Adam Toscher

@W00Tock

RF Red Team Engineer

2.4 GHz or 5 GHz
Vrijeme pridruživanja: ožujak 2018.

Tweetovi

Blokirali ste korisnika/cu @W00Tock

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @W00Tock

  1. Prikvačeni tweet
    5. lip 2019.

    I just published How to create an EVIL LTE Twin

    Poništi
  2. proslijedio/la je Tweet
    prije 17 sati

    Rush Limbaugh just got the Presidential Medal of Freedom. Are we living in a sitcom?

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry.

    Poništi
  4. proslijedio/la je Tweet
    4. velj
    Odgovor korisnicima i sljedećem broju korisnika:
    Poništi
  5. proslijedio/la je Tweet
    4. velj
    Poništi
  6. proslijedio/la je Tweet

    every wifi hacker at every con: ooo im gonna try all my new techniques on the wifi! itll be great, target rich environment! same dork a day later: booo the hotel wifi is slow and dumb! why cant I get anywhere? why is the quality such garbage?

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  8. proslijedio/la je Tweet

    Thank you for your continued support of ! Check out the latest blog from User Enumeration Part 1 – Building Name Lists. Register at and stop by the Red Siege booth.

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Awesome work finding an RCE in SharePoint by which also affected SharePoint Online

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.

    Poništi
  11. 29. sij

    How to Red Team #6 - Password spray and credential stuff all weak services - low and slow - Remember to try and leave no IOC's - Custom C2's and using out of band communications might help with many EDR or egress issues -Payload type is paramount

    Prikaži ovu nit
    Poništi
  12. 29. sij

    How to Red Team #5 Lateral Movement - On the same host - Incognito (Token impersonation attacks) Lateral Movement - Off the host - Pass the Hash - Pass the Ticket - RDP - WMI Lateral Movement - Exploit Common CVE's MS 8067, MS 1710, CVE-2019-1181 Dump DC - VS - DCSync

    Prikaži ovu nit
    Poništi
  13. 29. sij

    How to Red Team #4 Initial Access to fully compromised Host - Post Exp Enumeration - Privilege Escalation - Dump credentials if possible (mimikatz) - Gain credentials (kerberoasting) - Live off the Land - Query SPN's and AD using tools like Bloodhound or Impacket's

    Prikaži ovu nit
    Poništi
  14. 29. sij

    How to Red Team #3 Credentials but no full compromise of Host - Nmap/Scan network(s) - Try to escalate using PowerView, etc

    Prikaži ovu nit
    Poništi
  15. 29. sij

    How to Red Team #2 On Network with no Credentials or Access -LLMNR/NETBIOS POISION HASHES -RELAY HASHES -MITM6 -ARP POISIONING

    Prikaži ovu nit
    Poništi
  16. 29. sij

    How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    29. sij

    If you are on the fence about attending. I cannot say enough good things about the quality of the event put on by the Black Hills team and the speakers they invite. I would absolutely recommend this event.

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    Just received confirmation I'll be giving a talk at San Diego on web hacking. It will give a beginner friendly recount of an exploit path I used in a big bounty, and it will be heavy on demos (slides will only help introduce concepts). Hope to see you there!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    29. sij

    If you are new to hardware hacking or are interested in working with tools that don't require soldering! Check out my Blog. Should be easy to follow. I had my 14 year old run through it without any problems. This will be one of the new hands on labs at

    Poništi
  20. proslijedio/la je Tweet

    It's Wilder, It's Wester, It's a Hacker Fester!!! You won't want to miss the opportunity to be part of our epic first year! - Way West, San Diego - March 11-13! Check out our website for all activities, make plans and register today!

    Poništi
  21. proslijedio/la je Tweet

    Booked your ticket to in San Diego? Here's what the ticket includes: Access to all Talks, Labs & Workshops, B&B Tourny, Capture the Flag; All Special Events, one awesome kick-off party, food and much more!! Register now at

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·