Zenk-Security

@ZenkSecurity

irc://irc.rizon.net/zenk-security Computer security - Community Blog / Forum / Wiki / Repository

Vrijeme pridruživanja: rujan 2010.

Tweetovi

Blokirali ste korisnika/cu @ZenkSecurity

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ZenkSecurity

  1. proslijedio/la je Tweet
    26. sij

    Zenk-security s'est construite pendant 10 ans autour de l'idée de partage non marchand du savoir en sécurité informatique. Nous avons désormais un Discord et il est ouvert à toutes et tous. :

    Poništi
  2. proslijedio/la je Tweet
    16. sij

    French infosec addict looking for a vulnerability researcher/pentester remote position. RT appreciated ! DMs open ;)

    Poništi
  3. proslijedio/la je Tweet
    3. pro 2019.

    I just released "lsassy" ! Tool to remotely parse lsass dumps using and Automate the whole process using my CME module 🔹lsassy : 🔸CME Module : French article about this technique : 🙃

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    le 23 nov à 11h35 > Dealing with password reuse attacks in 2019 par Pierre-Antoine Haïdar-Bachminska [] Réservez votre place seulement pour 15€ cc

    Poništi
  5. proslijedio/la je Tweet
    18. ruj 2019.

    Turns out that good old dll hijacking can be used to have fun with odbcad32 from the cmdline/non gui

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    17. kol 2019.

    Sweat pour mettre le pinard en bouteille

    Poništi
  7. proslijedio/la je Tweet
    7. kol 2019.

    The token menace ... frameworks are complex, and their relies on the quality of the implementation. and discuss their vulnerability find at

    Poništi
  8. proslijedio/la je Tweet
    15. srp 2019.
    Poništi
  9. proslijedio/la je Tweet
    13. lip 2019.

    Short blog and POC code for CVE-2019-1040 (patched last Tuesday). Combining this vulnerability with the SpoolService bug and Kerberos delegation means: any AD user to Domain Admin; RCE on unpatched hosts; possible over Forest trusts. TL;DR: GO PATCH!

    Poništi
  10. proslijedio/la je Tweet
    9. lip 2019.
    Poništi
  11. proslijedio/la je Tweet
    4. lip 2019.

    Awesome blog post by ! Blog talks about finding COM objects that allows an attacker to get arbitrary command execution:

    Poništi
  12. proslijedio/la je Tweet
    9. ožu 2019.

    is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.

    Poništi
  13. proslijedio/la je Tweet
    8. ožu 2019.

    En , la notion de SPN est essentielle. Découvrez ce que sont les dans un avec ce nouvel article 🙃 PS : Si quelqu'un peut m'éclairer sur la question posée dans le paragraphe "Cas particulier - HOST" je suis preneur (J'offre des 🍻)

    Poništi
  14. proslijedio/la je Tweet
    10. stu 2018.

    How phishing works

    Poništi
  15. proslijedio/la je Tweet
    6. ožu 2019.

    New .Net deserialization gadget TextFormattingRunProperties already added to .NET of

    Poništi
  16. proslijedio/la je Tweet
    26. velj 2019.

    So as promised, I am open-sourcing my own collection on WAFs as an awesome list. I still feel the collection is pretty incomplete. There is a lot *eyes closed* left to add to it.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    19. velj 2019.

    I put together a Process Hollowing version of CACTUSTORCH.

    Poništi
  18. proslijedio/la je Tweet
    18. velj 2019.

    Finally finished my (rather long) blog and toolkit about Unconstrained Kerberos Delegation: Hope you'll all enjoy the read!

    Poništi
  19. proslijedio/la je Tweet
    14. velj 2019.

    On manque toujours cruellement de WriteUp pour les chall de reverse en ctf. Ça chaufferait du monde de faire des soirées reverses pour partager nos méthodos, scripts, tools ... ? Le tout autour d’une petit verre, bien sûr 😜

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    14. velj 2019.

    Pentesting 101 && IoT security 101

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·