Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @theGodKilla
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @theGodKilla
-
Jason Allen proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZurehttps://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Move Faster, Stay Longer https://posts.specterops.io/move-faster-stay-longer-6b4efab9c644 … blog about extending CS and tools to go with it.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Learn Reversing/Bin Exploitation: https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN … Practice: https://2019game.picoctf.com/ https://247ctf.com/ Great content about it: https://www.youtube.com/user/GynvaelEN Learn x64 Assembly(MASM): https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA … Thanks guys <3
@LiveOverflow@gynvael@WhatsACreelPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Revisiting RDP lateral movement https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 … and releasing a project that will be part of a bigger tool coming next week
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Slides from my Red Team Methodology - A Naked Look talk.
#DerbyConhttps://www.slideshare.net/JasonLang1/red-team-methodology-a-naked-look-169879355 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Just published a blog explaining the root cause of the recent
#win10 crypto vulnerability (CVE-2020-0601 /#curveball ?) using some "Load Bearing Analogies" to make it more accessible. CC:@tqbf@grittygrease@dakamihttps://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
#BlueTeam BlueTeam CheatSheet * CVE-2020-0601 * crypto32.dll (Expect updates any time of the day, enjoy your first 2020 PT
)
https://gist.github.com/SwitHak/62fa7f8df378cae3a459670e3a18742d …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
CVE-2019-19781 post-exploitation notes: If you are seeing attackers reading your /flash/nsconfig/ns.conf file then you need to change all passwords. The SHA512 passwords are easily crackable with hashcat.pic.twitter.com/mNMaTT1oCE
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Looking for a python challenge over the holiday break? Here is my python CTF challenge that can be solved more than one way:https://github.com/malware-unicorn/BeatSaberCTFChallenge …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
The recording of my
#36c3 lightning talk about my Binary Analysis Course can be found here: https://media.ccc.de/v/36c3-10524-lightning_talks_day_2#t=6537 … The slides can be found here: https://maxkersten.nl/wp-content/uploads/2020/01/36c3-lightning-talk-binary-analysis-course.pdf …pic.twitter.com/OHXTP0d87S
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Spray-AD, a new
@OutflankNL Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).https://github.com/outflanknl/Spray-AD …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
A lot of mud slinging on InfoSec twitter lately; I wanted to flip the script a bit and highlight the blogs, tools, talks etc that I keep coming back to on a regular basis, both as a defender and general InfoSec professional. Thread..
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
I have published a blog post: "Active Directory Security Fundamentals" - It contains a PDF with hands-on recommendations that you use to secure AD.https://identityaccess.management/2019/12/30/active-directory-security-fundamentals/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
The offensive security community means a lot to me. Following
@Antonlovesdnb's great thread that injected some much needed infosec positivity, I wanted to highlight a few (offensive-ish) posts/talks that my team and myself enjoyed over the last year or so.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. https://tyranidslair.blogspot.com/2020/01/empirically-assessing-windows-service.html … h/t
@cesarcerHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
How to prepare a dll to be loaded into LSASS with protection mode? -Get an EV Code signing cert (300$) -Open a MS partner account -add the "hardware" program -go to "file signing service" - prepare a cab containing the dll - sign the cab with your cert - submit and wait 1 hourpic.twitter.com/kVnGROF4Bv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): https://github.com/0xdidu/Reverse-Engineering-Intel-x64-101 … Hoping to spread the RE fever :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jason Allen proslijedio/la je Tweet
From dropbox(updater) to NT AUTHORITY\SYSTEM http://decoder.cloud/2019/12/18/from-dropboxupdater-to-nt-authoritysystem/ …pic.twitter.com/oE18Y62hn3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.