Tweetovi

Blokirali ste korisnika/cu @reni_ni

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @reni_ni

  1. proslijedio/la je Tweet
    27. sij

    Windows Kiosk breakout tip: If you get a Printing panel, and the traditional methods don't work: Amongst the printers, select "SendTo OneNote" OneNote will launch -> Add new notebook On the Notebook -> New page Type: \\127.0.0.1\c$\windows\system32\cmd.exe Click the link

    Poništi
  2. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    19. pro 2019.

    the cool thing about those 2 newly introducted MS security eventid 4799, 4798 is that they will capture any local group/user discovery attempts even if done via winapis, below an e.g. with the checkadmin.exe custom recon tool referenced in Operation Wocao :D

    Prikaži ovu nit
    Poništi
  4. 19. pro 2019.

    Look what arrived in the mail today! 🤘🏼🥳. Another one bites the dust, whoop whoop. Thank you , for yet another awesome course! Very proud of this cert. Now onto more exploit dev and rop chaining for OSEE.... 🤯

    Poništi
  5. proslijedio/la je Tweet
    11. pro 2019.

    dotnet.exe [PATH_TO_DLL] Its just like doing python . (funny) dotnet.exe is trusted binary and Default AppLocker rule don't block it so its a valid AppLocker bypass. Similar to regasm.exe. CC

    Poništi
  6. proslijedio/la je Tweet
    10. pro 2019.

    DNS tunneling is not new again! I got ya covered. Detection with + ELK. Or whatever dns logs you got. Also, I discuss short comings w/ various detections. ie: Using “most unique subdomains” will probably lead to false positives in the real world

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    10. stu 2019.

    My talk slides for "Top Ten Active Directory Security issues, impact, & remediation" posted on . Thank you to everyone who joined me and overflowed the theater! Link to talk recording (audio with slides synched) as well.

    Poništi
  8. proslijedio/la je Tweet

    Because it keeps coming up, how about a thread on Emoji in passwords. So we (and you) can link to it in the future. Should they be allowed? For all practical purposes they can't not be. So, yes. Should they be heavily warned against? Yes. But why? Well...

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    6. stu 2019.

    Slides and video of my talk "A year of hacking Azure AD" are online! Contains my exploration of the unofficial "1.61-internal" version of the Azure AD graph and the resulting vulnerabilities😃 Slides: Video:

    Poništi
  10. 6. stu 2019.

    Forensic techniques, modern malware and seeing CQURE edition in action, messing around with Cached Logon credentials. Thanks for 3 awesome talks today!

    Poništi
  11. proslijedio/la je Tweet
    5. stu 2019.

    Burp Suite Pro 2.1.05 released, with experimental support for using Burp's embedded Chromium browser to perform all navigation while scanning. This new approach will provide a robust basis for future capabilities. Feedback welcome if you want to play now.

    Poništi
  12. proslijedio/la je Tweet
    5. stu 2019.

    you can create a dump whitelisting rule to prevent execution from ADS, process_name like "*:*" block (verified it as a hunt on prod, 0 hits), se.g. Bitpaymer ransom use this.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. lis 2019.

    Going to Microsoft Ignite? My session is about a week away! I will cover the Top ~10 issues we () discover during Active Directory Security Assessments for customers. Also covered is the impact and remediation of these issues.

    Poništi
  14. proslijedio/la je Tweet
    13. lis 2019.

    Detect suspicious keyboard layout loads with this config & Sigma rule > Example: Allows you to detect CN 🇨🇳, VN 🇻🇳, IR 🇮🇷 remote users that connect to your servers maintained by US 🇺🇸 staff only Sysmon Config Sigma Rule

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    Ever wondered what lies beneath that cool looking chip on your bank card? What does it do? Why is it there? Well here's a little pointless thread that delves into the magic using my card as an example

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    28. ruj 2019.
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    18. ruj 2019.

    Retweet if you have taken down a network. I’ll go first.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    27. kol 2019.
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    17. kol 2019.

    Responder 2.3.4.0 has been released. This version includes a rogue RDP server supporting RDP clients ranging from Windows7 to Windows 10 (tested) and since MSFT recommends enforcing NLA, Responder collects these NLA NTLM hashes :) Enjoy!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·