Tweetovi

Blokirali ste korisnika/cu @Jason_DFIR

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Jason_DFIR

  1. proslijedio/la je Tweet

    Threat hunting is critical for proactively guarding against threats that evade traditional detection methods. Read this eBook to learn: - What defines threat hunting success - Common misconceptions/pitfalls - 6 key elements for effective threat hunting

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    2020-01-29:🤡🛸 | 🇫🇷[FLORAL] Crypted Binary -> Trial News 📰Generator 🔦🤔Why? ⏩ Crypters Devs Leverage Possible Whitelist Strings to Bypass Some AI/ML Engines h/t Bypass Eg ->

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  6. proslijedio/la je Tweet
    26. sij

    LogonTracer. Investigate malicious Windows logon by visualizing and analyzing Windows event log, by

    Poništi
  7. proslijedio/la je Tweet
    21. sij

    changed Webshells for S.A.P v.2.1. The same code logic is being pushed by the same upstream servers via POST queries. My script emotet_webshell_finder.py has been updated to also find those ones

    Poništi
  8. proslijedio/la je Tweet
    26. sij
    Poništi
  9. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    24. sij
    Poništi
  11. proslijedio/la je Tweet

    Our global expansion continues: "Microsoft to launch new cloud datacenter region in Israel"

    Poništi
  12. proslijedio/la je Tweet
    18. sij
    Poništi
  13. proslijedio/la je Tweet
    18. sij

    technical article on how to discover new forensic evidence with "file structure analysis"

    Poništi
  14. proslijedio/la je Tweet
    17. sij

    🔖Interesting Bookmarks: 1⃣ ->-> High-Value Target 2⃣TrickBot Makes Headlines w/ MSP & LA Times 3⃣More Technical RE 4⃣Detections & Mitigations: Conclusion🍀

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    15. sij

    2020-01-15: 🤡⛈️ Cert -> 🇸🇮[MONT-DMD d.o.o.] Same Crypter New🆕👇 🔥Added "foldhelper" Windows 10 UAC bypass by hijacking a special key in the Registry 🔦Focuses More & More on Windows 10 MD5:18A19C324963BB69A492ACCF4E9A7600 h/t

    Poništi
  16. proslijedio/la je Tweet
    14. sij
    Poništi
  17. proslijedio/la je Tweet
    10. sij

    2020-01-10 - Let an infected host run long enough, and it'll also get a infection. Paste of the URLs for Trickbot EXEs: Pastebin raw:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    I had fun chatting with about Dapr on his show when he finally invited me back after 7 years of me asking

    Poništi
  19. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  20. proslijedio/la je Tweet
    5. sij

    Change.exe, Query.exe, and Reset.exe are basically the same tool, reading aliases from registry and launching other EXEs. Adding your own REG_MULTI_SZ to "query" could be an interesting way to fool forensicators for a moment.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·