unkn0wnFalleN

@unkn0wnFalleN

IT Security and all the other funny stuff.

Vrijeme pridruživanja: siječanj 2018.

Tweetovi

Blokirali ste korisnika/cu @unkn0wnFalleN

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @unkn0wnFalleN

  1. proslijedio/la je Tweet
    Poništi
  2. proslijedio/la je Tweet
    29. sij

    New from - Ghostwriter received an update today. A WYSIWYG editor, updated domain tracking, and auxiliary server addresses. Read more here: Project link:

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    This never gets old, so I'll never stop periodically sharing it.

    Poništi
  4. proslijedio/la je Tweet
    30. sij
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Wow! "Resources for Beginner Bug Bounty Hunters" has over 1000 stars on GitHub now and we just pushed a new update! Check it out:

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    28. sij

    Windows Defender got you feeling down? Here is a simple trick to load your meterpreter payloads past Windows Defender

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    28. sij

    tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS.

    Poništi
  11. proslijedio/la je Tweet
    24. sij

    Some new obfuscation techniques in today's campaigns 🧐. Here is a deeper look a the maldocs.👇

    Poništi
  12. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  13. proslijedio/la je Tweet
    27. sij

    New speculation vulnerability, Cacheout

    Poništi
  14. proslijedio/la je Tweet
    27. sij
    Poništi
  15. proslijedio/la je Tweet
    27. sij
    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Spotify DRM Bypass + PoC

    Poništi
  17. proslijedio/la je Tweet
    18. sij

    New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674

    Poništi
  18. proslijedio/la je Tweet
    17. sij

    My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    17. sij

    Corsy 1.0-beta is out 🔥 It comes with mass scanning, json output, custom headers support and bug fixes. Like my content and want more? Become a patron:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    That epic Microsoft moment❤️ Recently worked on and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·