Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ch3tanK
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ch3tanK
-
31-days-of-API-Security-Tips/README.md at master · smodnix/31-days-of-API-Security-Tips · GitHub by
#smodnixhttps://github.com/smodnix/31-days-of-API-Security-Tips/blob/master/README.md …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
Aggregation of Cobalt Strike's aggressor scripts - thanks for sharing
@RhinoSecurity#infosec#pentest#redteam https://github.com/RhinoSecurityLabs/Aggressor-Scripts …pic.twitter.com/zWueoy8LRZHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ragnarok Ransomware Targets Citrix ADC, Disables Windows Defenderhttps://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
Joint press conference by Indonesian National Police &
#INTERPOL on Operation Night Fury led by INTERPOL’s#ASEAN Desk, sharing the successful arrest of 3 suspects involved in JS-sniffer campaign compromising e-commerce websites to steal credit card or online payment informationpic.twitter.com/2C12fvZ92X
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
If anyone is interested by an example of the Windows Next Generation Cryptography API (bcrypt.lib) - especially after CVE-2020-0601 - I wrote a simple C++ program that encrypt and decrypt a string. Link: https://github.com/am0nsec/AESCrypt …pic.twitter.com/ZFAzVIyRsE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
Because I prefer C,
#curveball#cve20200601 little POC to create your own EC alternative keys > https://github.com/gentilkiwi/curveball/releases/ … With a lots of keys included in the release.pic.twitter.com/kkboaxUARk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor | FireEye Inchttps://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
That epic Microsoft moment

#cve20200601#curveball Recently worked on#mimikatz and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)pic.twitter.com/EayEuFVv1JPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC https://github.com/ollypwn/cve-2020-0601 …pic.twitter.com/QKIaWrRQFL
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern. https://docs.microsoft.com/en-us/windows/win32/api/securitybaseapi/nf-securitybaseapi-cveeventwrite …pic.twitter.com/JWPnaMaIqB
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
#Citrix#Netscaler#Shitrix
Snort
https://doc.emergingthreats.net/bin/view/Main/2029206 …
Sigma
https://github.com/Neo23x0/sigma/blob/master/rules/web/web_citrix_cve_2019_19781_exploit.yml …
YARA
https://github.com/Neo23x0/signature-base/blob/master/yara/exploit_shitrix.yar …
IOCs
https://otx.alienvault.com/pulse/5e1c293e07c770f36d232489 …
Nmap NSE
https://github.com/cyberstruggle/DeltaGroup/blob/master/CVE-2019-19781/CVE-2019-19781.nse …
MSF
https://github.com/rapid7/metasploit-framework/blob/a64b0fa9e75befc3ffdb6129e88a6f6dd4c31208/modules/exploits/unix/webapp/citrix_dir_trasversal_rce.rb …
HoneyPot
https://github.com/MalwareTech/CitrixHoneypot …
SSH checkhttps://twitter.com/cyb3rops/status/1216310642552049666 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
CISA Releases Test Tool for Citrix ADC CVE-2019-19781 Vulnerability - by
@sergheihttps://www.bleepingcomputer.com/news/security/cisa-releases-test-tool-for-citrix-adc-cve-2019-19781-vulnerability/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Microsoft spots malicious npm package stealing data from UNIX systems | ZDNethttps://www.zdnet.com/article/microsoft-spots-malicious-npm-package-stealing-data-from-unix-systems/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
UAC Bypass – Fodhelper - from 2017/6
#infosec#pentest#redteamhttps://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
Automatically Stealing Password Hashes with Microsoft Outlook and OLE https://insights.sei.cmu.edu/cert/2018/04/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New Iranian data wiper malware hits Bapco, Bahrain's national oil company | ZDNethttps://www.zdnet.com/article/new-iranian-data-wiper-malware-hits-bapco-bahrains-national-oil-company/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag. https://github.com/trustedsec/cve-2019-19781 …
#TrustedSecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
Proof-of-concept code published for Citrix bug as attacks intensify * Not one, but two PoCs have been published for CVE-2019-19781 (also known as Shitrix now) * PoC 1: https://github.com/projectzeroindia/CVE-2019-19781 … * PoC 2: https://github.com/trustedsec/cve-2019-19781 … https://www.zdnet.com/article/proof-of-concept-code-published-for-citrix-bug-as-attacks-intensify/ …pic.twitter.com/zzJcaeE8wE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
CRK proslijedio/la je Tweet
Deep Dive to Citrix ADC Remote Code Execution, CVE-2019-19781, new blog post By
@0x09AL https://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/ …https://youtu.be/5U5Hk2CzIAkHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.