Austin

@icryo

Opinions are my own CTFtime/HTB - Cryo Twitch/youtube- iCryo

Vrijeme pridruživanja: svibanj 2008.

Tweetovi

Blokirali ste korisnika/cu @icryo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @icryo

  1. proslijedio/la je Tweet
    28. sij

    Companies that view remote working as a privilege or a perk make me throw up a little bit everytime I hear them. You’re still working full hours, sometimes more. Being able to look after your mental and physical health and have free time shouldn’t be a privilege. 👍

    Poništi
  2. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  3. 31. pro 2019.

    Happy New Year! If you pentest SAP systems and you gain access to a service account RFCpwn will create highly privileged dialog users and dump hashes using RFC calls and provided credentials:

    Poništi
  4. proslijedio/la je Tweet
    27. ruj 2019.

    Completely re-factored+cleaned the core of sRDI this week which just went into the dev branch. Also added an import obfuscation option which will randomize IAT patching order and (optionally) add sleeps between DLL loads. Might help someone :)

    Poništi
  5. proslijedio/la je Tweet
    7. ruj 2019.
    Odgovor korisnicima

    Think this one looks good for x86 or ANY CPU, need to come up with something more robust... but my brain isn't working too well today ;)

    Poništi
  6. proslijedio/la je Tweet
    6. ruj 2019.

    Today we released a community-developed exploit module PR for (CVE-2019-0708). We expect to continue refining the exploit over time in collaboration with contributors. Some important notes on exploitation and detection from :

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    28. kol 2019.
    Poništi
  8. proslijedio/la je Tweet
    27. kol 2019.
    Prikaži ovu nit
    Poništi
  9. 24. kol 2019.

    AMSI Bypass -> ICMP reverse shell. Read:

    Poništi
  10. proslijedio/la je Tweet
    12. kol 2019.

    Happy to announce our GQUIC Protocol Analyzer for as well as a Fingerprinting Method which makes detecting malware communicating over QUIC exceedingly easy! This was created by our Threat Detection Intern, Caleb Yu:

    Prikaži ovu nit
    Poništi
  11. 11. kol 2019.

    Hurt by high security slides are available at

    Poništi
  12. proslijedio/la je Tweet
    31. srp 2019.

    New blog post exploring Windows RPC internals, reversing with Ghidra, and how we can use Neo4j to find interesting call paths.

    Poništi
  13. proslijedio/la je Tweet
    31. srp 2019.

    Introducing InveighZero, a C# LLMNR/NBNS/mDNS/DNS spoofer/man-in-the-middle tool: Bonus, also just released Inveigh 1.5: Stop by the booth to learn more and get stickers😃

    Poništi
  14. proslijedio/la je Tweet
    17. srp 2019.
    Poništi
  15. proslijedio/la je Tweet
    26. lip 2019.

    Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\ Then %userprofile%\AppData\Local\Microsoft\Teams\Update.exe --processStart payload.exe --process-start-args "whatever args" Trusted signed binary will run the payload for you 😊

    Poništi
  16. proslijedio/la je Tweet
    19. lip 2019.

    My first blog for Combining direct System Calls and sRDI to bypass AV/EDR Hope you enjoy it!

    Poništi
  17. proslijedio/la je Tweet

    New blog post breaking down our take on Red Team infrastructure, bastions, tunneling, routing, and more!

    Poništi
  18. proslijedio/la je Tweet
    7. lip 2019.

    New blog post is up showing how Mimilib and memssp work to harvest credentials.

    Poništi
  19. proslijedio/la je Tweet
    9. lip 2019.
    Poništi
  20. proslijedio/la je Tweet
    5. lip 2019.

    A coworker showed me a *massive* block of base64 shit. I looked at it and *immediately* said "Oh, that's an EXE". He looked at me puzzled "how the fuck?" This. This is why

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·