Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @julianpentest
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @julianpentest
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Julian Horoszkiewicz proslijedio/la je Tweet
Released a little tool to perform lateral movement that hide the command you are executing by registering a protocol handler. The protocol handler is executed over WMI by simply running start customhandler:// https://github.com/Mr-Un1k0d3r/PoisonHandler …
#redteam#pentest
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Can anyone recommend exploit dev certifications other than OSCE and OSEE? Thanks in advance!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julian Horoszkiewicz proslijedio/la je Tweet
You know you can embed C# in a PowerShell script, (but the PowerShell scanning and logging makes it no longer great for hacking, not to mention that it internally compiles and loads a .dll) but did you know about the C# REPL scriptcs? - Known good EXE/DLL's - No AMSI, logging...pic.twitter.com/UBjve9YYlK
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julian Horoszkiewicz proslijedio/la je Tweet
SharpSploit v1.5 is out! Includes amazing work from
@_RastaMouse,@checkymander,@001SPARTaN,@FuzzySec, and@TheRealWover. Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements.

https://github.com/cobbr/SharpSploit …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PE Import Table hijacking as a way of achieving persistence/exploiting DLL side loading (Christmas blog post
):
#windows#persistence#redteam#dll#sideloadinghttps://hackingiscool.pl/pe-import-table-hijacking-as-a-way-of-achieving-persistence-or-exploiting-dll-side-loading/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Is there any open source tooling providing similar functionality to cantor.dust? This approach seems super helpful in forensics/malware analysis.https://www.youtube.com/watch?v=4bM3Gut1hIk …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dealing with a potential DLL-side loading, from the very beginning of the boot log, all CreateFileMapping() calls with PageProtection:PAGE_EXECUTE result in FILE LOCKED WITH ONLY READERS - so I guess the DLL is somehow locked from being executed, what might be the cause?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julian Horoszkiewicz proslijedio/la je Tweet
Unfortunately one of the negatives to sharing information freely is that sometimes a vocal few who have used it as a stepping stone will try and close the door behind them.. “thanks, but the professionals are here now, step aside”.. Resist that BS and keep on sharing.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julian Horoszkiewicz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Maybe it's the VTable Offset interface property, but in my case it's empty.pic.twitter.com/8pGCrhibKf
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just to be clear, I know where they are as they are mentioned in the article, plus I got the symbols file and thus (in this case) the methods in the DLL can be found quite easily, but just curious what am I missing in what OleViewDotNet is showing.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/november/cve-2019-1405-and-cve-2019-1322-elevation-to-system-via-the-upnp-device-host-service-and-the-update-orchestrator-service/ … - "OleViewDotNet identifies both the module that implements the class of interest and the offsets of interface methods". I see the module (DLL) in the service definition, but where does it (OleViewDotNet) show relevant method offsets?pic.twitter.com/xHzWcUMMSM
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The .search-ms query format supports UNC paths in the path element in the scope, nice
Name resolution seems to only work on NBNS, however IP addr given directly does the trick.pic.twitter.com/zS2UUd8byH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julian Horoszkiewicz proslijedio/la je Tweet
We open sourced PathAuditor: a tool for Linux that
@rozek_marta and I worked on this summer. Tl;dr: you can use it to instrument root daemons and find insecure file access patterns like CVE-2019-3461. Check out the code: https://github.com/google/path-auditor … Blog post:https://security.googleblog.com/2019/12/detecting-unsafe-path-access-patterns.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Copying an autoElevate binary to an alternative location in order to hijack its DLL loading sequence order with your own DLL -> universal UAC bypass, brilliant!
https://twitter.com/404death/status/1203641639362674688 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anyway, it's shit - doesn't load DLLs
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hm, I expected a well known associated extension like txt to end up in running notepad++ on the target instead... Well, you live and learn.pic.twitter.com/EfhxQThgw2
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
BTW, to my surprise calc.exe can as well be run directly from a garbage extension like tmp
pic.twitter.com/x2TA3tBO8q
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
After stumbling upon c:\windows\system32\runexehelper.exe and some reversing I figured out it can be used to run execs (two conditions: diagtrack_action_output env var needs to be set to a writable directory and runexewithargs_output.txt must not exist there).
#LOLBas#LOLBinpic.twitter.com/T9tlfA4J7w
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.