Tweetovi

Blokirali ste korisnika/cu @sean0bailey

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sean0bailey

  1. proslijedio/la je Tweet
    4. velj

    A few thoughts about the Iowa Caucuses: what we are seeing there is part of a larger shift, the same thing that happened with the Boeing 737 max, the MiDAS software that wrongly kicked 20k people off of unemployment in Michigan. We are seeing over and over the replacement of

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 21 sat

    i've written a working exploit for sudo vulnerability CVE-2019-18634. if you have "Defaults pwfeedback" (apparently the default in Linux Mint and derivatives), any user can become root without any password, even if they're not in /etc/sudoers

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    4. velj
    Odgovor korisnicima

    Few lines of code to get CME with python3 🐰 git clone --recursive && cd CrackMapExec git checkout python3 git submodule update --recursive python3 install cme

    Poništi
  4. proslijedio/la je Tweet
    prije 12 sati

    FWIW, I will be working on updating the unc0ver jailbreak for iOS 13.0-13.3 as soon as the new kernel exploit is available. For now, make sure that automatic software updates are disabled on your device and save blobs for iOS 13.3.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    prije 11 sati

    checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. velj

    The Iowa caucus debacle is about rapid reporting of results, not about voting itself. Please keep those two things separate. The votes are backed on paper. The problem was the delivery system for reporting results quickly.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    There are now reports that the app that caucus leaders are using to report Iowa results isn't working. Nobody knows who owns the app and there were major security concerns:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  10. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  11. proslijedio/la je Tweet
    2. velj

    Fun fact: That job screening company that scans Twitter accounts for bad words has developers that commit plaintext passwords on GitHub. ... Maybe they're scanning the wrong website.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    3. velj

    GitHub - mufeedvh/CVE-2019-8449: CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4 -

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    FakeLogonScreen - A utility to fake the Windows logon screen in order to obtain the user's password. The password entered is validated against the Active Directory or local machine to make sure it is correct and is then saved to disk.

    Poništi
  14. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    Talking to some ppl it seems to me this is widely misunderstood. CVE-2019-1372 is an RCE with NT_AUTHORITY\SYSTEM privs on *Azure Cloud* itself (!!!) (and not only on Azure Stack on-prem solution). And yes, it’s a big deal.

    Poništi
  16. proslijedio/la je Tweet
    29. sij

    We have just pushed some *big* updates to Ghostwriter's master branch that I think you'll like. We've got WYSIWIG editors, autocomplete, new reports, and more! Check it out:

    Poništi
  17. proslijedio/la je Tweet
    30. sij
    Poništi
  18. proslijedio/la je Tweet
    29. sij

    ffuf 1.0 released! phew, this is a big one. Feature highlights in this thread Huge thanks for all the contributors, and special thanks to for pulling off a feature bounty and for fulfilling it in a record time (and contributing said bounty to charity).

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    29. sij
    Poništi
  20. proslijedio/la je Tweet

    SharePoint vulnerability CVE-2019-0604 from a year ago has been used to hack the UN. Three different UN agencies got owned, about 20 domain admin accounts accessed and implants on 40 servers. They didn’t disclose.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·