manoj

@ticqm

I spend most of my time in reading security related stuff

India
Vrijeme pridruživanja: prosinac 2010.

Tweetovi

Blokirali ste korisnika/cu @ticqm

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ticqm

  1. proslijedio/la je Tweet
    22. sij

    progressing through the Hacksys Extreme Vulnerable Driver exploits here: . huge thanks to the sourced authors, feels very silly to write my own blogs on the subject compared to their material/experience,but helps me learn. mb helpful for other noobs like me

    Poništi
  2. 21. sij
    Poništi
  3. proslijedio/la je Tweet
    11. sij

    Article: "Learning miasm: Part 1: Loading a PE"

    Poništi
  4. proslijedio/la je Tweet
    6. sij
    Poništi
  5. proslijedio/la je Tweet
    6. sij

    BlackBag Technologies, Inc. is looking for: Digital Forensic Examiner

    Poništi
  6. proslijedio/la je Tweet
    2. sij

    lsassy 1.0.0 is finally out ! 🔸 Remotely dump **with built-in Windows tools only**, procdump is no longer necessary 🔸 Remotely parse lsass dumps to extract credentials 🔸 Link to to detect compromised users with path to Domain Admin

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    3. sij

    This image is probably way too small to read, but here's an example from the new Facebook Graph Search. This is - more or less - the process I used to take what FB sent in the background and pull out the base64/JSON-parts related to search.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    29. pro 2019.

    An attacker logged into the RDP Honeypot a few weeks ago and was able to dump credentials and move laterally in 36 minutes. They used Advanced Scanner + ProcDump + PsExec to move laterally to a Domain Controller.

    Poništi
  9. proslijedio/la je Tweet
    29. pro 2019.

    Open source RAT collection, and malicious RAT analysis reports.

    Poništi
  10. proslijedio/la je Tweet
    30. pro 2019.

    Detection Lab Collection of Packer & Vagrant scripts that quickly bring a Windows AD online, complete with a collection of endpoint security tooling & logging best practices 😎 WriteUp Code

    Poništi
  11. proslijedio/la je Tweet

    Just posted Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps

    Poništi
  12. proslijedio/la je Tweet
    25. lip 2019.

    For $10 on , you can setup a Ubuntu instance with and v2 dataset. Here's how:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    28. pro 2019.

    Write-up for 10 linux privilege escalation challenges I made for NuitDuHack2018.

    Poništi
  14. proslijedio/la je Tweet

    PE Import Table hijacking as a way of achieving persistence/exploiting DLL side loading (Christmas blog post 😉):

    Poništi
  15. proslijedio/la je Tweet
    26. pro 2019.

    serving as part of the latest campaign. b590755cd6fa8ab3d6c5a8702fa41249d3361749b0a0609dc4c0383c76ad5358

    Poništi
  16. proslijedio/la je Tweet
    22. tra 2015.
    Poništi
  17. proslijedio/la je Tweet
    Poništi
  18. proslijedio/la je Tweet
    23. pro 2019.

    The authors of the framework have released a new version with enhanced windows evasion and /S randomisation to evaluate network based detection. It might be a busy holiday for staff 😒

    Poništi
  19. proslijedio/la je Tweet
    22. pro 2019.

    Friends, VXUG is scouting additional content. We're looking for papers related to: -Malware Dev -Malware RE -OS Internals -Rootkits/Bootkits -Antivirus related papers If you have a paper you'd like to submit to us please DM me. Retweets appreciated to increase exposure.

    Poništi
  20. proslijedio/la je Tweet
    23. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·