Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @nikhil_mitt
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nikhil_mitt
-
Prikvačeni tweet
Loved this one! Reviews like this motivates us for the hard work required to run complex labs like
#GCBLab. cc@SecurityTube https://www.redteamtrainingreviews.com/pentesteracademy/GCBLab.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We are back with our popular 2x2 days class "Active Directory Attacks for Red and Blue Teams - Advanced Edition" at
@BlackHatEvents. Learn to compromise and defemd a fully updated realistic AD environment using Server 2019 machines.@SecurityTube https://www.blackhat.com/us-20/training/schedule/index.html#active-directory-attacks-for-red-and-blue-teams--advanced-edition-19082 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Here is my review of the "Active Directory lab" from Pentester Academy: https://apt29a.blogspot.com/2020/02/pentester-academy-active-directory-lab.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Congratulations to
@r3n_hat for the rare distinction of clearing our Pentester Academy Certified Enterprise Security Specialist exam!#GCB#PACES cc@nikhil_mitt https://bit.ly/36JqlsD pic.twitter.com/GFSBsUVVqg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Added 2 more PoC scripts to the OffensiveDLR repo. One of which embeds the SSharp Compiler within a Posh script (Can be easily embedded from within any .NET language.) SSharp code compilation does not call csc.exe :)https://github.com/byt3bl33d3r/OffensiveDLR …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Fellow hackers, you asked, we listened! Coming soon a lab to practice Active Directory attacks from Linux. Latest servers, interesting flags, dedicated lab for everyone, video walk-through and browser based access. cc
@SecurityTube#LinuxADHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Seems like each time an 0day-revealing talk title, bug embargo email subject line, or vulnerable protocol name leaks, independent researchers have working exploits in hours, sometimes of an entirely separate bug. So why not get ahead of the cycle? Follow https://twitter.com/0daytips
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Thank you
@SecurityTube and@nikhil_mitt for very interesting and fun lab and exam!!!pic.twitter.com/VxBcbkPcXp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Congratulations to
@vysecurity for clearing our Certified Red Team Expert exam!#RedTeamLab#CRTE cc@nikhil_mitt https://bit.ly/358nOXZ pic.twitter.com/gpklDn8N6g
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Congratulations to
@Conan0x3 for clearing our Certified Red Team Professional exam!#ADLab#CRTP cc@nikhil_mitt http://bit.ly/2tdKetO pic.twitter.com/JW0Nf03Ftj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
You know you can embed C# in a PowerShell script, (but the PowerShell scanning and logging makes it no longer great for hacking, not to mention that it internally compiles and loads a .dll) but did you know about the C# REPL scriptcs? - Known good EXE/DLL's - No AMSI, logging...pic.twitter.com/UBjve9YYlK
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Thank you
@nikhil_mitt and@SecurityTube for putting together the Windows Red Team Lab and the Certified Red Team Expert certification. I really enjoyed them both! https://lnkd.in/dRW_ZrN https://lnkd.in/dj3mb_Z https://lnkd.in/dMYRPicHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Meterpreter + PPID Spoofing — Blending into the Target Environment The PPID Spoofing is a quite fascinating technique since it lets spawn new processes under a different parent process ID. Let’s see how to implement it into the Meterpreter agent. https://iwantmore.pizza/posts/meterpreter-ppid-spoofing.html …pic.twitter.com/Pwtw8HSsdZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
And another review of Pentester Academy's Global Central Bank course and PACES certification. https://chryzsh.github.io/pta-gcb/ Thank you
@nikhil_mitt and@SecurityTubeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
I've written a review of Pentester Academy's Red Team Lab course and certification. https://chryzsh.github.io/pta-rtlab/ Thank you
@nikhil_mitt and@SecurityTubeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My TL: You all don't even know how to Red team. Your tools are poorly written and easily detected. Also my TL: You all help APTs by releasing OffSec tools.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Watching Pentester Acadmey videos of AD Attack & Defense from
@SecurityTube &@nikhil_mitt with my colleagues.#yesourlabhasachrismastree
pic.twitter.com/2fbFaqMftF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nikhil Mittal proslijedio/la je Tweet
Use the MS-signed executable "dvdplay.exe"
#lolbin to run your binariespic.twitter.com/BPozaA4cND
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is super cool! For many of us containers==docker.https://twitter.com/SecurityTube/status/1201852824293756929 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.