Tweetovi

Blokirali ste korisnika/cu @paragonsec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @paragonsec

  1. proslijedio/la je Tweet
    30. sij

    w00t! So excited to announce our new course at - Adversary Emulation and Active Defense! 4Day - Combining the spheres of offense and defense to teach core concepts.

    Poništi
  2. proslijedio/la je Tweet
    10. sij

    Our SVP of Managed Security Jordan Mauriello has been a busy guy! This week he joined both ABC Minneapolis and the Bay Area's News 4 to talk about the threat posed by cyberattacks. Watch his interview with ABC here:

    Poništi
  3. 11. sij

    CVEs are good for only making my finding in the report shorter. Isn't it easier to say 2019-xxxx than "super amazing cleartext password" 😁. CVEs don't make you a security superstar. Your knowledge, expertise, dedication, and talent does.

    Poništi
  4. 11. sij

    This netscaler vuln is another sign that isn't the biggest issue. How about we practice secure coding or at least do thorough code review?

    Poništi
  5. 10. sij
    Poništi
  6. proslijedio/la je Tweet
    10. sij

    The debate is a not so subtle call for regulation on offensive tools lead by people who will benefit greatly by the increase in gatekeeping knowledge either through the companies they work for becoming gatekeepers of offensive knowledge, 1/9

    Prikaži ovu nit
    Poništi
  7. 10. sij

    This whole argument is stupid. We all know the biggest security issue is system admins not leveraging defensive tools the way they were designed. Like protected user groups in AD. Hell we still find 6-8 character DA passwords.

    Poništi
  8. proslijedio/la je Tweet
    7. sij

    's SVP of Managed Security, Jordan Mauriello, spoke to CNBC about the increased threat of retaliatory cyberattacks on US businesses from . Check out what he had to say:

    Poništi
  9. 6. sij

    Watching another documentary around WWII and the Holocaust and an "expert" said a statement about how the "U.S. couldn't imagine the mass deportation of Jews to areas just for them to die" Me: Have we already forgotten about the Trail of Tears and the Native Americans?

    Poništi
  10. 6. sij

    A phenomenal documentary on the Holocaust from called "We Shall Not Die Now". Strongly encourage watching it!

    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.

    You know you can embed C# in a PowerShell script, (but the PowerShell scanning and logging makes it no longer great for hacking, not to mention that it internally compiles and loads a .dll) but did you know about the C# REPL scriptcs? - Known good EXE/DLL's - No AMSI, logging...

    Prikaži ovu nit
    Poništi
  12. 23. pro 2019.

    This is a humbling post. I found this bug a year ago and couldn't figure out the last digits of the file (which was the PID) and gave up. Lesson learned here, don't give up! Follow your instincts.

    Poništi
  13. proslijedio/la je Tweet
    14. pro 2019.

    Bash one liner to take screenshot of web services running on an IP range. IP="192.168.0"; for p in '80' '443'; do for i in $(seq 0 5); do TAKE_SS=$(cutycapt --url=$IP.$i:$p --out=$IP.$i:$p.png); done; done 😃

    Poništi
  14. proslijedio/la je Tweet
    13. pro 2019.

    The CVE-2019-18935 is a severe insecure deserialization vulnerability affecting UI. Understand its impact + learn to safely patch your software in this post from : (With thanks to + )

    Poništi
  15. proslijedio/la je Tweet
    3. pro 2019.

    Today I'm releasing a novel DNS covert channel implant. Everything is done over encoded AAAA requests (hostnames) and responses (IPv6 addresses) so it evades existing DNS detections. Low bandwidth, 100% Python3 with no dependencies, run it anywhere

    Poništi
  16. proslijedio/la je Tweet
    3. pro 2019.

    I was today years old when I learnt that you can run ELF using ld-linux. Useful when the executable bit is not set (and you can't change it).

    Poništi
  17. proslijedio/la je Tweet
    29. stu 2019.

    Pour le week-end, voici un nouvel article présentant une technique pour lire le contenu d'un dump de lsass **à distance**, évitant ainsi la détection des AV () et le téléchargement de dumps volumineux (80-150Mo). Bon week-end ! 🙃

    Poništi
  18. 27. stu 2019.

    Make that 19 now.

    Prikaži ovu nit
    Poništi
  19. 26. stu 2019.

    The moment one pentest brings you 17 0-days in less than a week.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    24. stu 2019.

    Wanna pimp up your reverse shell netcat listener ? Enter: rlwrap ! Now you can use Ctrl-R, Up, Down and all of readline's glory in netcat : rlwrap nc -l -p 443

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·