Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Raiona_ZA
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Raiona_ZA
-
Prikvačeni tweet
This work came off the back of several client engagements where we were seeing incomplete red forest implementations that weren't up to the task of securing AD properly... It's not that Red Forest can't be implemented and have a positive security impacthttps://twitter.com/FSecure_Consult/status/1196731078230323200 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Raiona proslijedio/la je Tweet
Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.https://www.matteomalvica.com/blog/2020/01/20/mimikatz-lsass-dump-windg-pykd/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, https://github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
@ngalongc,@EdOverflow, and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover. https://blog.reconless.com/samesite-by-default/ …pic.twitter.com/5R23YmpksT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
My favorite "wait, why, exactly?" Jenkins feature: Have you lost your local CI server? Just send a UDP packet to broadcast port 33848, and all local Jenkins servers will report back. $ echo 'ping' | socat -t5 - UDP-DATAGRAM:255.255.255.255:33848,broadcastpic.twitter.com/WCiSTisJST
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
DMA attacks are often misunderstood as requiring physical access to a device. However, in many cases they can be done remotely, like in this example of exploiting firmware on Nerwork Cardshttps://twitter.com/Evil_X_/status/1222972323831209987 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
Headed to
@WEareTROOPERS in March? Don't miss@_nullbind's talk on SQL Server Hacking Tips for Active Directory Environments. https://www.troopers.de/troopers20/talks/8peqvg/ …pic.twitter.com/s7c9ggQbUi
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
Over the past few years I've spent 100s (1000s?) of hours studying how companies have scaled their security. Here are my
@AppSecCali slides that distill what I've learned- the big, scalable, systematic wins that measurably improve your security posture.https://docs.google.com/presentation/d/1zbj9XBiv6r6zla0KHNfs63Ux45QZAfRut2zlK7o-dRw/edit#slide=id.g6555b225cd_0_1069 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.https://github.com/oxfemale/LogonCredentialsSteal …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
#redteam tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
Some things make more sense when one realizes that there are at least 5 distinct security communities: Security product people (people that view security as something that can be added by buying/selling products), Security Infrastructure people (people that view security as ...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
.
@Krodnet
Any advice on where to direct this question?https://twitter.com/Raiona_ZA/status/1221403199896260608 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
Reading emails from Office365 account using PowerShellhttps://sysadminben.wordpress.com/2015/10/27/reading-emails-from-office365-account-using-powershell/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
We've added 11 new XSS labs, with learning materials. There is new content on CSP, dangling markup injection, and escaping the AngularJS sandbox.https://portswigger.net/web-security/cross-site-scripting …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
There is a simplier way to perform: make a single DLL with security package exports functions (and the entry to SpAcceptCredentials). Then insert it in live LSASS using AddSecurityPackage. No need to hook, there is an API for that ;-)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
.
@NerdPyle No idea who to reach out to at Microsoft to ask about this, (so please push me in their direction) but is there a reason TGT request logs (event ID 4768) don't store the hostname along with the IP address on DCs? This seems like it would be a really useful addition...Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
What would be the first 3 things you'd do if a company hires you to help them improve their security? These are mine, what about yours? 1) Asset management 2) Offsite backups for all assets (disaster recovery) 3) 2FA wherever possible
#InfosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raiona proslijedio/la je Tweet
As promised, a short post on Hyper-V admin privesc: https://decoder.cloud/2020/01/20/from-hyper-v-admin-to-system/ … /cc
@padovah4ck@mkolsekHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.