Mark

@_markmo_

infosec. No one of consequence. Tweets are my own.

Dallas
Vrijeme pridruživanja: srpanj 2017.

Tweetovi

Blokirali ste korisnika/cu @_markmo_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_markmo_

  1. Prikvačeni tweet
    1. srp 2019.

    Finding new ways to do the same thing helps me learn.

    Poništi
  2. prije 4 sata
    Poništi
  3. proslijedio/la je Tweet
    2. velj
    Poništi
  4. 1. velj

    Definitely worth checking out. I played with this in my lab this morning. Super easy to use.

    Poništi
  5. 25. sij

    It has been done before but working on this tool with for parallel searching open file shares. Search entire domain, CIDR or Individual IP addresses/computer names. Currently It will search for file names and eventually file contents. Not quite ready yet.

    Poništi
  6. proslijedio/la je Tweet
    19. sij

    What is “Gaslighting”? RT this to support anyone who might be dealing with domestic violence. h/t

    Poništi
  7. proslijedio/la je Tweet
    18. sij

    Here's my write-up for the retired from HTB. I learned some important lessons: 1) Try harder, and don’t give up. 2) Never overlook the information gathering phase.

    Poništi
  8. proslijedio/la je Tweet
    17. sij

    The Red Team Village Call for Papers is now open! Please retweet and spread the word!

    Poništi
  9. 10. sij
    Poništi
  10. proslijedio/la je Tweet

    It took me several years, but I'm now able to do remote desktop WITH a smart card WITHOUT being part of a domain WITH NLA authentication. Pure Crypto authentication (no password hack behind the scene) Demo from W10 to W2016. Next in

    Poništi
  11. 20. pro 2019.

    Some good ppl to follow IMHO - Great write ups - Incredible community contributor - Read all of these quality tweets

    Poništi
  12. 19. pro 2019.

    I came across this malware analysis article the other day from Sophos and I learned a few things. I found other good articles there and you might find something helpful as well. No affiliation, just interesting to me.

    Poništi
  13. proslijedio/la je Tweet
    11. pro 2019.

    New blog post: "CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM" where I mostly talk about Tokens and Impersonation. 🔥 👉

    Poništi
  14. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    10. pro 2019.

    If you want to learn about hacking then check out this course being offered by . I've heard so many great things from former students and have such a respect for the man himself that, even though I haven't taken the class, I can wholeheartedly recommend signing up!

    Poništi
  16. proslijedio/la je Tweet
    6. pro 2019.

    knocked to our door and wanted to get listen and ... we kindly answered! From Service Account to SYSTEM again cc 0xea31()

    Poništi
  17. 2. pro 2019.

    Here is an updated categorized list of security tools. Thank you to the authors of these tools.

    Poništi
  18. 21. stu 2019.

    It’s nothing special but I really enjoy collaborating with on a public project. No ridiculous deadlines, no daily scrums, no support and we get to work on what we want to work on. Hopefully have something to show in a month.

    Poništi
  19. proslijedio/la je Tweet
    13. stu 2019.

    Introducing the "JWT Attack Playbook" A deep dive methodology for practical JWT testing. Written alongside the MASSIVELY UPDATED jwt_tool

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    12. stu 2019.

    NTLM reflection is back to haunt windows. Read about Ghost Potato here (this time with a fixed link):

    Poništi
  21. proslijedio/la je Tweet
    10. stu 2019.

    Pushed a massive update to Red Peanut with DonutS integration, Amsi evasion, dynamic functions invoke, direct syscall and blockdlls command

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·