Tweetovi

Blokirali ste korisnika/cu @eightytank

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @eightytank

  1. proslijedio/la je Tweet
    prije 2 sata

    Analyzing WhatsApp Calls with Wireshark, radare2 and Frida

    Poništi
  2. proslijedio/la je Tweet
    prije 2 sata

    I had some fun exploiting LDAP this week. I'm far from an LDAP expert, so please, bear with me as I try to make some sense of how I went to went from what seemed to be near complete lockdown to owning the domain.

    Poništi
  3. proslijedio/la je Tweet
    prije 9 sati

    1/ I can finally share the exploit demo video for CVE-2020-6007: TL;DR: We managed to infiltrate into a computer network using an over-the-air Zigbee exploit on the Philips Hue Bridge (smart lightbulbs controller).

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    prije 5 sati

    Dark times. But don't forget, the bugs are still there. It does not fix the fact that high privilege processes don't always use least privileges on file operations. It's not the end. As long as there are bugs, there is hope. 🐻

    Poništi
  5. proslijedio/la je Tweet
    prije 22 sata

    Custom Signed Kernel Driver's Pretty cool 😃 Without the need to enable TestSigning. Sample Project:

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    As promised, here is the follow up defensive blog to last weeks post on Attacking Azure.

    Poništi
  7. proslijedio/la je Tweet
    prije 6 sati

    Here’s a complete port of ’s Seatbelt from the GhostPack toolkit to Boolang ( cause why not ). This has been in SilentTrinity for a while but it might be useful standalone.

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    If you don’t schedule and block out time for process and tool improvement... ...it will not get done. Don’t expect folks to do “when you find time” during fully booked 40hr weeks after week or to “do it on your own time”.

    Poništi
  9. prije 7 sati

    Playing with existing UAC bypasses leads to weird wormholes.

    Poništi
  10. prije 7 sati

    I can duplicate folders and it's contents with a simple mkdir, but it leads to ghost files and directories :( Is anyone creative enough to find a way to point the new files to my own ones? Or anything kindly evil for the matter?

    Poništi
  11. proslijedio/la je Tweet
    prije 15 sati

    My dad just called. Didn't like the episode was 61 minutes long. Wants me to shorten it next time. He's always saying that. He's sweet for listening though. He's got nothing to do all day too.

    Poništi
  12. proslijedio/la je Tweet

    Place your outage cause bets: 1) DNS 2) Expired certificate 3) Both 4) cYbEraTtAcK

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    Hmm. Computer security career path. 🤔🤔🤔🤔🤔

    Poništi
  14. proslijedio/la je Tweet

    Archivists have pirated more than 5,000 studies about coronaviruses and made them open access: "It's a moral imperative," they said. “A copyright on the health of humanity? Fuck off.”

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  16. proslijedio/la je Tweet
    3. velj

    I really don't understand 3 month notice periods. Do you really think the person will still be motivated to act in the company interest for a quarter or a year after they quit? Get them out of the door as quickly as possible

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    3. velj
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  19. proslijedio/la je Tweet
    2. velj

    [COM hijacking] While I was looking for some methods related to the COM hijacking technique, I found a new method that allows you to hijack COM and execute Scriptlet instructions :) Registry import file:

    Poništi
  20. proslijedio/la je Tweet
    2. velj

    How to create fake traffic jams in Google Maps with bucket full of smartphones Different perspective: 1) Buy mobile bots 2) Spoof GPS location 3) Control traffic

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·