Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Jackson_T
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Jackson_T
-
Had an awesome weekend playing with Team Exit on the
#metasploitctf, and also got around to finishing a write-up for the RMF / Ace of Diamonds challenge. http://jackson-t.ca/metasploitctf-2020-rmf.html … Thanks for the challenges and good times,@metasploit!https://twitter.com/mikeboya/status/1224391733867241472 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jackson T. proslijedio/la je Tweet
The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge: https://www.shogunlab.com/blog/2019/12/22/here-be-dragons-ghidra-1.html …
#ghidra#reversingpic.twitter.com/gm2aePpf71
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Before-and-After example of classic CreateRemoteThread injection.pic.twitter.com/KPvcd1Silk
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This builds off of works from
@Cneelis,@j00ru,@FoxHex0ne, and others. Greetz to@Dcept905 for testing and suggestions!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:https://github.com/jthuraisamy/SysWhispers …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just watched
@r00tkillah and@TTimzen's awesome talk on the same topic. They flesh it out a lot further and explain more details.https://www.youtube.com/watch?v=q2KUufrjoRo …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jackson T. proslijedio/la je Tweet
Imho Bug Bounties isn’t pentesting where you submit missing spf records, exposed server versions or software that has a cve registered. Always go for impact, if you can’t exploit it, don’t report it & try to understand what’s impactful for the company. Limit the noise, go deep!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Here's an implementation of a persistence technique found in Vault 7 that stores data in NVRAM variables. Data can survive OS re-imaging and cannot be enumerated with OS-level APIs. Requires admin. https://gist.github.com/jthuraisamy/e602d5d870230df3ce00178001f9ac16 …pic.twitter.com/58xeVkb9e3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Taking GitHub's CodeQL (formerly Semmle) for a spin with the VS Code extension and workspace. So far, so good with easy installation, digestible documentation, and a CTF tutorial. Docs: https://help.semmle.com/codeql/index.html … CTF: https://securitylab.github.com/ctf/jquery pic.twitter.com/ucNi9ypDhD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jackson T. proslijedio/la je Tweet
If you dev a bunch of payloads in C++ you might find this Visual Studio project template handy:https://github.com/0xC0D1F1ED/cpp_vs_payload_template …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Useful resources for organizing open-source projects: - https://opensource.guide - https://producingoss.com - https://semver.org - https://makeareadme.com - https://keepachangelog.com
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Jackson T. proslijedio/la je Tweet
Began curating a list of Hyper-V exploitation resources, hope it can be of use to anyone interested in starting Hyper-V security research: https://github.com/shogunlab/awesome-hyper-v-exploitation …
#ExploitDev#HyperVpic.twitter.com/fS6jAmajin
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jackson T. proslijedio/la je Tweet
Red Team isn’t all shells and champagne. It’s long hours of analysis looking for that *one* flaw that gives you the access you need to move toward your objective. You’ll even obsess in your sleep, and the answer will hit you in the shower. Then, repeat!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jackson T. proslijedio/la je Tweet
I just finished cslogwatch v1.0 - a tool for cobalt strike log state tracking, parsing, and storage - check out my blog for overview and github link https://attactics.org/2019/07/18/cslogwatch-cobalt-strike-tracking-parsing-storage/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Have been learning countless unknown-unknowns while reading "Producing Open Source Software". Thank you for the thoroughly enjoyable book
@kfogel!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Do you remember when you joined Twitter? I do!
#MyTwitterAnniversary
pic.twitter.com/EKLcNExUtP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Greets fly out to
@shogun_lab, @CBranSecurity,@JasonJunTran, Geoff H., and@_pwncakez for their reviews. Thank you to@SynaCorp for prompt remediation and@Lenovo PSIRT for coordination.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Technical details: an associated system service, CxUtilSvc, hosted a COM object which inadvertently allowed low-privileged users to perform arbitrary reads/writes to the registry as SYSTEM. This can be used to elevate local privileges.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CVE-2019-9730: Local privilege elevation in Synaptics Sound Device Driver package. Multiple OEMs affected. Exploit and write-up here: http://jackson-t.ca/synaptics-cxutilsvc-lpe.html ….pic.twitter.com/R6NmPG370G
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.