Jan Pagon

@JanPagon

Lost in space,...

Kranj
Vrijeme pridruživanja: studeni 2009.

Tweetovi

Blokirali ste korisnika/cu @JanPagon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JanPagon

  1. proslijedio/la je Tweet
    3. velj

    Na iščemo nove sodelavce! Tako za preiskovanje incidentov, kot tudi za ozaveščanje ():

    Poništi
  2. proslijedio/la je Tweet
    12. sij
    Poništi
  3. proslijedio/la je Tweet
    2. velj
    Poništi
  4. proslijedio/la je Tweet
    1. velj
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Payed a short visit to this year's venue today. Unfortunatelly, drag0ns hacked our phone battery, so we can't provide more sneak peaks ratm ;) more teasers of dungeons & dragons soon! ;)

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Hey there! I promised three parts to this threat hunting write-up, and thats what I aim to deliver. In this post, we're going to build on parts 1 and 2, by doing some hands-on examples using the CPTC (Collegiate Penetration Testing Competition) dataset.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    30. sij

    CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild Zero-day remote code execution vulnerability Triggers 0. JScript 1. used in 2. ... Proof of Concept Demo Video

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  8. proslijedio/la je Tweet
    29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Brussels this morning

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Windows is gonna break your stuff by forcing LDAP Signing and channel binding. 🙃

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    Hey there, Part 2 of the three-part series on analyzing process creation logs just went live.

    Prikaži ovu nit
    Poništi
  12. 29. sij

    Yessss! I am now a proud patron of Jack Rhysider on , and you should be too:

    Poništi
  13. proslijedio/la je Tweet
    29. sij

    It's Tuesday and I know you're itching for a new episode. That's why I put a bonus one out today.

    Poništi
  14. proslijedio/la je Tweet
    26. sij

    I just set up another Raspberry Pi and installed Pi-hole. So I have two rpis as DNSs on local network that have lists synced between each other with this script (1/2)

    Poništi
  15. Poništi
  16. proslijedio/la je Tweet
    25. sij

    I wrote some automation around gophish, evilginx2, and postfix for faster phishing deployment. Looking for feedback and pull requests :D

    Poništi
  17. proslijedio/la je Tweet

    Updates to the Microsoft 365 Attack Simulator include an attachment-based phishing attack and the ability to filter simulation user targets by directory metadata like title, city, and department. More about the new features in the phish simulation tool:

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    Docker container that logs all DNS and new outbound TCP/UDP connections

    Poništi
  19. proslijedio/la je Tweet
    23. sij

    Quick Sysmon config snippet for SharpRDP - thank you for the actionable defensive guidance: ➡️ /cc: Please test before pumping into prod 🤠

    Poništi
  20. proslijedio/la je Tweet
    23. sij
    Odgovor korisniku/ci
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·