Tweetovi

Blokirali ste korisnika/cu @frycos

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @frycos

  1. proslijedio/la je Tweet
    prije 15 sati

    There are still some seats left for our late February class in Columbia, MD. Time is running out: Learn the art of source code review for high impact vulnerabilities!

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    RDG Scanner for Vulnerability CVE-2020-0609 & CVE-2020-0610 - multi-threaded - CIDR support

    Poništi
  3. 2. velj

    Simple toy example for "Finding entry points in object graphs" thanks to

    Poništi
  4. 2. velj
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Systems patched for Citrix -2019-19781 may still be compromised. See 's latest Activity Alert at for procedures for detecting a compromise.

    Poništi
  7. proslijedio/la je Tweet
    1. velj

    This never gets old, so I'll never stop periodically sharing it.

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    1. velj
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    31. sij

    "Dark sides of Java remote protocols" by

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  13. 30. sij

    Rediscovering old gadgets in unexpected jars.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    SharePoint vulnerability CVE-2019-0604 from a year ago has been used to hack the UN. Three different UN agencies got owned, about 20 domain admin accounts accessed and implants on 40 servers. They didn’t disclose.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  17. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    25. sij

    C2 Panels TOP 5 last 3 months: 1- (324 panels) 2- (192) 3- (97) 4- (42) 5- (38) Source:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    24. sij

    Citrix and FireEye Mandiant release version 1.1 of the IOC Scanner for . The update improves detection logic, enhances IOC intelligence, and reduces false positive results.

    Poništi
  20. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·