Jackson T.

@Jackson_T

Vulnerability Research & Red Team. Tweets are my own.

Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @Jackson_T

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Jackson_T

  1. prije 13 sati

    Had an awesome weekend playing with Team Exit on the , and also got around to finishing a write-up for the RMF / Ace of Diamonds challenge. Thanks for the challenges and good times, !

    Poništi
  2. proslijedio/la je Tweet
    22. pro 2019.

    The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge:

    Poništi
  3. 10. pro 2019.

    Before-and-After example of classic CreateRemoteThread injection.

    Prikaži ovu nit
    Poništi
  4. 10. pro 2019.

    This builds off of works from , , , and others. Greetz to for testing and suggestions!

    Prikaži ovu nit
    Poništi
  5. 10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  6. 22. stu 2019.

    Just watched and 's awesome talk on the same topic. They flesh it out a lot further and explain more details.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    21. stu 2019.

    Imho Bug Bounties isn’t pentesting where you submit missing spf records, exposed server versions or software that has a cve registered. Always go for impact, if you can’t exploit it, don’t report it & try to understand what’s impactful for the company. Limit the noise, go deep!

    Poništi
  8. 17. stu 2019.

    Here's an implementation of a persistence technique found in Vault 7 that stores data in NVRAM variables. Data can survive OS re-imaging and cannot be enumerated with OS-level APIs. Requires admin.

    Prikaži ovu nit
    Poništi
  9. 17. stu 2019.

    Taking GitHub's CodeQL (formerly Semmle) for a spin with the VS Code extension and workspace. So far, so good with easy installation, digestible documentation, and a CTF tutorial. Docs: CTF:

    Poništi
  10. proslijedio/la je Tweet
    30. lis 2019.

    If you dev a bunch of payloads in C++ you might find this Visual Studio project template handy:

    Poništi
  11. 10. lis 2019.
    Poništi
  12. 30. ruj 2019.

    New challenge coins rolled in. Thanks !

    Poništi
  13. proslijedio/la je Tweet
    15. kol 2019.

    Began curating a list of Hyper-V exploitation resources, hope it can be of use to anyone interested in starting Hyper-V security research:

    Poništi
  14. proslijedio/la je Tweet
    24. svi 2019.

    Red Team isn’t all shells and champagne. It’s long hours of analysis looking for that *one* flaw that gives you the access you need to move toward your objective. You’ll even obsess in your sleep, and the answer will hit you in the shower. Then, repeat!

    Poništi
  15. proslijedio/la je Tweet
    18. srp 2019.

    I just finished cslogwatch v1.0 - a tool for cobalt strike log state tracking, parsing, and storage - check out my blog for overview and github link

    Poništi
  16. 16. srp 2019.

    Have been learning countless unknown-unknowns while reading "Producing Open Source Software". Thank you for the thoroughly enjoyable book !

    Poništi
  17. 5. svi 2019.

    Do you remember when you joined Twitter? I do!

    Poništi
  18. 15. tra 2019.

    Greets fly out to , @CBranSecurity, , Geoff H., and for their reviews. Thank you to for prompt remediation and PSIRT for coordination.

    Prikaži ovu nit
    Poništi
  19. 15. tra 2019.

    Technical details: an associated system service, CxUtilSvc, hosted a COM object which inadvertently allowed low-privileged users to perform arbitrary reads/writes to the registry as SYSTEM. This can be used to elevate local privileges.

    Prikaži ovu nit
    Poništi
  20. 15. tra 2019.

    CVE-2019-9730: Local privilege elevation in Synaptics Sound Device Driver package. Multiple OEMs affected. Exploit and write-up here: .

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·