arctic mountain. 🥶🗻 Today, we release a special edition for the benefit of future mankind and other beings 👽 Get it @ Highlights >>

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    23. sij

    r2frida 4.2 is out! You can now use breakpoints and eternalize scripts in ! /cc

    Poništi
  3. proslijedio/la je Tweet
    22. sij
    Poništi
  4. proslijedio/la je Tweet
    20. sij

    My IDA Plugins HeapViewer and deREferencing have been ported to Python3 on GitHub. Both should support python2/3. If you find any error, let me know:

    Poništi
  5. proslijedio/la je Tweet
    21. sij
    Poništi
  6. proslijedio/la je Tweet
    16. sij

    En estos dos días, recopilé 1330 servidores SMTP's que son parte de la botnet de SPAM de EMOTET, en los flujos de red se pueden ver las distintas credenciales de acceso que utiliza la botnet para intentar loguearse :D El listado de SMTP's 💉

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    16. sij

    Updated PoC to include the root trusted CA "Microsoft ECC Product Root Certificate Authority 2018" Also included a signed and unsigned 7z.exe for you to test out. Please only use for research and education.

    Poništi
  8. proslijedio/la je Tweet
    16. sij

    Yep, managed to combine a few CVE-2020-0601 POC guides to sign a binary which unpatched Windows will determine to be valid. The CA does not need to be the MS ECC Authority. It's CRITICAL to patch this for Windows 10/2016/2019 OS relying on publisher trust for App Whitelisting.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    16. sij
    Poništi
  10. proslijedio/la je Tweet
    15. sij

    Microsoft added Event ID 1 to the Application Log to show attempted exploitation of CVE-2020-0601 (via new CveEventWrite function). Use Splunk? Collect that EID and alert on: sourcetype=WinEventLog EventCode=1 LogName=Application Message="*[CVE-2020-0601]*" (tweak as needed)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. sij
    Poništi
  12. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    15. sij

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Poništi
  14. proslijedio/la je Tweet
    15. sij

    Oracle VM VirtualBox 6.1.2, now available, adds support for Linux Host Kernel 5.5, bug fixes and security fixes part of Oracle Critical Patch Update for January 2020

    Poništi
  15. proslijedio/la je Tweet
    14. sij

    Nice of Microsoft to add telemetry for -2020-0601, they are expecting exploitation New Function in crypt32.dll - ChainLogMSRC54294Error CveEventWrite(L"[CVE-2020-0601] cert validation", v8);

    Poništi
  16. proslijedio/la je Tweet

    The January 2020 security updates include a fix for the CVE-2020-0601 certificate validation vulnerability that affects Windows 10. More information from here:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    14. sij

    Dos curiosidades sobre la tanda de parches de Microsoft que saldrá hoy, segundo martes de enero, sobre las 19:00 CET. a) Van a ser los últimos (en ciclo) para Windows 7. b) Parece que van a resolver algo MUY GRAVE en la criptoAPI, que involucra todo el tema de cifrado. Atentos...

    Poništi
  18. proslijedio/la je Tweet
    17. pro 2019.

    Damn.. guys are raising the bar: they are publishing part of their victims list 😳😳😟

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    9. sij

    Well this is crazy who would have thought... "TrickBot actors decided to create a private framework to evade detection and to create a tool that satisfies their own particular needs."

    Poništi
  20. proslijedio/la je Tweet
    7. sij

    Help by translating it to more languages and improve the currently supported ones!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·