Bk

@_bka_

Infosec enthusiast, Pentester, Network Security, Monkey Island addict

Vrijeme pridruživanja: srpanj 2016.

Tweetovi

Blokirali ste korisnika/cu @_bka_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_bka_

  1. proslijedio/la je Tweet
    31. sij

    USB-C Transfers Slow? The fix might be easy! Hint: It's upside-down

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    30. stu 2019.

    this was the funniest shit at 2 am, if you play Skyrim you know, you just know 😭

    Prikaži ovu nit
    Poništi
  3. 30. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    8. stu 2019.

    Am 25.11 geht es weiter mit und einem interaktiven Windows Breakout Training im in Essen. Alle infos gibt es unter .

    Poništi
  5. proslijedio/la je Tweet
    23. lis 2019.

    Windows 10 (RS1-19H2+) UAC bypass using EditionUpgradeManager undocumented autoelevated COM interface. Works together with environment variables spoofing,

    Poništi
  6. proslijedio/la je Tweet

    🔥 CVE-2019-14287 A flaw in Sudo—that comes installed on almost every OS—could let users run commands as "root" even when they're restricted. Details ➤ How? Just by specifying user ID "-1" or "4294967295" in the command instead of the root.

    Prikaži ovu nit
    Poništi
  7. 9. lis 2019.

    It's this time of the year again Just arrived in Ghent

    Poništi
  8. 24. kol 2019.

    "I'm Guybrush Threepwood, mighty pirate"

    Poništi
  9. proslijedio/la je Tweet
    22. lip 2019.

    I am so incredibly excited to announce the release of Recon-ng v5!!! Hosted on Github, upgraded to Python 3, a module marketplace, updated docs, new command interface, plus much more. See the wiki for info.

    Poništi
  10. proslijedio/la je Tweet
    13. lip 2019.

    Short blog and POC code for CVE-2019-1040 (patched last Tuesday). Combining this vulnerability with the SpoolService bug and Kerberos delegation means: any AD user to Domain Admin; RCE on unpatched hosts; possible over Forest trusts. TL;DR: GO PATCH!

    Poništi
  11. proslijedio/la je Tweet
    12. lip 2019.

    I’m glad to annonce the release of my blog post! I’m tried to explain how AMSI is working and how it is possible to bypass AMSI.

    Poništi
  12. proslijedio/la je Tweet
    4. lip 2019.

    Rough draft MSF module. Still too dangerous to release, lame sorry. Maybe after first mega-worm? 🚨 PATCH CVE-2019-0708 🚨 35c2571801b3b6c4297ed362cf901dc4e907ff32a276fb6544a2b9d0f643f207

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. 24. svi 2019.

    The CVE-2019-0708 detection module for Metasploit was just pushed upstream. Do a 'msfupdate' now and try 'use auxiliary/scanner/rdp/cve_2019_0708_bluekeep'. Thanks and JaGoTu for your efforts

    Poništi
  15. proslijedio/la je Tweet

    Our ATR team is sharing their analysis of the wormable RDP Vulnerability CVE-2019-0708, where RDP stands for “Really DO Patch!”

    Poništi
  16. proslijedio/la je Tweet
    25. tra 2019.

    In February I found a security vulnerability in HiDrive. HiDrive is distributed by at least three big providers in Germany such as 1&1, Telekom, Strato. This blog post explains how I was able to escalate user privileges to SYSTEM by abusing a WCF endpoint.

    Poništi
  17. proslijedio/la je Tweet
    7. tra 2019.

    why exactly is it possible for the customer support to verify my authenticity using 2 of the characters of my online banking account? I believed, in the year 2019, we're saving credentials in a safe way (i.e. using a hash function/bcrypt)?

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    22. ožu 2019.

    As Rob points out, src port 53 does indeed reveal almost 1 million host difference scanning all IPv4 space, just not in the direction we expected Side A - Src Port < 1024: Found 2034432 UDP Side B - Src Port 53: Found 1190639 UDP

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    27. velj 2019.

    Christopher Vella will be presenting his talk on EDR Internals and Bypasses at this Friday! Find out more:

    Poništi
  20. proslijedio/la je Tweet
    24. sij 2019.

    Der heimliche Star des Chaos Communication Congress in Leipzig: Der Chaostreff Recklinghausen mit seinem vollautomatischen Cocktail-Mixer aus dem 3D-Drucker

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·