DobbyWanKenobi

@dobby1kenobi

Cyber Security Enthusiast | Pentester | Protecting Muggles from unforseen cyber attacks 👨🏻‍💻 My own tweets. Image by: The Baptman

127.0.0.1
Vrijeme pridruživanja: travanj 2018.

Tweetovi

Blokirali ste korisnika/cu @dobby1kenobi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dobby1kenobi

  1. proslijedio/la je Tweet
    29. sij

    I added a mimikatz MemSSP style hook to Fermion, you can check out the code here => This is based on the great write-ups by &

    Poništi
  2. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  3. 26. sij

    I wonder if someone out there is actually building a people database as we speak with all this nonsense. Person A- LinkedIn ✅, Facebook ✅, Instagram ✅, Snapchat ✅ and some pictures of Person A posing under different light conditions. Valuable data 🤔

    Poništi
  4. proslijedio/la je Tweet
    25. sij

    AI video is now online. A really cool "out of band" style of an SQL Injection using "Speech To Text". So you need to Verbally Speak out the injection. Once on the box do a pretty cool privesc via Java Debugging.

    Poništi
  5. proslijedio/la je Tweet

    Ho yes, unlike , it's not a Windows only source code. Works on Linux too, and others UNIX with recent SSL library. " , 9/10, will compile and link again"

    Poništi
  6. proslijedio/la je Tweet
    19. sij

    2020-01-18: ✴[ Alert] Internet Explorer 9-11 in JScript.dll |☣ Limited Targeted Attacks | No patches as of now | Acknowledged Clément Lecigne of Google’s Threat Analysis Group & Ella Yu from Quihoo 360 🕵️‍♂️Possible Future DriveBy➡️ Scenario🤔

    Poništi
  7. proslijedio/la je Tweet
    19. sij

    Active DDoS malware payload detected: http://91.208.184.72/kttp.arm4 () http://91.208.184.72/kttp.arm5 () VirusTotal detections: 2/54 Exploit attempt source IP: 91.208.184.72 (🇲🇩) Target: JAWS web server (MVPower DVR) RCE

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    Okay here it is, Zipper a new file and folder compression utility for CobaltStrike. Blue Teams/Hunters/Defenders: Lookout for non file-compression related processes creating (random named) zipfiles within temp folders.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    Because VBA is not all, with Microsoft PowerShell signed script. Very useful with AllSigned or RemoteSigned execution policy🤪

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. sij

    2020-01-16: [🔥CVE-2019-19781 Update] - in Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP Appliance Update 🤔...More Incoming on (2) Still Watch for Those Before 51.16/5.19 and 50.31 🔦

    Poništi
  11. proslijedio/la je Tweet
    14. sij

    I'm disappointed to see no one called CVE-2020-0601 Let's Decrypt. Anyway, bed.

    Poništi
  12. proslijedio/la je Tweet
    16. sij
    Poništi
  13. proslijedio/la je Tweet
    14. sij

    Active DDoS malware payload detected: http://217.182.38.147/Fourloko/Fourloko.mips () Target: Huawei routers Vulnerability exploited: CVE-2017-17215 () Exploit attempt source IP: 217.182.38.147 (🇫🇷)

    Poništi
  14. proslijedio/la je Tweet
    14. sij
    Poništi
  15. proslijedio/la je Tweet
    13. sij
    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  16. proslijedio/la je Tweet
    12. sij

    Mass scanning activity detected from 193.57.40.46 (🇺🇦) and 5.101.0.209 (🇷🇺) checking for Citrix NetScaler Gateway servers vulnerable to CVE-2019-19781. It’s likely threat actors have enumerated all publicly accessible Citrix endpoints vulnerable to CVE-2019-19781.

    Poništi
  17. proslijedio/la je Tweet
    11. sij

    We've added detection for the Citrix vulnerability (CVE-2019-19781). If you've configured Shodan Monitor () then you will automatically get notified if any of your devices are impacted.

    Poništi
  18. proslijedio/la je Tweet
    10. sij

    Mass scanning activity detected from 82.102.16.220 (🇩🇪) checking for Citrix NetScaler Gateway endpoints vulnerable to CVE-2019-19781. Affected organizations are advised to apply the mitigation steps provided by Citrix as no patch exists yet.

    Poništi
  19. proslijedio/la je Tweet
    10. sij
    Poništi
  20. proslijedio/la je Tweet
    10. sij

    ⚠️ 𝗪𝗔𝗥𝗡𝗜𝗡𝗚 ⚠️ Mass scanning activity detected from 67.205.164.99 (🇺🇸) attempting to exploit Fortinet VPN servers vulnerable to unauthenticated arbitrary file read (CVE-2018-13379) leading to disclosure of usernames and passwords in plaintext.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·