Rezultati pretraživanja
  1. Osobe Vidi sve

  2. prije 1 sat

    So I made this because of the recent CTF. It wasn't enough to solve the challenge, but I still did after a few more hours. Great challenge and awesome event! Had lots of fun just on this single challenge

  3. prije 1 sat
  4. prije 3 sata
  5. prije 5 sati
  6. prije 6 sati

    Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials

  7. prije 12 sati
  8. prije 19 sati

    If you write IDS signatures you may want to add coverage for DOUBPLEPULSAR over RDP. TLS might break your visibility but there are tons of hosts that still only support Standard RDP security. The blog links to a module you can test with.

  9. 4. velj
    Prikaži ovu nit
  10. 4. velj
  11. 4. velj
  12. 2. velj

    Recently had my first PR merged into Honestly I may be more excited than I should be about it.

  13. 2. velj

    Still no flags at . HOWEVER, I have so far learned how to: 1) Set up port forwarding, 2) Use 'Terminator' to manage forwards, 3) Set up background sessions in , 4) Access those sessions, 5) Update module targets.

    Prikaži ovu nit
  14. 1. velj
  15. 31. sij
  16. 31. sij

    I've learned a lot playing in the already. It's hard but just when I feel like I can't go on I find something.

  17. 30. sij

    Hey who is doing the -ctf? I am lurking on the Slack because not confident enough to make an attempt, but if anyone is doing it... Good luck! ^_^

  18. 30. sij
    Odgovor korisniku/ci

    Registration is full. Teams may still be accepting new members. You can ask in -ctf on Slack:

  19. 30. sij

    T-30 minutes until kickoff. Join -ctf on Slack to watch the joy and frustration in real-time. Scoreboard:

  20. 30. sij
  21. 30. sij

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.