Rezultati pretraživanja
  1. 2. velj
  2. 30. ruj 2019.
    Prikaži ovu nit
  3. 28. velj 2019.
    Odgovor korisniku/ci

    helps find this pretty quickly, for free

  4. 6. sij
    Odgovor korisniku/ci

    Adding here 😉

  5. Following-up the "printer bug" from , I published the powershell/c# code to test if the spooler service is remotely accessible. Only raw RPC API used - new scanner included in the next release of cc:

  6. 7. pro 2018.

    If you like to audit the risk level of and check for vulnerable practices take a look on . It is free, open sourced and works in disconnected environments as well.

  7. 29. srp 2019.
  8. Odgovor korisnicima i sljedećem broju korisnika:

    Thanks for sharing this amazing technique. Hopefully no need for complex rpc code to test if the spooler is remotely active via OpenPrinter (). I will definitely add a test/scanner in .

  9. 6. pro 2018.

    Watching demonstrating new features of at arsenal, looking forward for official version release :)

  10. 24. sij 2018.

    Very brave: at , and show domain trust discovery and exploitation in live demo! 😻

  11. prije 15 sati

    Just uploaded a small scanner module to . Might be useful when you stuck without any local administrator and looking for other privilege escalation vectors.

  12. I wasn't aware you can define a driver entry in HKCU to exploit SeLoadDriverPrivilege (note: as a reminder you can use an expired kernel mode signing certificate to load code in the kernel) Next version will track the presence of SeLoadDriverPrivilege in GPO.

  13. 18. sij

    Beta of 2.8 available here: Key new features: -light & fast permission analysis à la Bloodhound -assess audit policy Check it and submit your feedback ASAP before code freeze next week Anyone can participate (and even fix my spelling mistakes!)

  14. 4. lip 2018.

    -> (/antivirus.ps1) -> 2 ( 2.1, ), 2 ( heavy ) /info.7h4uk.com /update.7h4uk.com /185.128.40.102 /185.128.43.62 all server + /ver.txt /antivirus.ps1 /antivirus.php referred to in php file

    Prikaži ovu nit
  15. The "Office of the Under Secretary of Defense" is working on a maturity model named whose draft is available below. Still no checklist yet, but there is defintely a thing about maturity in cyber.

  16. 6. ruj 2019.
  17. Located in and want to now how to impress Jean-Pierre ? Come this Saturday to to see my talk entitled "How to impress your management when you are an Active Directory noob?" cc:

  18. 19. sij
    Odgovor korisniku/ci

    Introduced some people to , , and . Lots of fun and some serious hardening. Thanks to you Sean, , and the guys for great tools!

  19. 5. pro 2019.

    Last weekend I rooted forest - exploiting two weak windows domain settings. Today I scanned our corporate domain with , found these settings, fully understood why it worked and fixed it. It' amazin when things come together - thanks! 🙂

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.