Tweetovi

Blokirali ste korisnika/cu @eyal_karni

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @eyal_karni

  1. proslijedio/la je Tweet

    It will be my new wallpapers

    Poništi
  2. proslijedio/la je Tweet
    20. pro 2019.

    I'm happy to share that the talk I've submitted with "Advanced Credential Relaying Techniques and How to Thwart Them" got accepted to . You don't want to miss this talk if you're interested with what is the latest in relay...

    Poništi
  3. proslijedio/la je Tweet
    27. stu 2019.

    My new research on Dtrack - An analysis of the droppers (I found out that one of them is similar to BackSwap's droppers) and the variant that attacked Kudankulam Nuclear Power Plant (KNPP)

    Poništi
  4. proslijedio/la je Tweet
    14. stu 2019.

    You can use the free AD hygiene tool to analyze your network and discover all machines which don't enforce SMB signing. Enforcing SMB signing on DCs alone (which is the default config) is not enough.

    Poništi
  5. proslijedio/la je Tweet
    1. lis 2019.

    Today I stumbled across the fact that I can extract any file that is locked by the OS on a Windows 10 machine with this native command. C:\WINDOWS\system32\esentutl.exe /y <SOURCE> /vss /d <DEST> Initially I thought it only worked for ese files, but it seems to work everywhere!

    Poništi
  6. proslijedio/la je Tweet
    21. kol 2019.

    great to see is taking action to reduce attack surface by advising customers to enable LDAP relay mitigations. We talked about these issues at our and talks.

    Poništi
  7. proslijedio/la je Tweet
    9. srp 2019.

    We discovered an issue with ADFS which allows brute-forcing all domain accounts from the external network, while bypassing the extranet lockout policy. This can easily lead to account compromise / massive accounts lockout.

    Poništi
  8. proslijedio/la je Tweet
    1. velj 2018.

    Interesting Vim project: A ranger-like system/cloud storage explorer for Vim, bringing together the best of Vim, ranger, and rclone. vim-netranger -

    Poništi
  9. proslijedio/la je Tweet
    25. lip 2019.

    עוד דוגמא לכשלים בפרקליטות הצבאית. שני חיילי 188 הוציאו להורג נער בירייה בעורפו. במצ"ח לא טרחו לחפש את הקליע, ולכן לא הצליחו לקבוע מי הרוצח מבין שני היורים וביטלו את כתב אישום.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. lip 2019.

    Happy to announce that and I will be presenting all the details of how we were able to bypass the latest NTLM relay mitigations (+ a few surprises 🙂) at . See you there!

    Poništi
  11. proslijedio/la je Tweet
    11. lip 2019.

    We have discovered 3 critical NTLM vulnerabilities allowing RCE against any domain machine which were all fixed in the latest MS security update. Check out blog to get all the technical details:

    Poništi
  12. 14. svi 2019.

    אני שמח שגם יאיר מזהה תהליכים

    Poništi
  13. proslijedio/la je Tweet
    29. svi 2018.

    Got a NetNTLMv2 hash ? Good but how long will it take to crack it if wordlist didn't worked ? Here is a quick infography showing real values (not bench) using with a 8 GTX1080 GPU box cc:

    Poništi
  14. proslijedio/la je Tweet
    19. pro 2018.

    New Preempt research finds 72 percent of enterprises have poor control over privileged accounts. Is your organization one of them?

    Poništi
  15. proslijedio/la je Tweet
    19. pro 2018.

    Want to find out how many cloned local admins you have? How many domain users have a weak password configured? How vulnerable you are to NTLM relay attacks? Those are just some of the features offered by the , check it out

    Poništi
  16. proslijedio/la je Tweet
    17. pro 2018.

    Red Tip #337: Have a low privileged Office365 account? Pivot over to after logging in and you can access the Azure AD. If they're syncing AD you suddenly get to view all the groups. Also check out Azure CLI. From 's talk!

    Poništi
  17. proslijedio/la je Tweet
    2. lis 2018.

    Not surprisingly, RDP is being increasingly abused by attackers. Make sure you have a strong password policy, apply MFA whenever possible and make sure your CredSSP version is patched.

    Poništi
  18. proslijedio/la je Tweet
    29. kol 2018.

    Secure Federated Access: Threat Prevention for Cloud Assets - Preempt Security

    Poništi
  19. proslijedio/la je Tweet
    11. tra 2018.

    VIDEO: “Server Tailgating - A Chosen-Plaintext Attack On RDP” presented by last month at in Singapore

    Poništi
  20. 12. tra 2018.

    Following Black Hat presentation, a PoC exploiting CVE-2018-0886 is released! Exploits RDP auth for RCE against a target server. Use for research/demo only! The code is here: For more details, check out the blog:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·