Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @dobby1kenobi
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dobby1kenobi
-
DobbyWanKenobi proslijedio/la je Tweet
I added a mimikatz MemSSP style hook to Fermion, you can check out the code here => https://github.com/FuzzySecurity/Fermion/blob/master/Examples/MemSSP.js … This is based on the great write-ups by
@spotheplanet &@_xpn_pic.twitter.com/8Ny4lsc2Bj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:https://github.com/ddz/whatsapp-media-decrypt …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I wonder if someone out there is actually building a people database as we speak with all this
#DollyPartonChalllenge nonsense. Person A- LinkedIn
, Facebook
, Instagram
, Snapchat
and some pictures of Person A posing under different light conditions. Valuable data
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
#HackTheBox AI video is now online. A really cool "out of band" style of an SQL Injection using "Speech To Text". So you need to Verbally Speak out the injection. Once on the box do a pretty cool privesc via Java Debugging.https://www.youtube.com/watch?v=7n7YRntu3bc …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
Ho yes, unlike
#mimikatz, it's not a Windows only source code. Works on Linux too, and others UNIX with recent SSL library. "#curveball#cve20200601, 9/10, will compile and link again" https://twitter.com/gentilkiwi/status/1219305687643230210 …pic.twitter.com/IJGV9MAOBs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
2020-01-18:
[#Exploit Alert] Internet Explorer 9-11#RCE in JScript.dll |
Limited Targeted Attacks
#CVE20200674 | No patches as of now | Acknowledged Clément Lecigne of Google’s Threat Analysis Group & Ella Yu from Quihoo 360
Possible Future DriveBy
#ExploitKit Scenario
pic.twitter.com/C0GGmIKOTK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
Active DDoS malware payload detected: http://91.208.184.72/kttp.arm4 (https://www.virustotal.com/gui/file/0f111533c197500a01722195abd00cb892ec0efa3522c3371a7a97afa02c2f22/detection …) http://91.208.184.72/kttp.arm5 (https://www.virustotal.com/gui/file/1da3b23c774881668c82a4f89a0da0565039bcc8d3bbe4974e87f25964ce3516/detection …) VirusTotal detections: 2/54 Exploit attempt source IP: 91.208.184.72 (
)
Target: JAWS web server (MVPower DVR) RCE
#threatintelpic.twitter.com/IoRteWW5ab
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
Okay here it is, Zipper a new
@OutflankNL file and folder compression utility for CobaltStrike. Blue Teams/Hunters/Defenders: Lookout for non file-compression related processes creating (random named) zipfiles within temp folders.https://github.com/outflanknl/Zipper …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
Because VBA is not all,
#curveball#cve20200601 with Microsoft PowerShell signed script. Very useful with AllSigned or RemoteSigned execution policy
pic.twitter.com/tUS9vnyx97Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
2020-01-16: [
CVE-2019-19781 Update] - #Vulnerability in#Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Appliance Update
...More Incoming on (2)
Still Watch for Those Before 51.16/5.19 and 50.31
https://twitter.com/wdormann/status/1217890750433722369 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
I'm disappointed to see no one called CVE-2020-0601 Let's Decrypt. Anyway, bed.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
#agenttesla from spam email#italy 16_01_2020@bancaditalia Sample https://app.any.run/tasks/ab56b95f-3ebd-432e-a181-f69139acb185 … -> mail.abzmaroc[.ma@guelfoweb@VirITeXplorer@Certego_IRT@malwrhunterteam@James_inthe_box@JayTHL@reecdeep@a_de_pasqualepic.twitter.com/mviFtLXvPR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
Active DDoS malware payload detected: http://217.182.38.147/Fourloko/Fourloko.mips (https://www.virustotal.com/gui/file/1b1d77230c46c5327fc63164ebe1a486760a81dc152b806a376a21c3c2e7116b/detection …) Target: Huawei routers Vulnerability exploited: CVE-2017-17215 (https://nvd.nist.gov/vuln/detail/CVE-2017-17215 …) Exploit attempt source IP: 217.182.38.147 (
)
#threatintelpic.twitter.com/kGHrNKFuHC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
#Hawkeye#Keylogger#italy from#dhl spam email Sample https://app.any.run/tasks/13ab78fb-76d6-41c3-a04f-7f67e910e853 … ftp.econstruct[.ro 5.154.177.55@CertPa@VirITeXplorer@Certego_IRT@malwrhunterteam@James_inthe_box@JayTHL@reecdeeppic.twitter.com/kk7RKQHO9S
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
New Variant
#GlobeImposter 2.0#Ransomware !Ext: .locker !ContactEmail: remoteav@protonmail.ch or removeme2020@tutanota.com ! Vt:https://www.virustotal.com/gui/file/973fce7612e3f78e0a97a2922b0033b56932c29ac4c949f0e18bf2d2f34fd0e0/detection …@BleepinComputer@JAMESWT_MHT@Malwaredev@siri_urz@malwrhunterteampic.twitter.com/6NqkQ7TDOFOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
Mass scanning activity detected from 193.57.40.46 (
) and 5.101.0.209 (
) checking for Citrix NetScaler Gateway servers vulnerable to CVE-2019-19781.
It’s likely threat actors have enumerated all publicly accessible Citrix endpoints vulnerable to CVE-2019-19781.
#threatintelpic.twitter.com/Y4YGYsMp5Q
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
We've added detection for the Citrix vulnerability (CVE-2019-19781). If you've configured Shodan Monitor (https://monitor.shodan.io ) then you will automatically get notified if any of your devices are impacted.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
Mass scanning activity detected from 82.102.16.220 (
) checking for Citrix NetScaler Gateway endpoints vulnerable to CVE-2019-19781.
Affected organizations are advised to apply the mitigation steps provided by Citrix as no patch exists yet. https://support.citrix.com/article/CTX267027 …
#threatintelpic.twitter.com/mTfky68JEh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
#Lampion#malware https://seguranca-informatica.pt/targeting-portugal-a-new-trojan-lampion-has-spread-using-template-emails-from-the-portuguese-government-finance-tax/#.Xhh0TiN7laQ … Samples https://app.any.run/tasks/7f5d7052-a3f9-4259-ad40-c7bd9fd16077 … https://app.any.run/tasks/ef8f0045-fe0f-487c-9dde-7eca44c6748d … IoCs https://guridosinferno.s3.us-east-2.amazonaws.[com/0.zip https://adnoiiasdnfoinsafopinsodifg16g.s3.us-east-2.amazonaws.[com/P-16-5.dll@cocaman@CryptoInsane@sirpedrotavaresHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DobbyWanKenobi proslijedio/la je Tweet
𝗪𝗔𝗥𝗡𝗜𝗡𝗚
Mass scanning activity detected from 67.205.164.99 (
) attempting to exploit Fortinet VPN servers vulnerable to unauthenticated arbitrary file read (CVE-2018-13379) leading to disclosure of usernames and passwords in plaintext. #threatintelpic.twitter.com/r26wFjn0Yd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
My own tweets.
Image by: The Baptman