Tweetovi

Blokirali ste korisnika/cu @h0mbre_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @h0mbre_

  1. Prikvačeni tweet
    21. pro 2019.

    Last project of 2019. I created an image-based C2 channel proof of concept that posts/retrieves stego'd images on Imgur. As a PoC only, I've simulated a proper implant in Python. The Framework is called Dali, after the artist. For fun & to learn!

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 16 sati

    My attempt at the theme for . First try at making armour, shading doesn't feel too great, but an alright first attempt (I think!). Armour + stand === 31x48 pixels

    Poništi
  3. proslijedio/la je Tweet
    3. velj
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Starting Reverse Engineering 101 course, I'm really excited to get away from offensive stuff, and look into more blue stuff!

    Poništi
  5. 2. velj

    HEVD -- Arbitrary Write, Win7 x64 Some weird, possibly self-induced, behavior on this one. Had to deal with a consistent overwrite of our first two shellcode buffer bytes. But we adapted and made it work. Let me know if you can provide clarity!

    Poništi
  6. 2. velj
    Poništi
  7. 2. velj

    finally got the HEVD arbitrary overwrite working for x64 on win7. this one had a really weird behavior that im not knowledgeable enough to root cause yet. would love to have someone take a look at the blogpost and tell me why the behavior occurred. writing it now

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    I just released new features in my Shellcode Tester, where you can put your Shellcode, disassemble and test without compiling any file.

    Poništi
  9. 1. velj

    aaaand i got it

    Prikaži ovu nit
    Poništi
  10. 1. velj

    getting thoroughly owned by an exploit today, sometimes youre the nail

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Another box solved the unintended way: RE. Once I had RCE after dropping an aspx webshell with the Winrar CVE, I used the UsoSvc service to gain SYSTEM and impersonated the Coby user to decrypt the root flag. Great box by .

    Poništi
  12. proslijedio/la je Tweet
    31. sij

    For today's theme of , I made a bee (46x31 pixels)

    Poništi
  13. proslijedio/la je Tweet
    7. sij

    I'll be teaching Windows Kernel Exploitation Foundation and Advanced (2 days) each Vancouver. Register if kernel exploitation excites you. cc:

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    Discounted prices are available. Check them out!!

    Poništi
  15. 29. sij

    HEVD -- Arbitrary Write, Win7 x86 thanks to all the sourced bloggers, content producers, elders

    Poništi
  16. 29. sij

    my saving grace when trying to figure out how the hell to call NtQuerySystemInformation:

    Poništi
  17. proslijedio/la je Tweet

    The final count is in, and with 92.5 points total, and are crowned Master of Pwn! Congratulations to everyone who participated. We'll have a full wrap video with all the results available tomorrow morning. We'll see you in Vancouver.

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    I just published my writeup for the mini websockets challenge of the BottomlessAbyss BBS CTF: Easy but fun challenge. Played with websockets in Python and did some HMAC secret bruteforcing.

    Poništi
  19. proslijedio/la je Tweet
    27. sij

    we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  21. proslijedio/la je Tweet
    26. sij

    Didn't have a ton of time today, so had to go with something simple for (theme , size: 64x64 pixels)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·