Mohammed Farhan

@cw_use

DFIR & IEEE,SCE Member -BlockchainSecurity

United States
Vrijeme pridruživanja: lipanj 2012.

Tweetovi

Blokirali ste korisnika/cu @cw_use

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cw_use

  1. proslijedio/la je Tweet
    prije 22 sata

    2020-02-03:🆕🔥 Loader➡️ 'HiddenDesktop' 1⃣"FudV"|2⃣Recompiled from Leak| 3⃣AVE_MARIA 🛡️C2: 94.103.81. 79 👾PDB: C:\Users\Administrator\Documents\c++ project\hVNC\Client\Release\FudV.pdb h/t MD5: 6d8d825d00a4a1d8e3f406bad69fa4a7

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  3. proslijedio/la je Tweet
    prije 22 sata

    2020-02-03:🉑 🔒 "Logging enabled | Maze" Note: 1⃣Hacked network 2⃣Downloaded a lot of data from network 3⃣Google "Allied Universal Maze Ransomware" 4⃣If paid, the data will be removed & decryptor will be given h/t 🔽🇰🇵:

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    More for Lateral Movement -> Evidence remove. mstsc net runas netsh wmiprvse (children) wsmprovhost (children) psexesvc (children) winrm winrs win shadow esentutl vssadmin del wevtutil taskkill klist ftp Hopefully that list helps as a start. For more:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    Some extra process execution/command lines to monitor for hands on adversary situational awareness/recon. tasklist ver ipconfig systeminfo netstat whoami nbtstat set qprocess nslookup net type dir echo dsquery quser

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    RT : Tsurugi Linux : A heavily customized Linux distro designed for DFIR investigations, malware analysis and Open Sourced intelligence activities : cc || || tsurugi_linux

    Poništi
  8. proslijedio/la je Tweet
    2. pro 2019.

    النسخة الجديدة من hoarder تقرا الملفات كلها من physical drive باستخدام sleuthkit kit tools يعني ما راح يكون لها علاقة بالOS, فمثلا لو فيه USB flash مشبوك ونوعه NTFS راح يقراه لك ويستخرج الملفات جواته, حرفيا hoarder :) بالنسبة لKAPE مدري كيف يستخرج الملفات الlocked

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    2. pro 2019.

    , hoarder v.3.1.0 new release: -python3 -all selected files collected from all physical drive directly -really fast(~40sec. to collect and compress ~1GB) -simple yaml config big thanks to for the help, also

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    27. sij

    4. إضافة حقل returns في ال rules تمكن المحلل من تحديد الحقول المراد عرضها بدل من حرض ال event كاملا. لمعلومات أكثر شيك على ال changelog في GitHub Happy Hunting !

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    السلام عليكم مساء الخير ✋ تحديث جديد ل Rhaegal ! هذا ملخص للتحديث رقم 1.2.1: 1. تغيير ال parser كليا ب parser افضل و أسرع بكثير. 2. إضافة varibales لل rule - لمعلومات أكثر راجع ال wiki في ال github 3. إضافة modifiers لل rules - لمعلومات أكثر راجع ال wiki في ال github يتبع ...

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    27. sij

    due to a small issue, the scores of were not visible anymore during a few days! The feature is now working again as expected in . Thx to

    Poništi
  13. proslijedio/la je Tweet
    18. pro 2019.

    Frida 12.8 is out 🎉 Not only can NativeFunction calls be followed with ability to mutate their instruction streams on a per thread basis, but also ObjC and Java calls. We now also support direct memory access through brand new ArrayBuffer APIs.

    Poništi
  14. proslijedio/la je Tweet
    15. sij

    Finally got the TLS interception working in Chrome and Edge. This is a really cool way to do MiTM attacks:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    17. sij

    My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    24. sij

    It's time to drop my DoS PoC for CVE-2020-0609 & CVE-2020-0610! Gonna make the scanner soon and then hopefully create a full RCE if possible :) Thanks to for the assistance!

    Poništi
  17. proslijedio/la je Tweet
    25. sij

    How to crash a Remote Desktop Gateway in 21 lines of clean Python code.

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Working on a RCE exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610) and I got a somewhat reliable read primitive and partial write. I hope to be able to get it done by today!

    Poništi
  19. proslijedio/la je Tweet
    26. sij
    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Low Privilege Active Directory Enumeration from a non-Domain Joined Host

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·