Urahara

@Urahara3389

NSFOCUS M01N Security Team 风流#formsec.cn Team RedBlue/WEB/Windows???

Vrijeme pridruživanja: svibanj 2017.

Tweetovi

Blokirali ste korisnika/cu @Urahara3389

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Urahara3389

  1. 26. sij

    Mamba out. Rest in peace. 😭😭😭 Thank you for appearing in my youth.

    Poništi
  2. proslijedio/la je Tweet
    3. sij

    The offensive security community means a lot to me. Following 's great thread that injected some much needed infosec positivity, I wanted to highlight a few (offensive-ish) posts/talks that my team and myself enjoyed over the last year or so.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    28. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    16. stu 2019.

    Some number reviews for the two-day 2019 PWN contest: 17 teams delivered 28 on-site demonstrations with 20 successful and 8 failed 11 teams have gained bonus 8 targets been taken down Total bounty of $545,000 awarded! Thanks everyone for participating!

    Poništi
  5. proslijedio/la je Tweet
    13. stu 2019.
    Poništi
  6. proslijedio/la je Tweet
    25. ruj 2019.

    Just finished a small update to enumerate interesting ACLs on the domain object (based on Powerview’s Invoke-AclScanner function), learnt a lot!

    Poništi
  7. proslijedio/la je Tweet
    8. kol 2019.

    quick tip: [Rogue DllHost.exe] procname="dllhost.exe" & parent_procname!="svchost.exe" & parent_procname!="services.exe" and parent_procname != null

    Poništi
  8. proslijedio/la je Tweet
    7. kol 2019.

    traces of wmiexec for lateral movmt cmdline="cmd.exe /c *2>" and parent_procname=wmiprvse.exe

    Poništi
  9. proslijedio/la je Tweet
    15. srp 2019.
    Poništi
  10. proslijedio/la je Tweet
    16. svi 2019.

    Weblogic RCE CVE-2019-2725

    Poništi
  11. 15. svi 2019.
    Prikaži ovu nit
    Poništi
  12. 22. tra 2019.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    19. tra 2019.
    Poništi
  14. 19. tra 2019.

    This’s what you want. —— By NSFOCUS M01N Red Team & FUYING LAB

    Prikaži ovu nit
    Poništi
  15. 19. velj 2019.
    Poništi
  16. proslijedio/la je Tweet
    29. sij 2019.

    2018年初整理的一些内网渗透的tips,希望更多师傅来丰富内容!

    Poništi
  17. 17. stu 2018.

    There is always a method here is useful for you to penetration test

    Poništi
  18. proslijedio/la je Tweet
    5. stu 2018.

    Happy Guy Fawkes day. New blog post is up showing how we can export .NET methods from a DLL, aka, rundll32 your .NET.

    Poništi
  19. proslijedio/la je Tweet
    7. lis 2018.

    Pop calc.exe via Excel file of less than 100 bytes in size. Circumventing protected view! Put the following lines in a .slk file and accept the Excel macro warning. More magic in the presentation of and myself. Recording via will be online soon!

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    28. ruj 2018.

    Fun on restricted env.: Local policies restrictions/Defender/ bypass using WMI and p0wnedShell + Meterpreter session via tested on 1703/1709 - Can stay fud w/ ScriptBlock logging bypass too ;) thx

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·