Tweetovi

Blokirali ste korisnika/cu @_Kiewicz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_Kiewicz

  1. Prikvačeni tweet

    This year i got an awesome job as a RT (at an amazing company btw). I learned a lot from you, so for sharing great and free content!

    Prikaži ovu nit
    Poništi
  2. 2. velj
    Poništi
  3. 3. velj

    It's so hilarious that hackers are posting stuff like reverse engineering tutorials on pornhub because YouTube bans them. "Boss, I swear, it's not how it looks, I was watching a conference talk!"

    Poništi
  4. 2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  5. 31. sij

    Happy Friday hackers! Nitesh found a critical RCE vulnerability in Jenkins that led us to discover a Bitcoin mining service running on a DoD website 😲. Head over to the disclosed report to see all the details! Thanks for being 🔥 Nitesh

    Poništi
  6. 30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  7. 30. sij
    Odgovor korisniku/ci
    Poništi
  8. 28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  9. 29. sij
    Poništi
  10. 29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  11. 27. sij

    👋 operators: Which defensive settings have you encountered that made it *super* painful for you to operate in a Windows AD environment?

    Poništi
  12. 28. sij
    Poništi
  13. 28. sij

    tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS.

    Poništi
  14. 25. sij
    Poništi
  15. 24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  16. 22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  17. 22. sij
    Poništi
  18. 21. sij

    Per this report: Bezos was in a WhatsApp chat with Saudi's MBS when unprompted the crown prince sent him a random file. The file it appears contained malware, which allowed Bezos' phone to be hacked ... leading to leaks of photos designed to embarass him

    Prikaži ovu nit
    Poništi
  19. 16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  20. 13. sij

    New blog post on the Microsoft Cloud: What is Azure Active Directory? Post covers what Azure AD is, how it compares to on-prem Active Directory, connecting via PowerShell, and password spraying attacks, mitigation, & detection.

    Poništi
  21. 13. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·