Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @__Masq__
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__Masq__
-
Spencer Walden proslijedio/la je Tweet
Today's study session

- Studying x86 Assembly(It has been a bit tedious not gonna lie)
Sometimes I feel stupid lol
- Reading more about Reverse Engineering. It's a topic I always liked but was scared to get more into.
Does anyone have any Binary Exploitation exercises?Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Hey
@Fama_Tech - Your product is shit and your company is shit. Not only is what you’re trying to do hurting society, but your delivery of it is completely worthless. Analyze this:
https://twitter.com/kmlefranc/status/1223418818917060610?s=20 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Ever wondered *how* those adverts manage to keep on finding you - even when you go incognito, switch devices, or never actually searched for the product in the first place? Let us count the (many, many) ways [THREAD]
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working. https://github.com/inv-ds-research/yaraml_rules …pic.twitter.com/sfuXEkHeNO
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
looking for a job in security? looking for employees? been a while since i've seen a security job thread. let's post all of these here so people can network!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
This might not be completely obvious, so I feel the need to say it. The sick day isn’t for your benefit. It is for the benefit of everyone else in the office. If you feel the need to be a hero, work from home.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
I've transformed the expressions from my "Top Base64 Encodings" learning aid into a YARA and Sigma rule and published them in the respective repos Learning Aid https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 … YARA https://github.com/Neo23x0/signature-base/blob/master/yara/gen_powershell_susp.yar#L204 … Sigma https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_powershell_frombase64string.yml …pic.twitter.com/5C5MRGGFaL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Want to know a fun thing about CVE-2019-0604? Thousands of publicly exposed systems still run SharePoint 2007. Doesn’t matter as the advisory says it doesn’t apply to SP 2007, right? Wrong. Exploit absolutely works, product is out of support. Vuln scanners don’t detect.https://twitter.com/gossithedog/status/1126833629236215808 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
I made a goose that destroys your computer Download it free here: http://samperson.itch.io/desktop-goose pic.twitter.com/cCGdoOYW1Y
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
ATTENTION STUDENTS
Are you a current student? Are you looking to attend an infosec conference this summer? If so, this tweet is for you! I am gifting one student a pass to @BlueTeamCon*. Reply to this tweet with your major to be entered and I'll select a winner. Good luck!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Document unto others as you would have others document unto you.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Post-exploitation
#Friday tip: Do you know how to trivially & remotely hijack an#RDP session without prompt nor warning on user's side using#Microsoft signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details: https://github.com/kmkz/Pentesting/blob/master/Post-Exploitation-Cheat-Sheet …#Pentestingpic.twitter.com/wHVIYQo73A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Sigma rule to detect trivial & remote RDP session hijacking via mstsc shadowing https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_rdp_hijack_shadowing.yml …https://twitter.com/kmkz_security/status/1220694202301976576 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
What issues do people have with a
#Sysmon rollout in an enterprise? Log volume? I’ve seen orgs worried about 20GB of daily Sysmon log data, while at the same time spending a 6 figure sum on a license to process 500GB of daily firewall log data. (which is mostly useless)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs How to get in front of the issue:https://opensecurity.global/forums/topic/249-preventing-ldap-apocalypse-in-march-2020-ldap-signing-requirements/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Windows Kiosk breakout tip: If you get a Printing panel, and the traditional methods don't work: Amongst the printers, select "SendTo OneNote" OneNote will launch -> Add new notebook On the Notebook -> New page Type: \\127.0.0.1\c$\windows\system32\cmd.exe Click the link
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Flamingo is a new open source tool from
@Atredis for capturing credentials sprayed by IT and security products: https://www.atredis.com/blog/2020/1/26/flamingo-captures-credentials … (h/t to@4lex for HTTP NTLM support!)pic.twitter.com/V2jKi3Enpg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spencer Walden proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
CVE-2019-0604 is being exploited in the wild