Pralhad Chaskar

@c0d3xpl0it

Infosec Consultant. Tweets are my own not my Employer.

Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @c0d3xpl0it

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @c0d3xpl0it

  1. Prikvačeni tweet
    7. pro 2019.

    My experience with "Domain-Specific Fuzzing with Waypoints using FuzzFactory"

    Poništi
  2. proslijedio/la je Tweet

    Analyzing WhatsApp Calls with Wireshark, radare2 and Frida by Marvin Schirrmacher 📱🔥

    Poništi
  3. proslijedio/la je Tweet
    prije 19 sati
    Poništi
  4. proslijedio/la je Tweet
    prije 20 sati

    If you use the cs2modrewrite project to build your C2 redirector rules, it is now updated to support CS <=4.0 profiles (multi-variants).

    Poništi
  5. proslijedio/la je Tweet
    prije 22 sata

    I had some fun exploiting LDAP this week. I'm far from an LDAP expert, so please, bear with me as I try to make some sense of how I went to went from what seemed to be near complete lockdown to owning the domain.

    Poništi
  6. proslijedio/la je Tweet
    5. velj
    Poništi
  7. proslijedio/la je Tweet
    5. velj

    Here's a quick video of the multi-factor authentication bypass that and I found to on the platform. Submitted to and labeled a "won't-fix". Enjoy.

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  9. proslijedio/la je Tweet
    4. velj

    So much fun presenting this! Happy to share my slides for "Don't Cross Me! Same Origin Policy and all the 'cross' vulns". SOP is an important topic I feel is not adequately explained and understood by many developers and security pros.

    Poništi
  10. proslijedio/la je Tweet
    4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  11. proslijedio/la je Tweet
    4. velj

    As promised, here is the follow up defensive blog to last weeks post on Attacking Azure.

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    Do you know ? It brings interesting add-ons to AFL. used it during his fuzzing research to create custom instrumentation whitelists, increasing AFL code coverage

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    If anyones interested I got some how-to vids here

    Poništi
  15. proslijedio/la je Tweet
    3. velj
    Poništi
  16. proslijedio/la je Tweet
    3. velj

    FakeLogonScreen - A utility to fake the Windows logon screen in order to obtain the user's password. The password entered is validated against the Active Directory or local machine to make sure it is correct and is then saved to disk.

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  18. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  19. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    31. sij

    Wrote a post on how to use GadgetToJScript with Covenant & Donut Thanks to for the answering my queries and helping me while exploring tool 🙏

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·