
-
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
But you do have to find them, not just a IP or an addresd but physically lay hands on them & then make sure they are stopped Otherwise they will be back as someone else in no time
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
I suppose it depends on what your definition of “win” is. A single compromise might be a “win” which can be detected by blue team within time. Or it could be “I’ve been on your network for years without you noticing and left of my own terms”. Ymmv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
"defenders have to defend the whole castle and attackers only have to find one entrypoint to gain access" - true. but it gets turned on its head soon as the attackers get a shell: "attackers make ONE MISTAKE, and their entire c2 infra is burned and they have to rebuild"
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.