Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @spotheplanet
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @spotheplanet
-
Prikvačeni tweet
A few notes on dumping lsass.exe while bypassing Cylance and Windows API unhooking with some C++ https://ired.team/offensive-security/bypassing-cylance-and-other-avs-edrs-by-unhooking-windows-apis …pic.twitter.com/hksHShyFYd
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
spotless proslijedio/la je Tweet
I added a mimikatz MemSSP style hook to Fermion, you can check out the code here => https://github.com/FuzzySecurity/Fermion/blob/master/Examples/MemSSP.js … This is based on the great write-ups by
@spotheplanet &@_xpn_pic.twitter.com/8Ny4lsc2Bj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
spotless proslijedio/la je Tweet
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZurehttps://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Maybe will be useful to someone at some point: Pulling Web Application Password by Hooking HTML Input Fieldhttps://ired.team/offensive-security/credential-access-and-credential-dumping/stealing-web-application-credentials-by-hooking-input-fields …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A quick note on the last code injection this yearhttps://ired.team/offensive-security/code-injection-process-injection/addressofentrypoint-code-injection-from-an-injected-dll …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some technical notes on how Windows rootkits hide processes from userland programshttps://ired.team/miscellaneous-reversing-forensics/windows-kernel/manipulating-activeprocesslinks-to-unlink-processes-in-userland …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
spotless proslijedio/la je Tweet
Just published some thoughts on red teaming, how to approach it, procure it and get in to it...https://link.medium.com/eV1myC6NM2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some notes on a couple of ways kernel exploits abuse process tokens for privilege escalationhttps://ired.team/miscellaneous-reversing-forensics/windows-kernel/how-kernel-exploits-abuse-tokens-for-privilege-escalation …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some notes after exploring the Interrupt Descriptor Table in Windows Kernelhttps://ired.team/miscellaneous-reversing-forensics/windows-kernel/interrupt-descriptor-table-idt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some notes on an Import Address Table (IAT) Hookinghttps://ired.team/offensive-security/code-injection-process-injection/import-adress-table-iat-hooking …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
spotless proslijedio/la je Tweet
Look for a juicy
#redteam TTPs repo ? https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques … - http://ired.team contents in 1@HackwithGithub repo :D thx@spotheplanet for sharingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some notes on System Service Dispatch Table in Windows Kernelhttps://ired.team/miscellaneous-reversing-forensics/windows-kernel/glimpse-into-ssdt-in-windows-x64-kernel …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some notes on API hooking for offensive tooling. Credits to
@0x09AL and his nifty RdpThief!https://ired.team/offensive-security/code-injection-process-injection/api-monitoring-and-hooking-for-offensive-tooling …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
spotless proslijedio/la je Tweet
New blog post by
@0x09AL on extracting clear-text credentials from RDP using RdpThief https://www.mdsec.co.uk/2019/11/rdpthief-extracting-clear-text-credentials-from-remote-desktop-clients/ …pic.twitter.com/yjzPtHzKXC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New note: Enumerating RWX Protected Memory Regions for Code Injection https://ired.team/offensive-security/defense-evasion/finding-all-rwx-protected-memory-regions …pic.twitter.com/4xtbvGAMe4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A quick note on how to prevent 3rd party DLLs from injecting into your malwarehttps://ired.team/offensive-security/defense-evasion/preventing-3rd-party-dlls-from-injecting-into-your-processes …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A quick note on Injecting Portable Executables to Remote Processeshttps://ired.team/offensive-security/code-injection-process-injection/pe-injection-executing-pes-inside-remote-processes …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A quick note on code execution via Control Panel items:https://ired.team/offensive-security/code-execution/executing-code-in-control-panel-item-through-an-exported-cplapplet-function …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My notes on Reflective DLL Injection including a simplified POC:https://ired.team/offensive-security/code-injection-process-injection/reflective-dll-injection …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.