Ben Chung

@MrBenChung

of course these views are my own

Vrijeme pridruživanja: travanj 2017.

Tweetovi

Blokirali ste korisnika/cu @MrBenChung

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MrBenChung

  1. proslijedio/la je Tweet
    4. velj

    We on the Labs team use Projects Sonar and Heisenberg to provide context for risk on the Internet. Today I published a blog post on DOUBLEPULSAR over RDP in support of 's efforts in this area.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Poništi
  3. proslijedio/la je Tweet
    5. velj
    Odgovor korisniku/ci

    I released OMENS more than 5 years ago to help the community detect and combat this problem.

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Every. Single. Organization.

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    VB6 Packers are no joke, This one took me a while to write and I do hope you enjoy it! Analyzing Modern Malware Techniques - Part 3 Vb6 packers

    Poništi
  7. proslijedio/la je Tweet
    4. velj

    TeamViewer (all versions) keys lead to password extraction, not hashed. TeamViewer stored user passwords encrypted with AES-128-CBC with key: 0602000000a400005253413100040000 and iv of 0100010067244F436E6762F25EA8D704 - in the Windows registry.

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    Inspired by awesome people, last year I made a cheatsheet for measuring CTI aspects. This year I've moved it to github, tweaked the sheet a bit and updated ito make it easier to maintain for both myself & you folks. Expect more content on CTI & RT. Cheers!

    Poništi
  9. proslijedio/la je Tweet
    4. velj

    So much fun presenting this! Happy to share my slides for "Don't Cross Me! Same Origin Policy and all the 'cross' vulns". SOP is an important topic I feel is not adequately explained and understood by many developers and security pros.

    Poništi
  10. proslijedio/la je Tweet
    5. velj

    So, hearing that Toll Group got hit with ransomware that is caled "Mailto"... But (just as with REvil), we can take a look at the decrypter for it, and then we see they named it "Netwalker Decrypter", instead of "Mailto Decrypter" or anything else... cc

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    3. velj

    RDG Scanner for Vulnerability CVE-2020-0609 & CVE-2020-0610 - multi-threaded - CIDR support

    Poništi
  12. proslijedio/la je Tweet
    3. velj

    Would you be interested in such stickers? (RTs are appreciated)

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    1/ Practically every startup ends up writing code, even if technology wouldn't be the main focus of the company. Here’s a checklist I made to help you and your hot new startup avoid the most common infosec pitfalls. [thread]

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    3. velj

    FakeLogonScreen - A utility to fake the Windows logon screen in order to obtain the user's password. The password entered is validated against the Active Directory or local machine to make sure it is correct and is then saved to disk.

    Poništi
  15. proslijedio/la je Tweet
    3. velj

    6 Short Links on Malware Training Set Creation for Machine Learning

    Poništi
  16. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  17. proslijedio/la je Tweet
    2. velj

    Dealing with the Deluge of Vendors. A thread. [full post here : ] Everyone is deluged by product and service vendors, small and large. Even vendors struggle to keep track of who are their competitors in an ever crowded market place. 1/24

    Prikaži ovu nit
    Poništi
  18. 3. velj
    Poništi
  19. proslijedio/la je Tweet
    2. velj

    For all you cryptography nerds out there. I’ve very much enjoyed playing around with this project. GitHub - NationalSecurityAgency/enigma-simulator: An educational demonstration of breaking the Enigma machine

    Poništi
  20. proslijedio/la je Tweet

    Here are the slides from my . I fixed a few typos and added links and resources.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·