Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_dirkjan
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_dirkjan
-
Dirk-jan proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Dirk-jan proslijedio/la je Tweet
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZurehttps://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
So what was supposed to be a week of skiing got cut short due to a torn ACL (no not Windows related :p), but I did manage to port krbrelayx to Python 3 and make some progress on new tools so I guess there is that
pic.twitter.com/4A2YeoYmpq
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
Revisiting RDP lateral movement https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 … and releasing a project that will be part of a bigger tool coming next week
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Shout-out to
@_xpn_ for pointing this out in his blog on inter-realm keys:https://blog.xpnsec.com/inter-realm-key-roasting/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If you're playing with Kerberos and want to view the encrypted parts in Wireshark you can do so with a keytab file. Since impacket was missing structures for this I added a script to my forest trust tools repo which easily allows adding multiple keys:https://github.com/dirkjanm/forest-trust-tools …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
As much as I love cloud, I'm super excited to be talking about Kerberos and Active Directory trusts (and breaking forest trusts again) at Black Hat Asia! https://www.blackhat.com/asia-20/briefings/schedule/#walking-your-dog-in-multiple-forests---breaking-ad-trust-boundaries-through-kerberos-vulnerabilities-18818 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Day 1 of our internal Active Directory training at
@foxit is done! Only 4 more to go in a week full of AD internals, privileges, Kerberos, Rubeus, NTLM, mimikatz, ACLs, trusts, impacket, BloodHound and more
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
New http://ADSecurity.org blog post on the Microsoft Cloud: What is Azure Active Directory? https://adsecurity.org/?p=4211 Post covers what Azure AD is, how it compares to on-prem Active Directory, connecting via PowerShell, and password spraying attacks, mitigation, & detection.pic.twitter.com/GDS3rOzsW0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
Introducing Security Defaults - secure default settings that we manage on organization's behalf to keep customers safe until they are ready to manage their own identity security story.
#AzureAD https://techcommunity.microsoft.com/t5/azure-active-directory-identity/introducing-security-defaults/ba-p/1061414 …@Alex_T_WeinertHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
Do you struggle to understand
#Kerberos in#ActiveDirectory environment ? This new article may help clarify things by simply explaining how Kerberos works. It is the first of a serie of posts about attacking Active Directory. Stay tuned
https://en.hackndo.com/kerberos/ Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
Not long until
@hackcon 2020 Insane amount of great speakers/trainers!@HackingDave@olafhartong@Op3n4M3@jaysonstreet@_dirkjan@jabjorkhaug@maritio_o Ryan MacDougall, Sebastiaan Bäck, Erich Ficker, Hassan Ahmad, Jens Müller Details and registration: https://www.hackcon.org pic.twitter.com/iYMSYWF77BPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
For more info about the why, how and how to prevent it, see https://dirkjanm.io/worst-of-both-worlds-ntlm-relaying-and-kerberos-delegation/ …https://twitter.com/nullenc0de/status/1214619251761438722 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
lsassy 1.0.0 is finally out !
Remotely dump #lsass **with built-in Windows tools only**, procdump is no longer necessary
Remotely parse lsass dumps to extract credentials
Link to #Bloodhound to detect compromised users with path to Domain Admin https://github.com/Hackndo/lsassy pic.twitter.com/vljW7swZGr
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
Just published some thoughts on red teaming, how to approach it, procure it and get in to it...https://link.medium.com/eV1myC6NM2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
Cool! My lightning talk submission for
@WEareTROOPERS is accepted: "The caveats of implementing smart cards and MFA in Active Directory". 25 Minutes packed with nasty security details of AD, Kerberos and NTLM. Looking forward to another edition of this awesome conference!#TR20Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'm really looking forward to returning to
@WEareTROOPERS next year! I'll be talking about Azure AD exploration and drop some big tooling for both red and blue teams
. Also @WEareTROOPERS is a super cool conference so if you have the chance I highly recommend attending!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
new blog post: No Shells Required - a Walkthrough on Using Impacket and Kerberos to Delegate Your Way to DA http://blog.redxorblue.com/2019/12/no-shells-required-using-impacket-to.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dirk-jan proslijedio/la je Tweet
Operation Wocao: shining a light on one of China's hidden hacking groups. https://www.fox-it.com/nl/actueel/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/ …pic.twitter.com/39D7gEaUNf
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.