L4bF0x

@L4bf0x

Security Research | Housewife of Hacker County | + Amb. | Content Cmte | | KG7WUF

Spokane, WA
Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @L4bf0x

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @L4bf0x

  1. Prikvačeni tweet
    8. pro 2019.

    Thank you again for everyone who came to the library for our and workshop yesterday! As promised, here are the slides:

    Poništi
  2. 9. sij

    Just curious: Who do you usually conduct on?

    Poništi
  3. 13. pro 2019.

    It's always a great Friday when a new episode comes out!

    Poništi
  4. 10. pro 2019.

    Update: Need a physical USB connection for Ford to complete the process, but it seems to be possible for other manufacturers. Doesn't dismiss pretending to be a buyer and connecting to a model for sale and possibly tracking new owner.

    Poništi
  5. 10. pro 2019.

    Hey 'ers! Wanna find someone's location by VIN number? If they drive a Ford, that's all you need according to . I'm sure this applies to other manufacturers as well. Can anyone check for me?

    Poništi
  6. proslijedio/la je Tweet
    8. pro 2019.

    CSRF Account Takeover Advice: - Subdomain Enumeration - Map out attack surface / Spider - Right click on targets -> Engagement Tools -> Analyze Target - Look for password reset with no CSRF token - Reset Password and email generate PoC - Report - $$$

    Poništi
  7. 9. pro 2019.
    Poništi
  8. 5. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    30. stu 2019.

    and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)

    Poništi
  10. proslijedio/la je Tweet
    30. stu 2019.

    I wrote a operator for Kubernetes: The very first version just adds canary ingress and proxy part of the traffic through Zap. Now it's a lot easier to hack your apps in production :)

    Prikaži ovu nit
    Poništi
  11. 28. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    26. stu 2019.

    ATTENTION USERS OF TWITTER. Did someone who know or know of make the huge mistake of dying before clicking through a 2019 Terms of Service for their twitter account? Do you want to honor their memory? Please fill out this form:

    Prikaži ovu nit
    Poništi
  13. 28. stu 2019.

    Happy Thanksgiving to all my US-based hacker family, wonderful friends and colleagues! Wouldn't be where I am today without your support 💜

    Poništi
  14. proslijedio/la je Tweet
    27. stu 2019.

    This Instagram scraping OSINT tool is super easy to install and has amazing documentation. It's also a Python library so you can write your own scripts to spot ghost followers and deleted posts! -

    Poništi
  15. 27. stu 2019.

    This is the perfect time to start thinking about a topic to submit for our in January!

    Poništi
  16. 26. stu 2019.

    Completely missed the fact that it was Telnet's 50th birthday last September. It literally came out the year we set foot on the moon, yet I still find it everywhere.

    Poništi
  17. proslijedio/la je Tweet
    25. stu 2019.

    Today I was able to release the first post of a series of blog posts about attacking FreeIPA, an open source alternative to Windows Active Directory inside of unix environments. This post covers authentication, and situational awareness.

    Poništi
  18. 24. stu 2019.

    Well I can’t -not- try this whiskey! 🦊

    Poništi
  19. proslijedio/la je Tweet
    23. stu 2019.
    Poništi
  20. proslijedio/la je Tweet
    23. stu 2019.

    Bypass Windows Defender by renaming executable to msiexec.exe :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·