Nikhil Mittal

@nikhil_mitt

Hacker, InfoSec Professional, Researcher, Bookworm, Military Affairs and History student, PowerShell and AD pwner, Creator of Kautilya and Nishang :)

Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @nikhil_mitt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nikhil_mitt

  1. Prikvačeni tweet
    6. pro 2019.

    Loved this one! Reviews like this motivates us for the hard work required to run complex labs like . cc

    Poništi
  2. prije 23 sata

    We are back with our popular 2x2 days class "Active Directory Attacks for Red and Blue Teams - Advanced Edition" at . Learn to compromise and defemd a fully updated realistic AD environment using Server 2019 machines.

    Poništi
  3. proslijedio/la je Tweet
    5. velj

    Here is my review of the "Active Directory lab" from Pentester Academy:

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Congratulations to for the rare distinction of clearing our Pentester Academy Certified Enterprise Security Specialist exam! cc

    Poništi
  6. proslijedio/la je Tweet
    21. sij

    Added 2 more PoC scripts to the OffensiveDLR repo. One of which embeds the SSharp Compiler within a Posh script (Can be easily embedded from within any .NET language.) SSharp code compilation does not call csc.exe :)

    Poništi
  7. 20. sij

    Fellow hackers, you asked, we listened! Coming soon a lab to practice Active Directory attacks from Linux. Latest servers, interesting flags, dedicated lab for everyone, video walk-through and browser based access. cc

    Poništi
  8. proslijedio/la je Tweet
    20. sij

    Seems like each time an 0day-revealing talk title, bug embargo email subject line, or vulnerable protocol name leaks, independent researchers have working exploits in hours, sometimes of an entirely separate bug. So why not get ahead of the cycle? Follow

    Poništi
  9. proslijedio/la je Tweet
    16. sij

    Thank you and for very interesting and fun lab and exam!!!

    Poništi
  10. proslijedio/la je Tweet
    30. pro 2019.

    Congratulations to for clearing our Certified Red Team Expert exam! cc

    Poništi
  11. proslijedio/la je Tweet
    30. pro 2019.

    Congratulations to for clearing our Certified Red Team Professional exam! cc

    Poništi
  12. proslijedio/la je Tweet
    27. pro 2019.

    You know you can embed C# in a PowerShell script, (but the PowerShell scanning and logging makes it no longer great for hacking, not to mention that it internally compiles and loads a .dll) but did you know about the C# REPL scriptcs? - Known good EXE/DLL's - No AMSI, logging...

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.

    Thank you and for putting together the Windows Red Team Lab and the Certified Red Team Expert certification. I really enjoyed them both!

    Poništi
  14. proslijedio/la je Tweet
    18. pro 2019.

    Meterpreter + PPID Spoofing — Blending into the Target Environment The PPID Spoofing is a quite fascinating technique since it lets spawn new processes under a different parent process ID. Let’s see how to implement it into the Meterpreter agent.

    Poništi
  15. proslijedio/la je Tweet
    16. pro 2019.

    And another review of Pentester Academy's Global Central Bank course and PACES certification. Thank you and

    Poništi
  16. proslijedio/la je Tweet
    16. pro 2019.

    I've written a review of Pentester Academy's Red Team Lab course and certification. Thank you and

    Poništi
  17. 15. pro 2019.

    My TL: You all don't even know how to Red team. Your tools are poorly written and easily detected. Also my TL: You all help APTs by releasing OffSec tools.

    Poništi
  18. proslijedio/la je Tweet
    5. pro 2019.

    Watching Pentester Acadmey videos of AD Attack & Defense from & with my colleagues. 🎄

    Poništi
  19. proslijedio/la je Tweet
    5. pro 2019.

    Use the MS-signed executable "dvdplay.exe" to run your binaries

    Prikaži ovu nit
    Poništi
  20. 3. pro 2019.

    This is super cool! For many of us containers==docker.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·