Ion Todd

@IonTodd

Breaker of things- primarily my own. Participation award extraordinaire. Password enthusiast.

Vrijeme pridruživanja: siječanj 2013.

Tweetovi

Blokirali ste korisnika/cu @IonTodd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @IonTodd

  1. 3. velj

    Without the pep talks from guys like , I wouldn't have had the courage to do half of the crazy things I've done. Pressure is really good if managed properly and support structures exist.

    Tweet je nedostupan.
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  3. proslijedio/la je Tweet
    27. sij
    Poništi
  4. proslijedio/la je Tweet
    20. sij

    Fellow hackers, you asked, we listened! Coming soon a lab to practice Active Directory attacks from Linux. Latest servers, interesting flags, dedicated lab for everyone, video walk-through and browser based access. cc

    Poništi
  5. proslijedio/la je Tweet
    10. sij

    Recently I was on a pentest and needed to manage Active Directory groups from Linux to achieve privilege escalation. If you find yourself in a similar scenario, this is what you can do:

    Poništi
  6. 4. pro 2019.

    My close personal friend has been working on a tool to more accurately visualise effective access within AWS. We've found awspx to be really useful internally, we hope you do too.

    Poništi
  7. 2. pro 2019.

    As someone who's been involved in technical recruitment at MWR/F-Secure for almost 4 years, I'm happy to answer any questions you might have about our processes This joke sums up the general feeling towards non-tech certs. This doesn't mean we won't/haven't hired people with CEH

    Tweet je nedostupan.
    Poništi
  8. proslijedio/la je Tweet
    Poništi
  9. proslijedio/la je Tweet
    14. stu 2019.
    Poništi
  10. proslijedio/la je Tweet

    We have partnered with to sponsor the PRE-CON CTF at this year’s BSides Cape Town on Dec 7th. Hack 10 systems and challenges and win great prizes! The CTF runs from Dec 1-6 Register to play at

    Poništi
  11. proslijedio/la je Tweet
    12. velj 2019.

    Wrote another little C# tool with for extracting cookie and credential data from Chrome. Hopefully we can add support for other browsers too.

    Poništi
  12. proslijedio/la je Tweet
    8. stu 2019.
    Odgovor korisnicima

    The Security Focused Pipeline, courtesy of at . Good stuff!

    Poništi
  13. proslijedio/la je Tweet
    7. stu 2019.

    Check out my new blog post on how edit rights on an OU can be abused to compromise any of its child objects. Thanks to , and as a number of their tools were used in the PoC.

    Poništi
  14. proslijedio/la je Tweet
    3. stu 2019.

    🥁 Meet the speakers! 🎤 Neil Roebert, Senior Information Security Consultant at F-Secure Consulting, has been focusing on DevOps and the security surrounding the people, processes & technology involved there. His talk at will be all about it:

    Poništi
  15. proslijedio/la je Tweet
    31. lis 2019.

    One command to rule them all! Just finished to update web_delivery to automatically bypass AMSI/SBL with latest definitions. Testing and feedbacks are welcome! Test it with: msfconsole -r web.rc

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    28. lis 2019.

    You can turn off Chrome's irritating new "tab hover cards" from chrome://flags. At least for now.

    Poništi
  17. proslijedio/la je Tweet
    28. lis 2019.

    We've updated the schedule a bit to make time for the World Cup final, which we'll have on during our lunch break. Changes are at

    Poništi
  18. proslijedio/la je Tweet
    26. lis 2019.

    "I think if your employees are scared of admitting that they made a mistake, like let’s say they clicked on a link they shouldn’t have clicked, then you’re already breeding bad culture into the workplace."

    Poništi
  19. 21. lis 2019.

    When facing ATA don't dcsync out the hashes, bind to C$ (not admin$) and use your favourite method of dumping hashes locally.

    Poništi
  20. proslijedio/la je Tweet
    16. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·