Vanitas

@vanitasnk

CVE Researcher - Secure D Co,Ltd., Cybersecuritt Researcher - ITSelectLab Blogging

Vrijeme pridruživanja: svibanj 2018.

Tweetovi

Blokirali ste korisnika/cu @vanitasnk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vanitasnk

  1. Prikvačeni tweet
    10. pro 2019.

    Thanks to Adobe Inc. for acknowledge us on their security advisory (APSB19-58) on Adobe Tuesday December 2019 updates.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  3. proslijedio/la je Tweet

    Small POC in powershell exploiting hardlinks during the VM deletion process

    Poništi
  4. 1. velj
    Poništi
  5. proslijedio/la je Tweet
    1. velj
    Poništi
  6. proslijedio/la je Tweet

    SQLi-Hunter is a simple HTTP proxy server and a SQLMAP API wrapper that makes digging SQLi easy.

    Poništi
  7. 31. sij

    Duplicated again. But it was a good finding for my first submission on H1. :) However, I wil try harder and looking forward to see my first triage on this platform.

    Poništi
  8. 31. sij
    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Poništi
  10. 29. sij

    Seem like impersonate into LOCAL SERVICE is look like not risky as SYSTEM privilege. But it had potential to impersonate privilege by token. Then if you can exploit impersonation into LOCAL SERVICE, it should be the good way to open your sight.

    Poništi
  11. proslijedio/la je Tweet
    29. sij

    HEVD -- Arbitrary Write, Win7 x86 thanks to all the sourced bloggers, content producers, elders

    Poništi
  12. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.

    Poništi
  14. proslijedio/la je Tweet
    27. sij

    [PoC] MS-Windows Local Vulnerabilities Collection cve-2019-14969 cve-2019-5701 cve-2019-1378 cve-2019-12757 cve-2019-13382 cve-2019-13142 cve-2019-19248 cve-2019-0841 cve-2018-0952 cve-2019-5674 cve-2019-19363 cve-2019-1405 cve-2019-1322 CVE-2019-12758

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  15. proslijedio/la je Tweet
    25. sij

    Good whitepaper about windows 10 secure kernel: "Live forensics on the Windows 10 securekernel (2017)"

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!

    Poništi
  17. proslijedio/la je Tweet
    25. sij

    [Blog] Offensive Security - AWE/OSEE Review cc

    Poništi
  18. proslijedio/la je Tweet
    24. sij
    Poništi
  19. 24. sij

    I’m very disappointed from BugCrowd engineer. Their adjustment of risk level are poor. They didn’t have stand of risk assessment from their engineer Maybe i wouldn’t submit it in their private program anymore :(

    Poništi
  20. proslijedio/la je Tweet
    23. sij
    Poništi
  21. proslijedio/la je Tweet
    20. sij

    As promised, a short post on Hyper-V admin privesc: /cc

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·