Tweetovi

Blokirali ste korisnika/cu @drakesarath

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @drakesarath

  1. proslijedio/la je Tweet
    1. velj

    Thank you all so much for coming to my talk on threat modeling! You can check out my slides (complete with references) here: . Thanks to , , and the amazing volunteer crew for having me and making this event possible!

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Speaking at was awesome, thank you for the opportunity! For anyone interested in slides, check them out here in SpeakerDeck:

    Poništi
  3. proslijedio/la je Tweet

    Here are the slides from my . I fixed a few typos and added links and resources.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Slides of Roger's talk on "5G protocol vulnerabilities and exploits" here: [PDF]

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. velj
    Poništi
  6. proslijedio/la je Tweet
    3. lip 2016.

    Core skills come from reading Tanenbaum on operating systems, Windows internals, TCP/IP illustrated volume 1 & Carrier on file systems

    Poništi
  7. proslijedio/la je Tweet

    WinPwnage. Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

    Poništi
  8. proslijedio/la je Tweet
    prije 6 sati

    some exploits tend to load directly ntoskrnl.exe (indows Kernel) to do some offsets calcs for some critical kernel structs or global vars ... in normal condition this should be rare so won't harm to add it to your sysmon/EDR config.

    Poništi
  9. proslijedio/la je Tweet
    4. velj

    ❤️? Yeah, me too! But if you're chasing a bad guy across a > 100K-node environment you're probably pivoting to your . 🤔 shares some of the (many) ways we use as our "cheat code" when responding . 👇

    Poništi
  10. proslijedio/la je Tweet
    4. velj
    Poništi
  11. proslijedio/la je Tweet
    3. velj

    Python Script to access ATT&CK content available in STIX via a public TAXII server

    Poništi
  12. proslijedio/la je Tweet
    2. velj

    Looking for more memory dumps to dig into? Here is my newest one! -> Win10x64_18362 DevVM Gargoyle-laden (thx ) acquired with dumpit (thx ) & analyzed with win10compression support (thx )

    Poništi
  13. proslijedio/la je Tweet

    ProTip for users. Colorize the database cells! My current theme is straight up from the 90s but I can see the BLOBs and non-null cells very easily. Helps put together queries from large databases.

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    Like and ?! Then you’ll love our write up on how to integrate them.

    Poništi
  15. proslijedio/la je Tweet
    3. velj

    Announcing the release of Osquery in a Box: A simple collection of docker-compose and other configuration that will bootstrap an osquery, Fleet, ELK stack environment in under 5 mins. Been wanting to try out these technologies? Now's your chance.

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    Check out Tony's tool to whitelist shared objects loaded via LD_PRELOAD:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Happy Friday hackers! Nitesh found a critical RCE vulnerability in Jenkins that led us to discover a Bitcoin mining service running on a DoD website 😲. Head over to the disclosed report to see all the details! Thanks for being 🔥 Nitesh

    Poništi
  18. proslijedio/la je Tweet

    The Microsoft Defender ATP research team has also released a Threat Analytics report that customers can use to get technical info about the techniques and tools used by the threat, the impact to the organization, advanced hunting queries, mitigation status, and recommendations.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    3. velj

    FakeLogonScreen - A utility to fake the Windows logon screen in order to obtain the user's password. The password entered is validated against the Active Directory or local machine to make sure it is correct and is then saved to disk.

    Poništi
  20. proslijedio/la je Tweet
    3. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·