Chirag Savla

@chiragsavla94

With Knowledge We Know the Word.. But... With experience We Know their Meaning !

Vrijeme pridruživanja: prosinac 2015.

Tweetovi

Blokirali ste korisnika/cu @chiragsavla94

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chiragsavla94

  1. Prikvačeni tweet
    9. ožu 2019.

    Finally completed the long pending blog post about the review of course. Thanks for creating such a great lab & for hosting.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 14 sati

    As promised, here is the follow up defensive blog to last weeks post on Attacking Azure.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Slides from talk on Adversary Detection Pipelines Ty everyone for coming to my talk! ❤️

    Poništi
  4. proslijedio/la je Tweet

    Defender Labs are the most challenging to build - SNEAK PREVIEW of a Multi-View SSH Dictionary Attack and SIEM detection lab the team built today! So Proud! Launching this month:

    Poništi
  5. proslijedio/la je Tweet

    I've just written a blog on my experiances with Active Directory hardening but also on how using can take some of the sting out of the tail of discovery and remedial projects! Honestly this tool is awesome!

    Poništi
  6. proslijedio/la je Tweet
    prije 18 sati
    Poništi
  7. proslijedio/la je Tweet
    prije 18 sati

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  8. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  9. proslijedio/la je Tweet
    prije 23 sata
    Odgovor korisnicima

    Just released something similar last week, great minds think alike right? 😂

    Poništi
  10. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  11. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  12. proslijedio/la je Tweet
    3. velj
    Poništi
  13. proslijedio/la je Tweet
    1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    3. velj

    Null Mumbai Meet 08 February 2020 For further details and Registration/RSVP please visit the following URL:

    Poništi
  15. proslijedio/la je Tweet
    2. velj

    [COM hijacking] While I was looking for some methods related to the COM hijacking technique, I found a new method that allows you to hijack COM and execute Scriptlet instructions :) Registry import file:

    Poništi
  16. proslijedio/la je Tweet
    30. sij
    Poništi
  17. proslijedio/la je Tweet
    2. velj

    Good overview. Which maturity level do you fulfill? [Article] To level up your SOC game, take one logical step at a time

    Poništi
  18. proslijedio/la je Tweet
    2. velj

    A curated list of resources for learning about deploying, managing and hunting with Microsoft Sysmon. Contains presentations, deployment methods, configuration file examples, blogs and additional github repositories.

    Poništi
  19. proslijedio/la je Tweet
    1. velj
    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  21. proslijedio/la je Tweet
    31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·