Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_nullbind
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_nullbind
-
Scott Sutherland proslijedio/la je Tweet
Getting DNS Client Cached Entries with CIM/WMIhttps://www.darkoperator.com/blog/2020/1/14/getting-dns-client-cached-entries-with-cimwmi …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
#PingCastle 2.8.0.0 released !!! https://pingcastle.com/download/ 4 clicks and 2 <enter>, that what's between you and the hard truth of your AD security. Example of report: https://pingcastle.com/PingCastleFiles/ad_hc_test.mysmartlogon.com.html … github: https://github.com/vletoux/pingcastle … Changelog: https://raw.githubusercontent.com/vletoux/pingcastle/2.8.0.0/changelog.txt …pic.twitter.com/1oQXuIJcdiHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Load encrypted PE from XML Attribute. MSBuild is still the best.
https://github.com/XwingAngel/PELoader/ …
MSBuild sets Property then calls Execute.
Use this example to decouple payloads & prove that all security products have a "Single File Bias".
Decouple payloads to subvert detection.pic.twitter.com/648rujlLQn
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Join me and
@CptJesus on Tuesday, February 11th as we unveil#BloodHound 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards): https://specterops.zoom.us/webinar/register/WN_Ak7pi_zxSM28HBIl5RIVWw …pic.twitter.com/pP4BxRE0tN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Headed to
@WEareTROOPERS in March? Don't miss@_nullbind's talk on SQL Server Hacking Tips for Active Directory Environments. https://www.troopers.de/troopers20/talks/8peqvg/ …pic.twitter.com/s7c9ggQbUi
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Great thread, I echo the love for tracking pixels. I try to put them everywhere I can which doesn't impact OPSEC. You should never walk away from a phishing campaign without any new knowledge.https://twitter.com/malcomvetter/status/1222539003565694985 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZurehttps://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Scott Sutherland proslijedio/la je Tweet
I was just looking over the training courses offered by
@SpecterOps and saw that their "Adversary Tactics: PowerShell" course has been discontinued. But, I discovered that they have released it on their GitHub!https://github.com/specterops/at-ps …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Hey Defender friends. Turns out that removing those services with Unicode/non-printable characters is pretty hard, so I wrote you a tool to help with that. I'll be releasing the offensive PoC later this week or early next week. https://github.com/matterpreter/OffensiveCSharp/commit/089c1db4909ab365b45fb69e45abb1adcac2861e#diff-e8991566df61818c826e7964e3078579 …pic.twitter.com/SCEV9WtpnF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Added 2 more PoC scripts to the OffensiveDLR repo. One of which embeds the SSharp Compiler within a Posh script (Can be easily embedded from within any .NET language.) SSharp code compilation does not call csc.exe :)https://github.com/byt3bl33d3r/OffensiveDLR …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
#SocialEngineering Tip: Always bring a partner. Whether it be phone-based or onsite, having someone to bounce ideas off of (plus the extra moral support) always leads to better results. Remember - "We ride together, we lie together"#BadBoysForLife
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I made a few additions to the PowerUpSQL wiki cheat sheet regarding authentication options for others who might need it:https://github.com/NetSPI/PowerUpSQL/wiki/PowerUpSQL-Cheat-Sheet …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Detection Engineering Tip: Try not to view detection logic as detecting a malicious technique. View it as a mechanism to identify events that meet your established criteria of how your target technique deviates from the baseline of activity.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Big thanks to
@WEareTROOPERS. I'm excited for the opportunity to present at a conference with so many great community contributors. https://www.troopers.de/troopers20/talks/8peqvg/ …#TR20Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
It may seem like an obvious role to restrict, but I have seen clients being generous with this role in AzureAD. Here's a link to the role's full permissions -https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-assign-admin-roles#sharepoint-service-administrator-permissions …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
A Red Teamer's Guide to GPOs and OUs, by
@_wald0https://wald0.com/?p=179Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
The offensive security community means a lot to me. Following
@Antonlovesdnb's great thread that injected some much needed infosec positivity, I wanted to highlight a few (offensive-ish) posts/talks that my team and myself enjoyed over the last year or so.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
I initially wrote this blog thinking that the issue wasn't eligible (User Misconfiguration) for an MSRC submission, but it turns out they thought otherwise. A big thanks to the folks that were willing to give me credit on the CVE - https://blog.netspi.com/azure-automation-accounts-key-stores/ … https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0962 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Scott Sutherland proslijedio/la je Tweet
Found this gem from
@SteveSyfuhs about kerberos in .net https://github.com/SteveSyfuhs/Kerberos.NET … Bonus: the KerbDump Tool to view the ticket and even decrypt its encrypted part. From what I understand from the code, Windows only - to confirm.pic.twitter.com/GRlPNgse0A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.