Antonio Cuomo

@antonio_cuomo

CTF Player (arkantolo) - Cracking Enthusiast, System and Network Security Analyst @

Vrijeme pridruživanja: listopad 2011.

Tweetovi

Blokirali ste korisnika/cu @antonio_cuomo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @antonio_cuomo

  1. proslijedio/la je Tweet
    5. velj

    Stay positive Lolbins... not! rundll32 advpack.dll, RegisterOCX calc.exe rundll32 advpack.dll, #12 calc.exe rundll32 advpack.dll, #+12 calc.exe rundll32 advpack.dll, #-4294967284 calc.exe

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    20. sij

    As promised, a short post on Hyper-V admin privesc: /cc

    Poništi
  4. proslijedio/la je Tweet
    4. sij

    Mapping Injection - Just another Windows Process Injection

    Poništi
  5. 20. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    18. pro 2019.
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    18. pro 2019.

    Meterpreter + PPID Spoofing — Blending into the Target Environment The PPID Spoofing is a quite fascinating technique since it lets spawn new processes under a different parent process ID. Let’s see how to implement it into the Meterpreter agent.

    Poništi
  8. proslijedio/la je Tweet
    12. pro 2019.

    I have just published this funny post: From iPhone to NT AUTHORITY\SYSTEM :-) cc

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    6. pro 2019.

    knocked to our door and wanted to get listen and ... we kindly answered! From Service Account to SYSTEM again cc 0xea31()

    Poništi
  10. proslijedio/la je Tweet
    14. stu 2019.

    I wrote a JavaScript x86 ASCII AND-SUB encoder and since it’s just JavaScript we can run it in the browser! 🚀 Try it out!

    Poništi
  11. proslijedio/la je Tweet
    13. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    23. lis 2019.

    We had some fun time with my friend playing with this "bug" :-)

    Poništi
  13. proslijedio/la je Tweet
    5. lip 2019.
    Poništi
  14. 29. ruj 2019.

    fantastic day, happy to have participated and met some of the staff.

    Poništi
  15. proslijedio/la je Tweet
    23. ruj 2019.
    Poništi
  16. proslijedio/la je Tweet
    11. ruj 2019.

    I've just published my PoC that I sent originally to MSRC. Elevation of Privilege in AppXSvc service (CVE-2019-1253) Thanks for the DOS version :-)

    Poništi
  17. proslijedio/la je Tweet
    26. kol 2019.

    Exfiltrate Like a Pro: Using DNS over HTTPS as a C2 Channel DNS over HTTPS is cool. It increases privacy and security by moving DNS from UDP to HTTP/2 😇.. but are you aware that it can be used as a C2 communication channel? 😼 check out the article @

    Poništi
  18. proslijedio/la je Tweet
    21. kol 2019.

    So MS told me that they won't fix in this release the "vulnerability" in the checks of the "SeTokenCanImpersonate" routines, as suggested by me (), maybe in the next releases? Meantime, enjoy ;-)

    Poništi
  19. proslijedio/la je Tweet
    16. sij 2019.

    I’m gonna tell you a secret about “logless VPNs” — they don’t exist. Noone is going to risk jail for your $5/mo

    Poništi
  20. proslijedio/la je Tweet
    1. kol 2019.

    MalConfScan with Cuckoo is now available! Meet the developers and at ! They will be at Business Hall (Oceanside), Arsenal Station 8 on Thu, Aug 8, 11:30am-12:50pm! Mark your calendar! ^TN

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·