Arce

@Senas23

Tweets are my own. Curiosity in the unknown.

Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @Senas23

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Senas23

  1. proslijedio/la je Tweet
    prije 22 sata
    Poništi
  2. proslijedio/la je Tweet

    Btw there's a lot of misinformation about numbers online (surprise). The Chinese gov have a tracker here they update daily: Red number (17335) is confirmed infected, i.e. tested in hospital. Gray number (361) is dead.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    3. velj
    Poništi
  4. proslijedio/la je Tweet

    Did some massive bug hunting tonight. New release out.

    Poništi
  5. proslijedio/la je Tweet

    A tool for automating cracking methodologies through Hashcat from

    Poništi
  6. proslijedio/la je Tweet
    prije 19 sati

    Yearly reminder to remove PowerShell V2 EVERYWHERE. Doesn’t matter what EDR , logging, witchcraft you have in place. If an attacker has access to the Posh V2 runtime, they can automatically bypass it all.

    Poništi
  7. proslijedio/la je Tweet
    prije 13 sati

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  8. proslijedio/la je Tweet
    prije 12 sati

    My team is hiring for a researcher (Redmond, WA). Threat hunting with a solid dose of collaboration to protect customers across the world. Please apply to the job posting and ping me direct if you have questions or curiosities.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    prije 16 sati

    F-Secure Internet Gatekeeper Unauthenticated RCE vulnerability (heap overflow) explained

    Poništi
  10. proslijedio/la je Tweet
    prije 17 sati

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  11. proslijedio/la je Tweet
    prije 21 sat

    A new search engine from NSA, apparently.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    2. velj
    Poništi
  13. proslijedio/la je Tweet
    prije 19 sati

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  14. proslijedio/la je Tweet
    2. velj

    "HTTP/3 for everyone" - the video, the slides, my comments. Whoa, what a FOSDEM my friends! Let's do this again...

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  17. proslijedio/la je Tweet
    2. velj
    Poništi
  18. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·