Rezultati pretraživanja
  1. 15. svi 2019.

    With Sysmon logging & ' Sigma rule you can detects non-standard programs connecting to RDP port 3389/tcp e.g. malware exploiting to spread within a network

  2. 21. srp 2019.
  3. 23. srp 2019.

    New Release - CANVAS 7.23: This release features a new module for the RDP exploit, BLUEKEEP. Check out our video demonstration here:

  4. 15. svi 2019.

    Regarding the RDP Vulnerability: we know that well-kept and patch management integrated systems will be patched in time - it's the unmanaged or embedded system that'll break everyone's neck Advisory

  5. 4. stu 2019.

    hunt for exploitation for deployment of miner using the first on the list p.s. did you know it has a color theme switcher? ;-)

  6. 4. stu 2019.

    on Possible Delivery via Exploit (CVE-2019–0708) free / community access at working on adding it to uncoder

  7. 4. stu 2019.
  8. 7. ruj 2019.

    I cracked them, they are just a fake tool and rely on EternalBlue. Maybe I will publish the source code as soon as possible. ------------------------

    Prikaži ovu nit
  9. 6. ruj 2019.
  10. 6. ruj 2019.
  11. 2. ruj 2019.

    Our exploit of the day is the ! One of the most critical vulnerabilities of 2019! Read all about it:

  12. 27. lip 2019.

    Just created a simple RDP (3389/tcp) to detect attacks/worms... Hope your IP is not listed here. Should I use and to visualise the data?

    Prikaži ovu nit
  13. 28. svi 2019.
    Odgovor korisniku/ci

    I've just tested it on our LAN. Very useful as it shows the need of a reboot to apply the patch. I couldn't get this info with Thanks

  14. 28. svi 2019.

    [] STM Siber Füzyon Merkezimiz tarafından incelenerek bilgi notu hazırlanan “CVE-2019-0708(BlueKeep) Zafiyet İncelemesi” yayında;

  15. 27. svi 2019.
  16. 21. svi 2019.
  17. 17. svi 2019.

    Stop yours fake poc/EXP operation !

  18. 17. svi 2019.

    There is currently no reliable way to detect CVE-2019-0708 over the network, but you CAN scan for the absence of NLA using : nmap -p 3389 --script rdp-enum-encryption ipaddr. This can imply an affected version because later versions enable NLA by default.

    Prikaži ovu nit
  19. CVE-2019-0708(aka BlueKeep) PoC demo image. Cc Microsoft RDP(Remote Desktop Protocol) RCE Calc.exe pwned! - Windows 7, Windows Server 2K3, Windows Server 2K8 ,

  20. 16. svi 2019.
    Odgovor korisniku/ci

    Oh, your satelites are running Windows? ;)

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.