Nettitude Labs

@Nettitude_Labs

Here we share infosec tips, tricks, tools and tutorials, by the technical folks at . Follow us for regular content!

+44 (0) 345-520-0085 / +1 212-335-2238
Vrijeme pridruživanja: siječanj 2016.

Tweetovi

Blokirali ste korisnika/cu @Nettitude_Labs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Nettitude_Labs

  1. Prikvačeni tweet
    12. pro 2019.

    Learn how to exploit Symantec Endpoint Protection on all versions of Windows (CVE-2019-12750). Part 2 of this series by delves into a more advanced method of exploitation!

    Poništi
  2. proslijedio/la je Tweet
    13. pro 2019.

    Sick analysis here! Privilege Escalation on SEP

    Poništi
  3. proslijedio/la je Tweet

    Great work by to demonstrate that your first line of Defense is just that. Layered security is the only strategy. Add Chain of Custody Layer to and - Detect Invisible Threats - Root out Stealth Attacks - Attest Absolute Integrity

    Poništi
  4. 5. pro 2019.

    CVE-2019-12750 Symantec Local Priv Esc: walks you through the exploitation of Symantec Endpoint Protection.

    Poništi
  5. proslijedio/la je Tweet
    15. stu 2019.
    Poništi
  6. 14. stu 2019.

    Red teamers: want better lateral movement capabilities? We've just released SharpSocks v2.0. walks you through the dramatic speed improvements and other new features of this standalone proxy-aware reverse HTTP tunnelling SOCKS proxy!

    Poništi
  7. proslijedio/la je Tweet
    12. stu 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Simply amazing tool!

    Poništi
  8. 12. stu 2019.

    Today we are releasing PoshC2 v5.0, which has significant new functionality and many quality of life improvements! Full details are in our release post below, by . A big thanks to the growing list of contributors!

    Poništi
  9. 10. lis 2019.

    Learn how to exfiltrate an EC2 (EBS) snapshot once an AWS CLI/API access key has been compromised, by

    Poništi
  10. 3. lis 2019.

    Glad to hear Naim is enjoying it here! We’re always on the lookout for the right people looking to enter the industry. Get in contact if that’s you.

    Poništi
  11. proslijedio/la je Tweet
    19. ruj 2019.

    Excellent writeup on the from the crew . Learned a few new tricks. .

    Prikaži ovu nit
    Poništi
  12. 18. ruj 2019.

    We finished 2nd place in the CTF and have provided a write up of some of the challenges 😎 A big thanks to the team as always!

    Poništi
  13. 29. kol 2019.

    If you are today come to Track 2 at 4.45 and watch talk candidly about how all of our red teams "oops" moments have made us stronger over time. The talk is called "Losing Battles - Winning Wars" and is well worth attending!

    Poništi
  14. 29. kol 2019.

    If you are today be sure to catch and in Track One at 1130. Their talk is "Attack – Detect – Evade: Getting Splunky with Lateral Movement" 😎

    Poništi
  15. proslijedio/la je Tweet
    29. srp 2019.

    An XSS Payload generator by with obfuscation, filter bypass and polyglot transforms

    Poništi
  16. proslijedio/la je Tweet
    29. srp 2019.
    Poništi
  17. 29. srp 2019.

    Our new XSS Payload Generator by will get you around those tricky input filters in no time at all!

    Poništi
  18. 15. srp 2019.

    Check out bust out a last minute lightning talk, “Novel VM Detection Tricks” at this weekend!

    Poništi
  19. 15. srp 2019.

    Check out this talk, “Attack - Detect - Evade: Getting Splunky with Kerberos” by and 🤓

    Poništi
  20. proslijedio/la je Tweet
    13. srp 2019.

    Amazing talk, shout out to & - This was talk of the day for me, looking forward to many more in the future!!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·