Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @_Raeph
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_Raeph
-
Raph proslijedio/la je Tweet
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy! https://googleprojectzero.blogspot.com/2020/01/part-ii-returning-to-adobe-reader.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Post-exploitation
#Friday tip: Do you know how to trivially & remotely hijack an#RDP session without prompt nor warning on user's side using#Microsoft signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details: https://github.com/kmkz/Pentesting/blob/master/Post-Exploitation-Cheat-Sheet …#Pentestingpic.twitter.com/wHVIYQo73A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
TBH I'm more interested in what
@irsdl has found in .NET this time :-) https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0646 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Confirmed that
@google is reading encrypted@signalapp messages after they're decrypted since Android 10 upgrade. I can't uninstall GBoard. I'm gonna try Flexsy keyboard and see if that stops the suggestions or if this runs deeper in the Android stack.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
#BugBountyTip When using#Nmap as part of your#Recon arsenal, make sure to add --data-length=50 {or any number in 20~60, the TCP packet header size). Otherwise, Nmap will in many cases return False Positives (i.e. too many open ports, or ports that are not actually open).#TBCPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Thank for the kind words. I simply enjoy truly understanding what I'm doing which once in a while give me ideas. Knowledge is power. Sharing knowledge is even more powerful IMHO.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Recently I was on a pentest and needed to manage Active Directory groups from Linux to achieve privilege escalation. If you find yourself in a similar scenario, this is what you can do:https://www.n00py.io/2020/01/managing-active-directory-groups-from-linux/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
MySQL-JDBC unserialization RCE, disclosed in BlackHat Europe 2019.The attack controls the target to connect an evil MySQL Server, make it unserialize the evil Java Serialized Stream.Nice work!pic.twitter.com/NfxPQKJLdR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
I released new tool for extracting api keys and secrets. https://github.com/xyele/secretx
#bugbounty#bugbountytip#bugbountytips#hackerone#hacker101#bugcrowdpic.twitter.com/jzAuhGY7b8
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Meterpreter + PPID Spoofing — Blending into the Target Environment The PPID Spoofing is a quite fascinating technique since it lets spawn new processes under a different parent process ID. Let’s see how to implement it into the Meterpreter agent. https://iwantmore.pizza/posts/meterpreter-ppid-spoofing.html …pic.twitter.com/Pwtw8HSsdZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
New tool: rubeus2ccache Generates ccache files directly from Rubeus dump output. Major thanks to
@_dirkjan for basically writing anything hard. https://github.com/curi0usJack/rubeus2ccache … Merry Christmas Red Team!
pic.twitter.com/e8MWCDurq2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
A common misconception is that because the KRBTGT account is disabled, golden ticket attacks won't work. Not true. DC's know encrypted form of the KRBTGT password, that's how they validate kerberos tickets, not a KRBTGT logon. What are other common AD misconceptions?pic.twitter.com/rRyCbNozXc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
New blog post outlining how to use my .NET RPC Client tooling from PowerShell and C# to test and exploit local RPC security vulnerabilities. Also an early xmas present for those who enjoy long standing design flaws in UAC :-) https://googleprojectzero.blogspot.com/2019/12/calling-local-windows-rpc-servers-from.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Explanation of Service Principal Names in Active Directoryhttps://thebackroomtech.com/2018/08/21/explanation-of-service-principal-names-in-active-directory/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
SafetyDump - An in-memory process memory dumperhttps://github.com/m0rv4i/SafetyDump …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
My exploitation note for cve-2019-0708 (
#bluekeep) on Win7https://github.com/worawit/CVE-2019-0708/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
A graph-based tool for visualizing effective access and resource relationships in AWS environments. AKA BloodHound for AWS
https://github.com/FSecureLABS/awspx …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Raph proslijedio/la je Tweet
Version 0.1.1 is out !
CME module is now integrated in the same repository https://github.com/Hackndo/lsassy/tree/master/cme …
CME module adds credentials to CME databasePrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.