Tweetovi

Blokirali ste korisnika/cu @__invictus_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__invictus_

  1. Prikvačeni tweet
    13. kol 2019.

    Re-sharing my research on abusing Autocad as part of a targeted attack - helpful if you have a red team this summer against an engineering and/or architecture firm, or found some autocad users during osint.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    30. sij
    Odgovor korisnicima

    Just for you, custom version via execute-assembly.

    Poništi
  4. 30. sij

    On successful compromise of the user endpoint, the red team deployed their ultimate weapon

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    seriously considering tweeting at length about made up and unverifiable threat actor groups using high-level language to bolster my infosec thought leader credentials

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  7. proslijedio/la je Tweet
    24. sij

    cookie_crimes : Read local Chrome cookies without root or decrypting : sharpcookiemonster : cc

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  9. proslijedio/la je Tweet
    19. sij

    command-line MSBuild.exe detection's got your down? How about MSBuild without MSBuild.exe?

    Poništi
  10. proslijedio/la je Tweet
    14. sij
    Poništi
  11. proslijedio/la je Tweet
    13. sij

    New blog post on the Microsoft Cloud: What is Azure Active Directory? Post covers what Azure AD is, how it compares to on-prem Active Directory, connecting via PowerShell, and password spraying attacks, mitigation, & detection.

    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    7. sij
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    6. sij

    Brutal from - honest rather than funny. Completely irrelevant awards event nowadays anyway. “Give all the awards to Netflix” !!

    Poništi
  15. proslijedio/la je Tweet
    28. pro 2019.

    Just published some thoughts on red teaming, how to approach it, procure it and get in to it...

    Poništi
  16. 24. pro 2019.

    The best tweet so far on this whole debate/drama/ridiculousness

    Poništi
  17. proslijedio/la je Tweet
    24. pro 2019.
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    5. pro 2019.

    If someone takes the time to release something they learned publicly that can be used for offsec purposes, be the first to write the detection, not the first to complain. Those that complain just show they aren’t competent enough to write detections.

    Poništi
  19. 29. stu 2019.
    Poništi
  20. 16. stu 2019.

    My Mrs gets the best DMs - I wonder what it's like to feel like a "serdine"

    Poništi
  21. proslijedio/la je Tweet
    7. stu 2019.

    Check out my new blog post on how edit rights on an OU can be abused to compromise any of its child objects. Thanks to , and as a number of their tools were used in the PoC.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·