Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Wietze
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Wietze
-
Prikvačeni tweet
This week I gave a talk at
@BSidesLondon on how to do Adversary Emulation the right way, featuring@MITREattack's CALDERA
If you want to see LOLbins, obfuscation and masquerading in action, check out the slides & code:
https://github.com/wietze/bsides-ldn-2019/ …
#BSidesLDN2019pic.twitter.com/fQO0uMD1ZV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Good write-up
@WeizmanGal
"Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access"
https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/ …pic.twitter.com/jkvby6RmAs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
But if the key is present and the TeamViewer service is running, you might be able to perform actions as SYSTEM.
It's still bad practice to encrypt passwords, regardless of how it can be used.
Should it be fixed? Yes. Is it as bad as some people claim? No.
[3/3]Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
In v10+ PermanentPassword is used, which cannot be decrypted with the given key/IV.
The flaw gives you TeamViewer's Unattended Access password, not your Windows one.
Even if present and successfully decrypted, 'privilege escalation if reused' is a bit of a stretch.
[2/3]Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
On the TeamViewer Privilege Escalation story (https://whynotsecurity.com/blog/teamviewer/ …)
After testing it for myself, the reg keys described in the post are not created in v10-15.
As pointed out on Reddit, the reg keys are only created in specific circumstances. https://old.reddit.com/r/netsec/comments/eya43p/teamviewer_stored_user_passwords_encrypted_not/fggd8xn/ …
[1/3]Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Wietze proslijedio/la je Tweet
PowerShell Obfuscation using SecureString : https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring … PowerShell : Convert to / From - SecureString decoder : https://www.wietzebeukema.nl/powershell-securestring-decoder/ … cc
@WietzeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
A write up of PowerShell obfuscation using SecureString: an obfuscation technique that has so far not received the attention it deserves. Your EDR might decode Base64 encoded strings, but will it automatically decode SecureString objects? Probably not.
https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring …pic.twitter.com/J4uzBJDyNf
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Recently I had to analyse some PowerShell scripts with `ConvertFrom-SecureString` obfuscation in it. I couldn't find a simple online tool to decode, so I built one myself.
Live: https://wietze.github.io/powershell-securestring-decoder/ …
Code : https://github.com/wietze/powershell-securestring-decoder …
Feedback welcome!pic.twitter.com/d6eKoekBF6
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Good read - a clever way of getting SYSTEM-level access to files, which can then be used to run arbitrary code as SYSTEM. Shame the vendor ignored the attempted responsible disclosure!https://twitter.com/decoder_it/status/1205158192499609611 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Party like its 1999: Y2K-esq bug in Splunk will lead to data loss starting 1 Jan 2020: https://docs.splunk.com/Documentation/Splunk/8.0.0/ReleaseNotes/FixDatetimexml2020 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We at
@PwC_UK are looking forward to present "Threat Modelling with Tanium" at@Tanium#CONVERGE19. We have some exciting things to share with you this year, hope to see you there! Join us on 19 November, 1PM EST https://www.tanium.com/converge2019/@Fmtscanf@fromCharCode@_FloatingPointpic.twitter.com/V0dOn553nhHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Check out which MPs are most often mentioned in the same
@Guardian articles
Updated with 2019 data
https://wietze.github.io/d3-prototypes/mp-relations …
(Unsurprisingly, the landscape has changed significantly since 2016 https://twitter.com/Wietze/status/733398003600384000 …)pic.twitter.com/MW6k7kfv42Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Wietze proslijedio/la je Tweet
You can't protect what you can't see. This year, we will show you how you can identify and visualise high risk threat vectors by combining and contextualising discrete datasets. It all begins with visibility...
#TaniumCONVERGE#riskmanagement@Tanium@Wietzepic.twitter.com/X4aVyygBMS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Therefore
#BlueTeam-ers, make sure you:
Avoid relying on JUST command line strings;
When you do, be aware of the different command line argument starts (/ vs - vs -- vs \, but as seen in the previous tweet not even that's everything). Make agnostic if possible!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Clever method indeed! Tried a few binaries, looks like it's mainly certutil that's vulnerable to this trick using alternative Unicode characters such as 'Modify Letter Capitals'. Same for the en/em dashes. Simple way of bypassing string-based detection! https://twitter.com/ItsReallyNick/status/1187907822866046976 …pic.twitter.com/aY6ItFTz7C
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Wietze proslijedio/la je Tweet
California has mandated minimum security standards for networked products. Other governments need to catch uphttps://econ.st/34KkWSk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A write-up of my
#BSidesLDN2019 talk on taking Adversary Emulation to the next level is now available. Read about how we have implemented common attacker techniques such as LOLbins, obfuscation techniques and masquerading in@MITREattack's CALDERA
https://www.pwc.co.uk/issues/imitation-game-attacker-emulation.html …pic.twitter.com/ui8yah4lnv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
3-year-old tweet, relevant again todayhttps://twitter.com/Wietze/status/753716324841431040 …
0:29Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.