Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @jfmeee
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jfmeee
-
Vylegzhanin Daniel proslijedio/la je Tweet
Now this, people, is what an actual damn LoLBin looks like. A trusted application that can be used to download and/or kick off execution of code of an attacker's choosing **in a way that is undocumented or nearly unknown.** Not just new or unpopular-ish. Good job.
https://twitter.com/Hexacorn/status/1223777258185351168 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Wrote a post on how to use GadgetToJScript with Covenant & Donut https://3xpl01tc0d3r.blogspot.com/2020/02/gadgettojscript-covenant-donut.html …
#Covenant#Donut#GadgetToJScript#redteam#processinjection Thanks to@med0x2e for the answering my queries and helping me while exploring#GadgetToJScript tool
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
@irsdl’s first post is a writeup for an RCE in SharePoint https://www.mdsec.co.uk/2020/01/code-injection-in-workflows-leading-to-sharepoint-rce-cve-2020-0646/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
And now with have
@jfmeee with some knowledge on popping Firefoxpic.twitter.com/ZYFk150eUr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
#lsassy v2 is out
Dump credentials on multiple hosts
New dumping method using #dumpert (@OutflankNL) thanks to@Blurbdust
Can be used as a #library in other python project
Fully documented wiki !
Needs some testing, open issues if need be
https://github.com/Hackndo/lsassy Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
New from
@0xthirteen - Revisiting Remote Desktop Lateral Movement This post discusses RDP lateral movement by leveraging mstscax.dll. Steven also is releasing SharpRDP with corresponding detection guidance for this attack technique. Post:https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Suggest you to take a look at this attempt to put several infosec projects together: https://medium.com/@ditrizna/red-team-use-case-of-open-source-weaponization-5b22b0e287a5 … WebDav, .NET injection, Obfuscation, C&C.. Direct shout-out to
@TheRealWover@_xpn_@_RastaMouse@cobbr_io@Arno0x0x for your awesome work, w/ many others rocking
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Updated PoC to include the root trusted CA "Microsoft ECC Product Root Certificate Authority 2018" Also included a signed and unsigned 7z.exe for you to test out. https://github.com/ollypwn/CVE-2020-0601 … Please only use for research and education.
#curveballpic.twitter.com/VHPUtg96zh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Released a little tool to perform lateral movement that hide the command you are executing by registering a protocol handler. The protocol handler is executed over WMI by simply running start customhandler:// https://github.com/Mr-Un1k0d3r/PoisonHandler …
#redteam#pentest
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Just published a new blogpost with more details about the Citrix ADC Remote Command Execution.https://twitter.com/MDSecLabs/status/1215611640885972992 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Spray-AD, a new
@OutflankNL Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).https://github.com/outflanknl/Spray-AD …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Maybe will be useful to someone at some point: Pulling Web Application Password by Hooking HTML Input Fieldhttps://ired.team/offensive-security/credential-access-and-credential-dumping/stealing-web-application-credentials-by-hooking-input-fields …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Bring your own LOLBin: Multi-stage, fileless Nodersok campaign delivers rare Node.js-based malware - by
@msftsecurityhttps://www.microsoft.com/security/blog/2019/09/26/bring-your-own-lolbin-multi-stage-fileless-nodersok-campaign-delivers-rare-node-js-based-malware/#.XhHisLbDfiY.twitter …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process. https://blog.jmpesp.org/2020/01/fuzzing-php-with-domato.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
New blog post outlining how to use my .NET RPC Client tooling from PowerShell and C# to test and exploit local RPC security vulnerabilities. Also an early xmas present for those who enjoy long standing design flaws in UAC :-) https://googleprojectzero.blogspot.com/2019/12/calling-local-windows-rpc-servers-from.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
My Black Hat USA talk with
@markmorow “Attacking & Defending the Microsoft Cloud (Azure AD & Office 365)” is now on YouTube: https://youtu.be/SG2ibjuzRJM?list=PLH15HpR5qRsWrfkjwFSI256x1u2Zy49VI … Slides here: https://adsecurity.org/?page_id=1352#BlackHat#AzureAD#Office365#ProtectAcmepic.twitter.com/GnDqJv84OL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Attackers sharpen the saw too. See this post on how phishers
are returning tailored AAD login pages for victims
, tricking defenders with custom 404 pages
, and abusing Google's "I'm feeling lucky" feature with SEO techniques
https://www.microsoft.com/security/blog/2019/12/11/the-quiet-evolution-of-phishing/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:https://github.com/jthuraisamy/SysWhispers …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vylegzhanin Daniel proslijedio/la je Tweet
I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to
@Dark_Puzzle for answering my questions.https://rayanfam.com/topics/reversing-windows-internals-part1/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.