Tweetovi

Blokirali ste korisnika/cu @offethhacker

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @offethhacker

  1. proslijedio/la je Tweet

    One goal down. Thank you for the amazing support everyone. We just crossed the 10,000 student mark and are still the highest rated course <33

    Poništi
  2. proslijedio/la je Tweet
    prije 21 sat

    I had some fun exploiting LDAP this week. I'm far from an LDAP expert, so please, bear with me as I try to make some sense of how I went to went from what seemed to be near complete lockdown to owning the domain.

    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet
    5. velj

    Here’s a complete port of ’s Seatbelt from the GhostPack toolkit to Boolang ( cause why not ). This has been in SilentTrinity for a while but it might be useful standalone.

    Poništi
  5. proslijedio/la je Tweet

    Today's path to DC: Default creds on Teradici web login -> password stored in cleartext on web app (why??) -> password works as local admin on 1 machine -> SAM dump shows local helpdesk account, which works on many machines -> dump secrets across those -> wdigest of DA -> win

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    Python based script for Information Gathering.

    Poništi
  7. proslijedio/la je Tweet
    5. velj

    UPDATED 🚨 Advance your skills! ✔️ Expanded breach scenario (new flag 🚩) ✔️ New phishing techniques ✔️ Password scheme update ✔️ Windows & Defender updates R U Ready? 🙃 Sign up today:

    Poništi
  8. proslijedio/la je Tweet
    5. velj
    Poništi
  9. proslijedio/la je Tweet
    5. velj

    Fuzzing Web Applications I Opened My Connection To SSH Attacks, And These Were The Requests I Saw Indexing Network Traffic with Moloch and Elastic

    Poništi
  10. proslijedio/la je Tweet
    5. velj

    From persistent XSS to file system read, nice writeup by

    Poništi
  11. proslijedio/la je Tweet
    5. velj

    Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    4. velj

    Real-time monitoring of secrets on github, gitlab and bitbucket.

    Poništi
  13. proslijedio/la je Tweet
    4. velj

    Mike is a very knowledgeable guy who is also at Eternal Noobs Discord server now. Stay tuned to his next tricks! 😉

    Poništi
  14. proslijedio/la je Tweet
    4. velj

    Actor selling access to "University of England" University has 16,000 students Access to the DC's admin with 48,000 accounts asks for $30,000 Anyone knows which university he could be referring to?

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    5. velj

    Story of SSRF SSRF to admin access was like this-> 2. Fetching data from internal resources so I tried uri=http://0.0.0.0 , Got default internal page .♥️ Here is exploit uri=http://0.0.0.0/administrator/dashboard. No auth on admin

    Poništi
  16. proslijedio/la je Tweet
    5. velj
    Poništi
  17. proslijedio/la je Tweet
    4. velj
    Poništi
  18. proslijedio/la je Tweet
    4. velj

    I've just released new version of the iOS Security Suite 🚀 * New verbose&filterable amIJailbrokenWithFailedChecks() method 🛰 * New anti-re indicator 👽

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    2. velj
    Poništi
  20. proslijedio/la je Tweet
    4. velj

    i've written a working exploit for sudo vulnerability CVE-2019-18634. if you have "Defaults pwfeedback" (apparently the default in Linux Mint and derivatives), any user can become root without any password, even if they're not in /etc/sudoers

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·