Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ihack4falafel
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ihack4falafel
-
Prikvačeni tweet
[Blog] Fileless UAC Bypass in Windows Store Binary https://www.activecyber.us/1/post/2019/03/windows-uac-bypass.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[Blog] Offensive Security - AWE/OSEE Review https://tinyurl.com/tyeqlg3 cc
@h0mbre_@TJ_Null@offsectrainingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hi
@enigma0x3 - Can you please DM me? I have something that you might be able to help with.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This should make for a good before bed read..pic.twitter.com/jyx8UKIbku
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[Blog] Viper RGB Driver Local Privilege Escalation (CVE-2019-18845) https://tinyurl.com/vp66s2k
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
What a nice email from
@offsectraining to wrap up the weekend :)pic.twitter.com/JxaLxa7HSR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[Blog] NVIDIA GeForce Experience Local Privilege Escalation (CVE-2019-5701) https://tinyurl.com/y3lghlqd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stay tuned for the write-up.https://twitter.com/BleepinComputer/status/1192179530196307968 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Found a Kernel driver bug and managed to BSOD the box from a low privileged user! Next step is to see how far I can go with MmMapIoSpace() code path in terms of read/write primitive which may very well lead to EoP..pic.twitter.com/zln5s7Kdr7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[Blog] Netwrix Auditor Symbolic Link Privilege Escalation (CVE-2019-14969) https://tinyurl.com/y3yu6n7j cc
@tiraniddoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spent some time today porting Capcom LPE exploit to Windows 8.1 by updating few structures offsets and whatnot, thanks to
@_hugsy_ blog post. I'll probably port it to Windows 10 at some point once I figure out how to get past SMAP if any. https://tinyurl.com/y253s8jo pic.twitter.com/CNNfhLIdRwPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hashim Jawad proslijedio/la je Tweet
Going live with
@ihack4falafel in 15 minutes join the stream now http://twitch.tv/theblindhacker <3 going to be fun stuff.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tune in and watch me fail on stream.https://twitter.com/TheBlindHacker/status/1151638119881629696 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Found yet another URI Handler Remote Command Execution vulnerability effecting http://join.me software this time around. LogMeIn has released a patch for it in version 3.16.0.5505. https://tinyurl.com/y4qhfh82 pic.twitter.com/NOnGSYJ1q5
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Pandora FMS released patch for a trivial escalation of privileges vulnerability I discovered in their monitoring software. The vulnerability can be triggered via web request to the problematic web server https://tinyurl.com/y5dy9j82 pic.twitter.com/EmP2Igo8VE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Found Local Privilege Escalation bug that effected a total of 18 ManageEngine products. Zoho has released patch for it few weeks ago. See advisory link for full detailshttps://tinyurl.com/y5rnj8qt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Found URI Handler Remote Command Execution bug in Viber for Desktop. Full details and PoC code can be found here https://tinyurl.com/y4u5anp8 pic.twitter.com/wFbZCPFtsM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Finally got around completing / passing the AWE pre-course challenge. Good times ahead!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Put together basic ROR-13 hash generator implementation in C# along with pre-computed hash tables for Win32 APIs of commonly used DLLs such as Kernel32.dll, User32.dll, WS2_32.dll, etc. https://github.com/ihack4falafel/ROR13HashGenerator …pic.twitter.com/lVoJ9qDloE
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[Update] It has been brought to my attention that MS released behavioral detection for this UAC Bypass method in Windows Defender, However it still works. The blog post has been updated accordingly. See the link for reference https://tinyurl.com/y6my7vpd pic.twitter.com/NG5CoCwN4Z
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Here's TCP reverse shell written in C# with the option to choose between Windows command prompt or powershell and its benign according to Windows Defender. Source code can be found here https://tinyurl.com/yyem478p .https://tinyurl.com/yyxm4kke
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.