Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @domchell
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @domchell
-
Dominic Chell proslijedio/la je Tweet
#PingCastle 2.8.0.0 released !!! https://pingcastle.com/download/ 4 clicks and 2 <enter>, that what's between you and the hard truth of your AD security. Example of report: https://pingcastle.com/PingCastleFiles/ad_hc_test.mysmartlogon.com.html … github: https://github.com/vletoux/pingcastle … Changelog: https://raw.githubusercontent.com/vletoux/pingcastle/2.8.0.0/changelog.txt …pic.twitter.com/1oQXuIJcdiHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.https://www.matteomalvica.com/blog/2020/01/20/mimikatz-lsass-dump-windg-pykd/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, https://github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
Myself and
@domchell are off to@BlackHatEvents USA 2020 to deliver our Adversary Simulation and Red Team Tactics course. Stay tuned for some upcoming posts on how the supporting labs were created https://www.blackhat.com/us-20/training/schedule/index.html#adversary-simulation-and-red-team-tactics-18511 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
Wrote a post on how to use GadgetToJScript with Covenant & Donut https://3xpl01tc0d3r.blogspot.com/2020/02/gadgettojscript-covenant-donut.html …
#Covenant#Donut#GadgetToJScript#redteam#processinjection Thanks to@med0x2e for the answering my queries and helping me while exploring#GadgetToJScript tool
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Awesome work finding an RCE in SharePoint by
@irsdl which also affected SharePoint Onlinehttps://twitter.com/MDSecLabs/status/1223280822700138497 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
@domchell and@_xpn_ will be bringing our popular Adversary Simulation and Red Team Tactics training to the US this year at@BlackHatEvents https://www.blackhat.com/us-20/training/schedule/#adversary-simulation-and-red-team-tactics-18511 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
Congratulations! It is awesome training. Wish you the best!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Very excited to announce
@_xpn_ and me will be bringing our#redteam training to Vegas this August for@BlackHatEvents https://www.blackhat.com/us-20/training/schedule/index.html#adversary-simulation-and-red-team-tactics-18511 … - we'll follow up soon with some revelations on what makes this course so exciting!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
And now with have
@jfmeee with some knowledge on popping Firefoxpic.twitter.com/ZYFk150eUr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
And next up to the have Taha talking about Kubernetes for pentesters!
pic.twitter.com/gBulEOnqds
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
The first speaker on tonight’s team
@MDSecLabs research night is@0x09AL detailing how to bypass Cylance using syscalls for API unhookingpic.twitter.com/epZzcOzokB
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
We’re doing it again
https://twitter.com/MDSecLabs/status/1221771854509199360 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
Attended this last year, can't recommend it enough.
@domchell and@_xpn_ were super friendly and answered all the daft questions I had. Content was upto date and full of stuff I hadn't seen before. 100% worth it. Still feel sorry for that poor projector though...https://twitter.com/MDSecLabs/status/1221771854509199360 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
If
@tiraniddo's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:https://github.com/outflanknl/Scripts/blob/master/ShellcodeToJScript.js …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This sold out pretty sharpish last time, and the waiting list has already swiped a few seats so if you’re interested move quickly!
https://twitter.com/mdseclabs/status/1221771854509199360 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dominic Chell proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Dominic Chell proslijedio/la je Tweet
Revisiting RDP lateral movement https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 … and releasing a project that will be part of a bigger tool coming next week
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
Looking for a red team training? Look no further.