Rene Freingruber

@ReneFreingruber

Interested in reversing, browser exploitation, red & blue teaming, web vulns, ...

Vrijeme pridruživanja: lipanj 2012.

Tweetovi

Blokirali ste korisnika/cu @ReneFreingruber

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ReneFreingruber

  1. Prikvačeni tweet
    5. velj

    Here is my review of the "Active Directory lab" from Pentester Academy:

    Poništi
  2. proslijedio/la je Tweet
    prije 1 sat

    Extending BloodHound: Part 1 - GPOs and User Right Assignment

    Poništi
  3. proslijedio/la je Tweet

    We've added a brand new topic on DOM-based vulnerabilities. The topic contains 7 labs, plus there are 2 new labs in the existing XSS topic.

    Poništi
  4. proslijedio/la je Tweet
    5. velj

    The AFL++ website is up: Very naive ATM, I'm open to suggestions.

    Poništi
  5. proslijedio/la je Tweet
    prije 20 sati

    If you use the cs2modrewrite project to build your C2 redirector rules, it is now updated to support CS <=4.0 profiles (multi-variants).

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    A day prior to the Travelex hack, its parent company was worth $2.1 Billion. A month later it is now worth $764 Million. The CEO owns 63% of the shares, which puts his personal loss around $850 Million.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    The biggest data breaches in recent years visualized. Including an convenient download as CSV file, in case you want to play around with the data. via

    Poništi
  11. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. proslijedio/la je Tweet
    28. sij
    Poništi
  14. proslijedio/la je Tweet
    28. sij

    So I created this Burp Teams it allows you to share repeater/intruder/comparer tabs. It uses nodejs for the server with . But I then found out someone already did this so it won’t be on the BApp store. On the plus side I learnt lots.

    Poništi
  15. proslijedio/la je Tweet
    28. sij

    Check out our new page on escaping the AngularJS sandbox, including new vulnerability labs.

    Poništi
  16. proslijedio/la je Tweet

    Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs How to get in front of the issue:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    As I have no cool new findings, lets start the year with an old IE bug - bypassing Content-Disposition: attachment with mhtml:

    Poništi
  19. proslijedio/la je Tweet
    16. pro 2019.

    And another review of Pentester Academy's Global Central Bank course and PACES certification. Thank you and

    Poništi
  20. proslijedio/la je Tweet
    23. sij

    v2 is out 🔥 🔸Dump credentials on multiple hosts 🔸New dumping method using () thanks to 🤗 🔸Can be used as a in other python project 🔸Fully documented wiki ! Needs some testing, open issues if need be 🙃

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·