Create a DA/EA account?
-
-
-
Never in my pentesting career have I seen anyone actually alert on this. I think I've put this recommendation in every single report I've ever written.
- Još 2 druga odgovora
Novi razgovor -
-
-
Running massscan over all internal networks over all ports - Downtime and breached SLAs are pretty loud! Definitely do NOT recommend doing this though! Bringing down a company network is likely out of scope of a pen test.pic.twitter.com/yB8ymSp4vR
-
The warning is for other folks reading this than
@TimMedin or similar crew ;) - Još 2 druga odgovora
Novi razgovor -
-
-
Default Burp & Nessus scans blasted at the full subnet concurrently while exfiltrating a 40GB spreadsheet you made full of demo CC# and SSNs and opening 65535 connections to Freenode.
-
I like how you roll,
@J0hnnyXm4s ! - Još 1 odgovor
Novi razgovor -
-
-
Ooo! On a target Windows machine: PS C:\> Invoke-WebRequest -Uri Invoke-WebRequest -Uri "http://windows.metasploit.com/metasploitframework-latest.msi …" -OutFile msf.msi-OutFile msf.msi PS C:\> msiexec /i msf.msi /qn
-
I've found git cloning the exploit db is pretty noisy
- Još 1 odgovor
Novi razgovor -
-
-
If you have PowerShell and they are monitoring domains/DNS lookups...https://gist.github.com/rvrsh3ll/aca6920e3546c8be18ffb63454058c14 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
run something with an image name or command line including the text "Invoke-Mimikatz" on multiple monitored machines, bonus points if you also use port 1337 for a reverse TCP shell
- Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.