Tweetovi

Blokirali ste korisnika/cu @SkelSec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SkelSec

  1. proslijedio/la je Tweet
    prije 9 sati

    Python implementation using a slightly modified 3DES algorithm for opening telnet interface on HiSilicon DVR devices with advanced (encrypted) command parser: Co-work with , detailed analysis by him is here:

    Poništi
  2. prije 9 sati

    How to undo this?????? Asking for a friend

    Prikaži ovu nit
    Poništi
  3. prije 9 sati

    1. Walk into office 2. Find unlocked laptop 3. Win+R cmd 4. net group "domain admins" myuser /DOMAIN /ADD 5. "The command completed successfully"

    Prikaži ovu nit
    Poništi
  4. 1. velj

    Dear please give half of what I am spending on buying your licenses to this man. He is the only reason I havent ditched you long ago. It is a f***ing disaster what u do with your linux drivers.

    Poništi
  5. 1. velj

    Times like these I really loose faith in humanity

    Prikaži ovu nit
    Poništi
  6. 1. velj

    I miss having access to a brutalis :(

    Poništi
  7. 1. velj
    Prikaži ovu nit
    Poništi
  8. 1. velj

    Why. Are. You. Doing. This.

    Prikaži ovu nit
    Poništi
  9. 1. velj

    Luckily he was using an unprivileged account so no real harm was done. Just kidding ofc it's an adm account

    Prikaži ovu nit
    Poništi
  10. 1. velj

    SOC: "wow! We really could reach it" At this point the employee just opened a share whose address was given by someone whose computer is generating tons of alerts

    Prikaži ovu nit
    Poništi
  11. 1. velj

    SOC: We can't access that server" Me: "I am pretty sure you can, I just made it"

    Prikaži ovu nit
    Poništi
  12. 1. velj

    After spending 30 minutes of exchaning email addresses over the phone unsuccsessfully I told the operator to open a specific share on their corp lan and I'll write my email address there

    Prikaži ovu nit
    Poništi
  13. 1. velj

    Wooohooo! 1AM phone call from the SoC from a different continent. That is a new experience.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    31. sij

    The USB Armory Mk.II has landed!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. sij

    very excited to drop the first show notes for the season 3 premiere of next week :D

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixes

    Poništi
  17. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Security people, learn 👏 how 👏 to 👏 code 👏!

    Poništi
  19. proslijedio/la je Tweet
    22. sij

    ppldump : Injects MiniDumpWriteDump() Shellcode into PPL procs (lsass demo) to dump memory. Got better tools, so useless to me now. Note sometimes the threads lock after the APC is queued, causing MiniDumpWriteDump to fail. Just resume the thread(s)

    Poništi
  20. 22. sij

    Can someone shower me with process memory minidumps taken from any process but it needs to be on the following architectures: ARM ARM64 Itanium (for fun)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·