Tweetovi

Blokirali ste korisnika/cu @JamesHovious

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JamesHovious

  1. proslijedio/la je Tweet
    1. velj

    For anyone wondering, yes it’s written in C# and yes I will be totally adding it as a SILENTTRINITY module if I can get the source code (a few changes need to be made in order for it to run in memory).

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Wow, long time coming Happy for the result, still not happy with how it was handled by authorities. And the winner in all this? Attorneys

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    On successful compromise of the user endpoint, the red team deployed their ultimate weapon

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    Our new report out now: "Stopping the Press: Journalist Targeted by Saudi-linked Pegasus Spyware Operator".

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    We have just pushed some *big* updates to Ghostwriter's master branch that I think you'll like. We've got WYSIWIG editors, autocomplete, new reports, and more! Check it out:

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    New tool to play with 😀 For those who may not be aware, there is a new Nessus licence called Nessus Essentials, which is a free copy of Nessus!

    Poništi
  7. proslijedio/la je Tweet
    28. sij

    From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    The event, usn, and mft listeners are now all in one spot and better than ever! Get them all here:

    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Starting to put together a Linux Privesc Video. Can anyone spot something non-network that I'm missing? - Recon (linPEAS/LinEnum) - Sudo - Permission Overview (file writes - sshKey/cron) - SetUID - Kernel - Cron - Network [mysql, postgres, erlang cookie (couchDb)]

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    23. sij

    If you've completed our Endpoint Security Deployment course, expand your knowledge and skills by learning the fundamentals of live analysis forensics and investigation for . >> Sign up:

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    I wrote a secret scanner tool and published it under my employer's GitHub org. Since I don't have much Twitter reach I appreciate any RTs! It currently will scrape Git, S3, and GDocs for secrets, and written in Rust for high performance.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. sij

    New from - Revisiting Remote Desktop Lateral Movement This post discusses RDP lateral movement by leveraging mstscax.dll. Steven also is releasing SharpRDP with corresponding detection guidance for this attack technique. Post:

    Poništi
  14. proslijedio/la je Tweet
    22. sij

    Everyone likes free training. Right? The Adversary Tactics: Powershell course has been retired from SpecterOps delivery. The course material has been made public.

    Poništi
  15. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    21. sij

    Added support for Vertica

    Poništi
  17. proslijedio/la je Tweet
    8. ožu 2019.

    Why not only SMB, but LDAP signing is important as well. Dump LDAP contents without any AD creds, but with one in same broadcast domain (reponder SMB/HTTP off): sess1> responder -I <eth> sess2> ntlmrelayx -wh test -wa 1 -t ldap://<ad> --no-da --no-acl -l /tmp/loot

    Poništi
  18. proslijedio/la je Tweet
    21. sij

    Just released Satellite, a payload hosting and proxy software for red team operations. In the blog post, I discuss the feature set of Satellite as well as why an operator would choose it over Apache or Nginx.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    21. sij
    Poništi
  20. proslijedio/la je Tweet
    15. sij

    exploit landed in ! With a useful 'check' command to check if you have vulnerable assets. And a meterpreter session if you need to demo something :) CVE-2019-19781

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·