Tweetovi

Blokirali ste korisnika/cu @_RastaMouse

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_RastaMouse

  1. proslijedio/la je Tweet
    prije 4 sata

    UPDATED 🚨 Advance your skills! ✔️ Expanded breach scenario (new flag 🚩) ✔️ New phishing techniques ✔️ Password scheme update ✔️ Windows & Defender updates R U Ready? 🙃 Sign up today:

    Poništi
  2. proslijedio/la je Tweet
    prije 24 sata

    Info regarding the RastaLabs update is now available on our website Some very cool updates to make the learning experience even more relevant to present-day threats. Sign up today!

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    Next webinar Powershell ADSI/AD.Net Basics, what delivery platform is prefered? Only jave 50 seats in GT

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    As promised, here is the follow up defensive blog to last weeks post on Attacking Azure.

    Poništi
  5. proslijedio/la je Tweet
    prije 23 sata

    For those who missed our Twitch stream of bypassing twitchguard mulit-factor auth:

    Poništi
  6. proslijedio/la je Tweet

    Will be in Tel Aviv for , for a talk about and DPAPI internals 🥳 Only the 5th (busy kiwi is busy), but with stickers 🥝 >

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  8. proslijedio/la je Tweet
    3. velj
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    2. velj
    Poništi
  10. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    I've reported a few bugs to this past year and have been impressed with their handling of each issue. Here is their write-up about a recent symlink priv esc bug in the Avast Secure Browser (ASB) Updater:

    Poništi
  12. proslijedio/la je Tweet
    1. velj
    Odgovor korisnicima

    After consideration, we will be releasing this next week, meaning we skip release today. Our sincere apologies - this was a new type of failure for us, and something not observed before infrastructure wise.

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Next week, and I are going to demo live a bypass for "Twitchguard". A new type of multi-factor account for twitch access. (yes we responsibly disclosed) "Wont-fix" so we'll be doing it live on twitch about twitch :P

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    Myself and are off to USA 2020 to deliver our Adversary Simulation and Red Team Tactics course. Stay tuned for some upcoming posts on how the supporting labs were created

    Poništi
  15. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Happy to introduce everyone to our Initial Access Operations course! We’re looking at different ways bad guys try to break into networks and the phishing malware they develop. It’s a hands on class, be ready to code! Come join us at !

    Poništi
  18. proslijedio/la je Tweet
    31. sij

    Awesome work finding an RCE in SharePoint by which also affected SharePoint Online

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    Very excited to announce and me will be bringing our training to Vegas this August for - we'll follow up soon with some revelations on what makes this course so exciting!

    Poništi
  20. proslijedio/la je Tweet
    30. sij

    New Twist on an older technique MD5: 4b82f1de393a07aa9ba91d046e2fd6b0 Execute Assembly via System.Runtime.InteropServices.RegistrationServices.UnregisterAssembly. Basically just Another Way to Call Instead of CreateInstance. There is more here but that was fun.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·