RoadRunner

@RoadRunnerHacks

Community Manager 😎 x Remote Shell Lover 👩🏻‍💻 x Runner 🌳 x Globe Traveler 🌎

Vrijeme pridruživanja: srpanj 2019.

Tweetovi

Blokirali ste korisnika/cu @RoadRunnerHacks

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RoadRunnerHacks

  1. proslijedio/la je Tweet
    31. sij
    Poništi
  2. proslijedio/la je Tweet
    24. sij

    Starting to put together a Linux Privesc Video. Can anyone spot something non-network that I'm missing? - Recon (linPEAS/LinEnum) - Sudo - Permission Overview (file writes - sshKey/cron) - SetUID - Kernel - Cron - Network [mysql, postgres, erlang cookie (couchDb)]

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    16. stu 2019.

    Un gran éxito el primer de en la . Muchas gracias por su participación y especiales agradecimientos a y a todo el staff de por hacer esto posible.

    Poništi
  4. 26. stu 2019.
    Poništi
  5. proslijedio/la je Tweet
    25. stu 2019.

    If I want to quickly, manually spray an application input, I use this payload: '"><svg/onload=alert()>{{7*7}} It's fairly short, and will give indicators of basic SQLi, XSS and SSTI vulnerabilities. Disclaimer: This isn't a replacement for proper testing.

    Poništi
  6. 15. stu 2019.

    BEST EXPERIENCE EVER Glad to be part of this!

    Poništi
  7. proslijedio/la je Tweet
    22. lis 2019.

    Here is the news we’ve all been waiting for – the program of the conference is finally published! Please RT!

    Poništi
  8. 4. stu 2019.
    Poništi
  9. proslijedio/la je Tweet
    1. stu 2019.
    Poništi
  10. 11. lis 2019.

    This is what I am talking about! Help people all around the world learn, hack and promote what cybersecurity is. Thanks for the cooperation! Can't wait for the next one!

    Poništi
  11. proslijedio/la je Tweet
    9. lis 2019.

    x Hack The Box As a you for your support we invite all Universities currently enrolled in HTB to participate in our very first Uni CTF. The Uni admins received a special invite to enroll. Hope to see you all on the Dashboard!

    Poništi
  12. proslijedio/la je Tweet
    25. ruj 2019.

    We are ! Are you your way through life and always thinking the box? Would you be interested in a career within ? If yes then check out our current openings! Good luck 😀

    Poništi
  13. proslijedio/la je Tweet
    2. kol 2019.

    2019 CFP is OPEN: Offensive and defensive research (15/30/45min). Submit your talk! Please RT!

    Poništi
  14. proslijedio/la je Tweet
    16. ruj 2019.

    Hack The Box Internal MeetUp! United from all around the world for new content, beers and lots of hacking. New stuff yet to be announced 😎 Till the next one guys, Cheers 🍻

    Poništi
  15. proslijedio/la je Tweet
    4. ruj 2019.

    Thanks to those who came out to the first Australian meetup. Cheers to @0xesh, & for helping put the session together. Cant wait to run more events in the future.

    Poništi
  16. proslijedio/la je Tweet
    2. ruj 2019.

    Best of HackTheBox CTF Writeups (Cheatsheet) This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs. This list contains all the Hack The Box writeups available on hackingarticles

    Poništi
  17. proslijedio/la je Tweet
    23. kol 2019.

    We were very happy for the MeetUp arranged with . Hope everyone enjoyed it and Julio thank you very much for your contribution. To the next Hack The Box MeetUps to come :)

    Poništi
  18. proslijedio/la je Tweet
    22. kol 2019.

    Muchas gracias a todos por participar en el primer de la comunidad de en nos vemos el mes próximo

    Poništi
  19. proslijedio/la je Tweet
    30. ožu 2019.

    As promised! My guide for Preparing for OSCP is now online! I have provided a variety of resources and information in this guide! I want to thank and for approving this guide. If anyone would like to read it here it is:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    15. kol 2019.

    Maybe useful: If you compromise an Exchange server you can extract credentials for all users that have logged in to OWA recently and if you monitor with Rubeus you can grab TGT for any users that log in after (though compromising Exchange is usually game over).

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·