Jean-François Maes

@Jean_Maes_1994

Cyber Security Researcher, Pen Tester, occasional actor and OSCP + GPEN holder. -

dW5rbm93bi4=
Vrijeme pridruživanja: veljača 2014.

Tweetovi

Blokirali ste korisnika/cu @Jean_Maes_1994

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Jean_Maes_1994

  1. On English default windows installations this: %ALLUSERSPROFILE:~3,1%%ALLUSERSPROFILE:~5,1%%WINDIR:~3,1%%PROGRAMFILES:~14,1%%PROGRAMFILES:~4,1%%PROGRAMFILES:~15,1%h%PROGRAMFILES:~14,1%%PROGRAMFILES:~13,1%%PROGRAMFILES:~13,1% spells powershell :)

    Poništi
  2. Part 2 of my blogposts on deception should be online tomorrow. Here is a teaser.

    Poništi
  3. 31. sij

    New technical blogpost is up This one is about Parent PID spoofing complete with a python script to detect said spoofing. Read all about it here:

    Poništi
  4. 31. sij

    PoC's on commandline spoofing made by me Precompiled for x64 arch, but if you don't trust it, feel free to compile yourself. Code is provided. Blogpost will follow on what exactly this is, for now just check your procexp for the ps and cmd properties

    Poništi
  5. 31. sij

    For everyone interested in infrastructure offenses and defenses, this is is must watch talk on why guys like me are moving to fileless, in memory attacks using .NET langs such as C# but also IronPython/IronRuby that was crazy insightful

    Poništi
  6. 29. sij

    Rooted RE on That privesc tho... took a while to figure that out.

    Poništi
  7. 29. sij

    Going to write a blogpost about commandline argument spoofing and parent pid spoofing. Two technologies that are out there, nothing revolutionary. But still underused or not understood.

    Poništi
  8. 28. sij

    Infosec is an ever evolving landscape where the more you learn the more you realise you actually don't know anything. Imposter syndrome hitting hard sometimes.

    Poništi
  9. 16. sij

    Taking the AD course on from . Usually I rely on my Kali skills to get things done. However, as my knowledge and experience grow, I'm quite interested in using only windows builtins as my tools. I'm quite certain that I'll learn a ton.

    Poništi
  10. 13. sij

    When you compromise a box and it does not have access to the internet, setup a proxy through your own machine. If it works it aint stupid.

    Poništi
  11. 10. sij

    some pro tips on how to recognize phishing written by yours truly

    Poništi
  12. 9. sij

    Looks can be decieving and persistence is key.

    Poništi
  13. proslijedio/la je Tweet
    4. sij
    Prikaži ovu nit
    Poništi
  14. 1. sij

    just solved all the access control labs on 's web academy. I don't know what Carlos did to you guys, but I'd hate to be that guy, as he is always the target of hacks! thx for these labs, they help brush up the basics and the not so basics!

    Poništi
  15. Since everyone is posting their 2020 goals and most bug bounty hunters are like: more criticals, less dupes, here is mine: Find 1 bug. Yep, I never bug bounty hunted before.

    Poništi
  16. Last hack of the decade boys 'n girls. Make it count!

    Poništi
  17. One of the best feelings in the world is when a system/root shell pops.

    Poništi
  18. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  19. Well no more doubting myself. I can happily announce I passed my OSCP.

    Poništi
  20. Oscp finished. 3 roots, 2 users, one of which was just added to the administrator group when the exam ended. I hope that's sufficient. Nice exam

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·