AlterLabs

@alter_labs

Information Security Services | Training

Somewhere in Asia
Vrijeme pridruživanja: prosinac 2014.

Tweetovi

Blokirali ste korisnika/cu @alter_labs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alter_labs

  1. proslijedio/la je Tweet
    27. sij

    me: has used Bash for over a dozen years also me: Googles how "if" works

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    This is a pretty good deal! Lots of fresh good books there.

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Here's a working POC for manually performing DNS Rebinding attack. 🙂 Some people asking me for this in DM.

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    Windows Kiosk breakout tip: If you get a Printing panel, and the traditional methods don't work: Amongst the printers, select "SendTo OneNote" OneNote will launch -> Add new notebook On the Notebook -> New page Type: \\127.0.0.1\c$\windows\system32\cmd.exe Click the link

    Poništi
  6. proslijedio/la je Tweet
    23. sij

    Which services do you find most often exploited by attackers in internal networks? (non-OS / application level) My list: 1. Tomcat with default creds 2. JBoss (JMX) 3. HP Data Protector / OmniBack

    Poništi
  7. proslijedio/la je Tweet
    23. sij

    Not sure what information the Shodan API returns for an IP? Check out the raw data tab on the beta website to view all the available data

    Poništi
  8. proslijedio/la je Tweet
    23. sij

    I made a table to compare tools available that support persistence via WMI Event Subscription and their triggers. If you need more information just visit the article.

    Poništi
  9. proslijedio/la je Tweet
    23. sij

    Quick Sysmon config snippet for SharpRDP - thank you for the actionable defensive guidance: ➡️ /cc: Please test before pumping into prod 🤠

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    20. sij

    Time for a new tip! When I sign up to a website/newsletter/reset password, I look at the website which hosts the logo/image in the email I receive. This led me multiple time to insecure AWS S3 buckets and scope expansion.

    Poništi
  12. proslijedio/la je Tweet
    19. sij
    Poništi
  13. proslijedio/la je Tweet
    19. sij
    Poništi
  14. proslijedio/la je Tweet
    18. sij

    Oh my god. 13 years after I sign up for AWS it finally happened to me: my first terrifying bill. $1300. 😱 I’d been playing with Control Tower and set up a handful of accounts. Forgot about it for a month. Turns out it deploys a LOT of NAT gateways.

    Poništi
  15. proslijedio/la je Tweet
    17. sij

    Want to make service removal really fun? Create a service with a unicode name. The service will run but won't show in sc.exe, services.msc, or taskmgr.exe and will sometimes cause a critical error while trying to find it with PowerShell/WMI. Unicode wins again.🤦‍♂️

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    17. sij

    If you have AppLocker deployed, be aware that most times when Windows 10 is updated/upgraded, it creates a TASKS_MIGRATED folder under C:\windows\system32 that has the CREATOR OWNER, meaning that users can create and execute files from the folder and bypassing AppLocker 😱

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    16. sij

    To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    17. sij

    Bringing to international stage on Cybersecurity Capacity Building

    Poništi
  19. proslijedio/la je Tweet
    15. sij

    Microsoft added Event ID 1 to the Application Log to show attempted exploitation of CVE-2020-0601 (via new CveEventWrite function). Use Splunk? Collect that EID and alert on: sourcetype=WinEventLog EventCode=1 LogName=Application Message="*[CVE-2020-0601]*" (tweak as needed)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    15. sij

    For all of you out there in restricted corporate environments who need to test the processing of event log entries for CVE-2020-0601, I wrote some VBA code to generate this event.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·