Soren Fritzboger

@fritzboger

Consultant at Studying a master's degree in Computer Science and Engineering at Tweets are my own

Denmak
Vrijeme pridruživanja: veljača 2010.

Tweetovi

Blokirali ste korisnika/cu @fritzboger

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fritzboger

  1. Prikvačeni tweet
    14. sij

    Wrote a small post about embedding external DLLs into a Task in Covenant. Shout out to for Covenant and his willingness to help in the BloodHound slack channel!

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    Read CSIS Security Group's latest Threat Matrix Report and get an overview of the latest trends, news and real world scenarios in the cyber security industry.

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    Infosec twitter, apart from the currently popular CVE-2020-0601 patch, do you know of any other official vendor patch that uses CveEventWrite to record an attempt to exploit a patched vulnerability? I think it's an important and positive change. Please RT for reach.

    Poništi
  4. proslijedio/la je Tweet
    21. pro 2019.

    Merry christmas :-) Here's a (although partial) write-up of where I have published solution details to the categories: Reversing, Analysis and Boot2Root. The rest of the categories will be updated later on, but for now only contain the flags.

    Poništi
  5. 10. pro 2019.

    I have been searching for a way to do this. This is a very elegant solution, and will definitely be useful in the near future. Well done !

    Poništi
  6. 9. pro 2019.

    When did Mimikatz become a legitimate tool 🤔

    Poništi
  7. 13. stu 2019.

    This is a very interesting use of API Hooking. Well thought of !

    Poništi
  8. 6. stu 2019.

    So until Python, Perl, OpenJDK and probably so many other products fix this, privilege escalation on Windows is very trivial 🤷‍♂️

    Poništi
  9. 5. stu 2019.
    Poništi
  10. proslijedio/la je Tweet
    4. stu 2019.

    During bug hunting on Antivirus products, I found another vulnerability which is DLL Hijacking that leads to Elevation of Privilege on Windows Service Host. Reported to MSRC and they decided not to fix it. A quick write-up:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·