Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @cw_use
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cw_use
-
Mohammed Farhan proslijedio/la je Tweet
2020-02-03:


#Shellcode Loader
#hVNC 'HiddenDesktop'#Malware
"FudV"|
Recompiled from #TinyNuke Leak|
AVE_MARIA
C2:
94.103.81. 79
PDB:
C:\Users\Administrator\Documents\c++ project\hVNC\Client\Release\FudV.pdb
h/t @malwrhunterteam MD5: 6d8d825d00a4a1d8e3f406bad69fa4a7pic.twitter.com/bsvz8nCkeE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
I added a script to generate the PDF & archive for my
#OSCP Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.https://github.com/noraj/OSCP-Exam-Report-Template-Markdown …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
2020-02-03:

#Maze#Ransomware
"Logging enabled | Maze"
Note:
Hacked network
Downloaded a lot of data from network
Google "Allied Universal Maze Ransomware"
If paid, the data will be removed & decryptor will be given
h/t @malwrhunterteam
: https://twitter.com/malwrhunterteam/status/1224329938972618753 …pic.twitter.com/Wij16gCUJ7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
More for Lateral Movement -> Evidence remove. mstsc net runas netsh wmiprvse (children) wsmprovhost (children) psexesvc (children) winrm winrs win shadow esentutl vssadmin del wevtutil taskkill klist ftp Hopefully that list helps as a start. For more: https://lolbas-project.github.io/#
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
Some extra process execution/command lines to monitor for hands on adversary situational awareness/recon. tasklist ver ipconfig systeminfo netstat whoami nbtstat set qprocess nslookup net type dir echo dsquery quser
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
RT
@binitamshah: Tsurugi Linux : A heavily customized Linux distro designed for DFIR investigations, malware analysis and Open Sourced intelligence activities : https://tsurugi-linux.org/index.php cc@Sug4r7 ||@blackmoon105 || tsurugi_linuxpic.twitter.com/EyiOnUuriT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
النسخة الجديدة من hoarder تقرا الملفات كلها من physical drive باستخدام sleuthkit kit tools يعني ما راح يكون لها علاقة بالOS, فمثلا لو فيه USB flash مشبوك ونوعه NTFS راح يقراه لك ويستخرج الملفات جواته, حرفيا hoarder :) بالنسبة لKAPE مدري كيف يستخرج الملفات الlockedpic.twitter.com/Uz1Eyzjltf
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
#DFIR, hoarder v.3.1.0 new release: -python3 -all selected files collected from all physical drive directly -really fast(~40sec. to collect and compress ~1GB) -simple yaml config big thanks to@muteb_alqahtani@A__ALFAIFI for the help, also@sleuthkithttps://github.com/muteb/HoarderPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
4. إضافة حقل returns في ال rules تمكن المحلل من تحديد الحقول المراد عرضها بدل من حرض ال event كاملا. لمعلومات أكثر شيك على ال changelog في GitHub https://github.com/AbdulRhmanAlfaifi/Rhaegal … Happy Hunting !
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
السلام عليكم مساء الخير
تحديث جديد ل Rhaegal !
هذا ملخص للتحديث رقم 1.2.1:
1. تغيير ال parser كليا ب parser افضل و أسرع بكثير.
2. إضافة varibales لل rule - لمعلومات أكثر راجع ال wiki في ال github
3. إضافة modifiers لل rules - لمعلومات أكثر راجع ال wiki في ال github
يتبع ...Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
due to a small issue, the scores of
#malware were not visible anymore during a few days! The feature is now working again as expected in#pestudio. Thx to@virustotalpic.twitter.com/sG6DoSZ3ir
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
Frida 12.8 is out
Not only can NativeFunction calls be followed with ability to mutate their instruction streams on a per thread basis, but also ObjC and Java calls. We now also support direct memory access through brand new ArrayBuffer APIs.
https://frida.re/news/2019/12/18/frida-12-8-released/ …pic.twitter.com/s76zuTVQjK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
Finally got the TLS interception working in Chrome and Edge. This is a really cool way to do MiTM attacks:https://twitter.com/layle_ctf/status/1217531908814450688 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!https://blog.layle.io/uncovering-cve-2020-0601/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
It's time to drop my DoS PoC for CVE-2020-0609 & CVE-2020-0610! Gonna make the scanner soon and then hopefully create a full RCE if possible :) Thanks to
@ollypwn for the assistance!https://github.com/ioncodes/BlueGate …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
How to crash a Remote Desktop Gateway in 21 lines of clean Python code.pic.twitter.com/rd6SGgwcTy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
Working on a RCE exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610) and I got a somewhat reliable read primitive and partial write. I hope to be able to get it done by today!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
15 Ways to Bypass the PowerShell Execution Policy - from 9/2014
#infosec#pentest#redteamhttps://blog.netspi.com/15-ways-to-bypass-the-powershell-execution-policy/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mohammed Farhan proslijedio/la je Tweet
Low Privilege Active Directory Enumeration from a non-Domain Joined Host
#infosec#pentest#redteamhttps://www.attackdebris.com/?p=470Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.