Tweetovi

Blokirali ste korisnika/cu @itm4n

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @itm4n

  1. 19. sij
    Poništi
  2. proslijedio/la je Tweet
    7. sij

    For anyone interested in my presentation on Local RPC in .NET the HITB version is now up on YouTube.

    Poništi
  3. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi
  4. 14. pro 2019.

    Finally took the time to implement Base Relocation in my VBA RunPE. Damn! That was challenging! 🤯 Big thanks to for sharing great content on Process Hollowing! 🙂

    Poništi
  5. 11. pro 2019.

    New blog post: "CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM" where I mostly talk about Tokens and Impersonation. 🔥 👉

    Poništi
  6. proslijedio/la je Tweet
    11. pro 2019.

    Remember IKEEXT privesc on Windows 7 !? Similar technique found by and explained by to from a LOCAL SERVICE to SYSTEM on Window 10 using the CDPSvc service ! ☠️ WON'T FIX ☠️ 🇬🇧 🇬🇧 🔥

    Poništi
  7. proslijedio/la je Tweet
    6. pro 2019.

    knocked to our door and wanted to get listen and ... we kindly answered! From Service Account to SYSTEM again cc 0xea31()

    Poništi
  8. 5. pro 2019.

    Here is a short blog post showing how a service running with the LocalServiceAndNoImpersonation flag may get all its privileges back. 👌 👉

    Poništi
  9. proslijedio/la je Tweet
    29. stu 2019.

    Remotely extract a memory dump of lsass using Pypykatz and Impacket in less than a second 🔥🔥🔥 Will be integrated to as a module when the switch to python3 will be done 💪 Thx to and !

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    21. stu 2019.

    There is my writeup about my research on DsSvc. I finally got 4 CVEs on this service, all of them are easy to lead EoP. It is a really simple but long story lol😃😃

    Poništi
  11. proslijedio/la je Tweet
    13. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. proslijedio/la je Tweet
    8. stu 2019.

    Released to go with my talk, a project which contains a C# client for almost every ALPC RPC server on Windows 7 through Windows 10 1909. Could be useful for EoP research, fuzzing etc.

    Poništi
  14. proslijedio/la je Tweet
    24. lis 2019.

    Hey twitter, meet , ssh spreading made easy for red teams in a hurry : Try it, use it, expand it, gimme feedback, and hack the planet !

    Poništi
  15. proslijedio/la je Tweet
    22. lis 2019.

    We are proud to share a NTFS in MFT parsing! You too, plug a USB key and BSOD (probably not exploitable by plug&pwn)! Microsoft WONTFIX [EN] [FR]

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    8. lis 2019.

    Windows Error Reporting privilege escalation (CVE-2019-1315) Fixed in October updates

    Poništi
  17. proslijedio/la je Tweet
    1. lis 2019.

    New from - Understanding and Defending Against Access Token Theft: Finding Alternatives to winlogon.exe Justin walks through the technique and shows options to modify the approach. Several detection methods are included too. Check it out:

    Poništi
  18. proslijedio/la je Tweet
    30. kol 2019.

    MiniDumpWriteDump via COM+ Services DLL (rundll32 C:\windows\system32\comsvcs.dll MiniDump "[lsass_pid] dump.bin full")

    Poništi
  19. proslijedio/la je Tweet
    29. kol 2019.
    Poništi
  20. proslijedio/la je Tweet
    27. kol 2019.

    Remember not long ago when one of the first things you did after installing Windows was to install a 3rd party AV? Dec. 2014: Challenger Oct. 2015: Challenger Feb 2016: Challenger Jan. 2017: Challenger Jan. 2018: Visionary Aug. 2019: Leader

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·