David Valles

@davidvalles007

P455i0n4t3 ab0ut Inf053c!

Vrijeme pridruživanja: veljača 2013.

Tweetovi

Blokirali ste korisnika/cu @davidvalles007

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @davidvalles007

  1. proslijedio/la je Tweet
    prije 19 sati

    Great writeup for Alfred () Walkthrough exploiting Jenkins to gain an initial shell, then escalate your privileges by exploiting Windows authentication tokens.

    Poništi
  2. proslijedio/la je Tweet
    prije 19 sati

    Simple toy example for "Finding entry points in object graphs" thanks to

    Poništi
  3. proslijedio/la je Tweet
    prije 23 sata

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    Here's my write-up for the retired from HTB. Created by . Dropping web shells from EvilWinRar, yo!

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  7. proslijedio/la je Tweet
    1. velj

    Apple’s continuity protocol reverse enginered:

    Poništi
  8. proslijedio/la je Tweet
    1. velj
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    'Senese' HTB Writeup now published on my blog: It's a pretty straightforward, easy one. Index of all writeups here: Feedback always welcome.

    Poništi
  10. proslijedio/la je Tweet
    2. velj
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    OS hacking: Let's set a trap for root using a LibC bug Some chill hacking today, relaxing after a stressful week 🐞👨🏻‍💻

    Poništi
  12. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    1. velj

    Another box solved the unintended way: RE. Once I had RCE after dropping an aspx webshell with the Winrar CVE, I used the UsoSvc service to gain SYSTEM and impersonated the Coby user to decrypt the root flag. Great box by .

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    Java jdbc (deserialization) vulnerability automated exploitation

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    New video! The first episode of Bug in Focus is here and we talk about RCEs. What they are, how people find them & highlight some interesting RCEs. Also, I do a demo of command and code execution. I'm REALLY happy with this video

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    1. velj

    Nexon Game Security Heaven's Gate bypass

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  18. proslijedio/la je Tweet
    1. velj

    The Lakers' tribute to Kobe Bryant 💜💛

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    This is a great short talk by software engineer Michael Dales on how to get into a new domain, including not pushing yourself too far too quickly!

    Poništi
  20. proslijedio/la je Tweet
    31. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·