KeyStrOke

@KeyStrOke_M95

Security Researcher Pentester | RedTeamer | CTFer | Pwngrammer | Reverser

lsass.exe
Vrijeme pridruživanja: prosinac 2014.

Tweetovi

Blokirali ste korisnika/cu @KeyStrOke_M95

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @KeyStrOke_M95

  1. Prikvačeni tweet
    8. lis 2019.

    My long awaited SWAG is finally here, Thank you for the gift, bounty and the handwritten letter 😃

    Poništi
  2. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  3. 29. pro 2019.

    After hunting some bugs with it's time to level up and start the new year with a new journey 😎

    Poništi
  4. proslijedio/la je Tweet
    28. pro 2019.

    New article about "Pass the hash" This technique is used in a lot of engagements, and yet it is not always fully understood. This is a little review of one of the most popular lateral movement techniques 🙃

    Poništi
  5. proslijedio/la je Tweet
    25. pro 2019.

    Here it is the first part of my blog post about request smuggling: Crossing The Borders : The illegal trade of HTTP requests

    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    7. pro 2019.

    New post! Tunneling traffic through MySQL service (or your mysqld is my new SOCKS5) =>

    Poništi
  8. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. stu 2019.

    Pour le week-end, voici un nouvel article présentant une technique pour lire le contenu d'un dump de lsass **à distance**, évitant ainsi la détection des AV () et le téléchargement de dumps volumineux (80-150Mo). Bon week-end ! 🙃

    Poništi
  10. proslijedio/la je Tweet
    27. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    1. lis 2019.

    Just got done researching how access token manipulation can be leveraged to impersonate SYSTEM from local admin! I dig into alternatives to winlogon.exe that can also be leveraged to impersonate SYSTEM. Detections for access token manipulation included 💜

    Poništi
  12. proslijedio/la je Tweet
    31. srp 2019.

    Si vous ne connaissez pas l'outil , n'hésitez pas à lire mon nouvel article En deux mots, BloodHound permet de modéliser un environnement en mode graphe afin de détecter des chemins d'attaque. Bonne lecture ! 🙃

    Poništi
  13. proslijedio/la je Tweet
    25. ožu 2019.

    Windows Exploit Suggester - Next Generation (WES-NG)

    Poništi
  14. proslijedio/la je Tweet
    31. sij 2019.

    1/n - Here's how can help you determine whether you are vulnerable to PrivExchange by : Find the domain head object in the BloodHound GUI, click the number next to "First Degree Controllers". See whether an Exchange security group is present:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    12. lip 2018.
    Poništi
  16. proslijedio/la je Tweet
    10. ruj 2016.

    capstone + keystone + pyelftools + ugly glue = ropstone

    Poništi
  17. 8. srp 2016.

    success comes along with a large amount of failure

    Poništi
  18. proslijedio/la je Tweet

    When a hacker discovers that the FBI is coming to raid his house, he clears out all evidence and leaves this gift:

    Poništi
  19. proslijedio/la je Tweet
    19. velj 2016.

    When you pwn a server and stay logged in SSH, then the admin knows :D

    Poništi
  20. proslijedio/la je Tweet
    2. pro 2015.

    New Crypto Coding Challenge Site - ProjectEuler for Crypto :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·