Tweetovi

Blokirali ste korisnika/cu @maadhavowlak

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @maadhavowlak

  1. proslijedio/la je Tweet
    2. velj
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  3. proslijedio/la je Tweet
    31. sij
    Poništi
  4. proslijedio/la je Tweet
    12. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    13. sij
    Poništi
  6. proslijedio/la je Tweet
    13. sij

    This is clever: find an unlocked Windows computer, pop in a USB and it shows a fake login/lock screen ("hmm, did I lock my PC when I went for a coffee?") User enters credentials into *your* app & you just stole the username/password. 🤯

    Poništi
  7. proslijedio/la je Tweet
    7. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. sij

    My first blog post! Bypassing AV via in-memory PE execution. I've created a tool to go along with the post and help automate creating undetected PEs, links inside the post 😉

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    2. sij

    Awesome Burp Suite Resources. 400+ open source Burp plugins, 500+ posts and videos.

    Poništi
  10. proslijedio/la je Tweet
    1. sij

    I managed to finish all 24 days of by this year. While I wait for points for my submitted write up, figured I'd post my solutions as well, starting with the first 7 days, the easy challenges. Will get the rest out soon.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    30. pro 2019.

    InfoCon Collection: Hacking Conference Audio and Video Archive

    Poništi
  12. proslijedio/la je Tweet
    23. pro 2019.

    Remote Windows credentials dump process automation. Can be used to dump Windows credentials remotely and later extract clear text with Mimikatz offline.

    Poništi
  13. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    17. pro 2019.

    Cracking TGS Tickets Using Kerberoast - Exploiting Kerberos to Compromise the Active Directory Domain

    Poništi
  15. proslijedio/la je Tweet
    15. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  17. proslijedio/la je Tweet
    8. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    22. stu 2019.

    Tried running PowerView on an end-point with multiple EDR products.. detected and blocked as expected. Decided to copy/paste into notepad, search and replace and names along with the script name.. bypassed and worked fine. smh 🤦‍♂️

    Poništi
  20. proslijedio/la je Tweet
    19. stu 2019.

    Yay, I was awarded a $21,000 bounty on ! For Unauthorized access to corporate portal. Site=>302=>company SSO Site/reports=>200=>product login page Default creds=> Access

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·