Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @alter_labs
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alter_labs
-
AlterLabs proslijedio/la je Tweet
me: has used Bash for over a dozen years also me: Googles how "if" works
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
This is a pretty good deal! Lots of fresh good books there.https://twitter.com/nostarch/status/1222059246944210950 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Here's a working POC for manually performing DNS Rebinding attack.
Some people asking me for this in DM.pic.twitter.com/CHtsNEe3ixHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Windows Kiosk breakout tip: If you get a Printing panel, and the traditional methods don't work: Amongst the printers, select "SendTo OneNote" OneNote will launch -> Add new notebook On the Notebook -> New page Type: \\127.0.0.1\c$\windows\system32\cmd.exe Click the link
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Which services do you find most often exploited by attackers in internal networks? (non-OS / application level) My list: 1. Tomcat with default creds 2. JBoss (JMX) 3. HP Data Protector / OmniBack
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Not sure what information the Shodan API returns for an IP? Check out the raw data tab on the beta website to view all the available datapic.twitter.com/KfOTt9xnfx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
I made a table to compare tools available that support persistence via WMI Event Subscription and their triggers. If you need more information just visit the article. https://twitter.com/netbiosX/status/1219592947215339521 …pic.twitter.com/2KN9i6pt0U
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Quick Sysmon config snippet for SharpRDP - thank you
@0xthirteen for the actionable defensive guidance:
https://pastebin.com/k7T1GFuP
/cc: @SwiftOnSecurity@ionstorm@olafhartong Please test before pumping into prod
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: https://github.com/specterops/at-ps … Enjoy! For information about our current training offerings, information can be found here: https://specterops.io/how-we-help/training-offerings … (4/4)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Time for a new
#bugbounty tip! When I sign up to a website/newsletter/reset password, I look at the website which hosts the logo/image in the email I receive. This led me multiple time to insecure AWS S3 buckets and scope expansion.#bugbountytip#bugbountytips#infosec#hackingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Ethical Hacking Lessons — Building Free Active Directory Lab in Azure
#infosec#pentesthttps://medium.com/@kamran.bilgrami/ethical-hacking-lessons-building-free-active-directory-lab-in-azure-6c67a7eddd7f …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Now that's helpful :)https://twitter.com/shodanhq/status/1215709765244006400 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Oh my god. 13 years after I sign up for AWS it finally happened to me: my first terrifying bill. $1300.
I’d been playing with Control Tower and set up a handful of accounts. Forgot about it for a month. Turns out it deploys a LOT of NAT gateways.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Want to make service removal really fun? Create a service with a unicode name. The service will run but won't show in sc.exe, services.msc, or taskmgr.exe and will sometimes cause a critical error while trying to find it with PowerShell/WMI. Unicode wins again.
pic.twitter.com/qiAoSya623
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
If you have AppLocker deployed, be aware that most times when Windows 10 is updated/upgraded, it creates a TASKS_MIGRATED folder under C:\windows\system32 that has the CREATOR OWNER, meaning that users can create and execute files from the folder and bypassing AppLocker
pic.twitter.com/YLUxRxDyxr
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Bringing
#Cambodia to international stage on Cybersecurity Capacity Buildingpic.twitter.com/br587eGc3g
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
Microsoft added Event ID 1 to the Application Log to show attempted exploitation of CVE-2020-0601 (via new CveEventWrite function). Use Splunk? Collect that EID and alert on: sourcetype=WinEventLog EventCode=1 LogName=Application Message="*[CVE-2020-0601]*" (tweak as needed)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
AlterLabs proslijedio/la je Tweet
For all of you out there in restricted corporate environments who need to test the processing of event log entries for CVE-2020-0601, I wrote some VBA code to generate this event. https://blog.didierstevens.com/2020/01/15/using-cveeventwrite-from-vba-cve-2020-0601/ …pic.twitter.com/ZD1p6czGQe
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.