myexploit2600

@myexploit2600

pro pentester, oh yes also a chapter lead

Social Engineering You
Vrijeme pridruživanja: listopad 2013.

Tweetovi

Blokirali ste korisnika/cu @myexploit2600

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @myexploit2600

  1. prije 21 sat

    If anyones interested I got some how-to vids here

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Had an idea for a talk but not submitted it? Here's your chance, go do it!

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    It's Friday night, I am 60 years old and I am recovering a damn Exchange server. Where did I go wrong in my life

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Dear Track 1 speakers. "Technical difficulties" meant your slides weren't recorded. If you didn't already, could you please send your slide deck to either me or so I can insert them manually.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Computer owner could be a real issue in MS environment, I cover in my last blog post a way to perform privilege escalation in AD thanks to PXE and LAPS

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Good news! The CFP for BSides London 2020 is officially OPEN! You have until Feb 29th to submit. Go go go! Please RT!

    Poništi
  8. 31. sij

    I’m excited, last few nights I have been busy beavering away in my lab, and oh yes I have one cool blog post coming soon.

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Got a very good and trusted friend looking for a developer advocate role, ideally in or around Sheffield, but would consider travel to Leeds or Manchester. Anyone know of anything going?

    Poništi
  10. proslijedio/la je Tweet

    It has taken me a few weeks to put it together however here is part 2 of my mail technologies blog post, all about and , really useful for and

    Prikaži ovu nit
    Poništi
  11. 28. sij

    Simply I salute for Wsdler in the burp store!

    Poništi
  12. proslijedio/la je Tweet
    27. sij

    And today's disclosure is another maritime tech vendor. This one accepted the report, created support tickets, then keeps closing them, despite apparently not fixing the vuln Fortunately, I think we have some mutual contacts with senior staff there.

    Poništi
  13. proslijedio/la je Tweet
    27. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    You can also do this with CrackMapExec and the Scuffy module. Has auto-cleanup too!

    Poništi
  14. proslijedio/la je Tweet
    27. sij

    Is LLMNR Poisoining still a thing? 🤔

    Poništi
  15. proslijedio/la je Tweet
    26. sij

    I seem to have two copies of this fundamental book. Would anyone like a copy? Includes the CD.

    Poništi
  16. proslijedio/la je Tweet
    25. sij

    Some notes on PoshC2, operational considerations + a couple of tweaks to default beacons which might reduce exposure to Blue team

    Poništi
  17. proslijedio/la je Tweet
    24. sij

    As a reviewer of pentesting reports, do you read the whole document or skip to the vulns?

    Poništi
  18. 24. sij

    Cheers to for a great day.

    Poništi
  19. proslijedio/la je Tweet
    24. sij

    FYI Neil Lines in my previous tweets is ! great talk!

    Poništi
  20. 24. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·