Tweetovi

Blokirali ste korisnika/cu @withdk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @withdk

  1. proslijedio/la je Tweet

    So, there is Exploit:Win32/CVE-2020-0601.D for Microsoft certificates, and Exploit:Win32/CVE-2020-0601.E for "the others"

    Poništi
  2. proslijedio/la je Tweet
    18. sij

    ": a Stealthy Lateral Movement Strategy" is now available to read Read if interested to see a new practical lateral movement Demo (TDS (MS SQL) & FTP): Prototype will be released soon

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    Phenomenal use of to find APT C2 infrastructure. This whole thread is worth reading but this tweet is my favorite.

    Poništi
  4. proslijedio/la je Tweet

    added a new option to one of my favorite hidden gems: 'shodan domain' now has a -D flag which will lists open ports on each IP (A records only right now). It slows down the output, so -S will let you save to a file for future use. 👍👍

    Poništi
  5. proslijedio/la je Tweet
    19. stu 2019.

    If you’re into writing or detecting maldocs and you haven’t looked at ViperMonkey, look now: I’m told it’s now used by Project Zero and DoD. One of the primary authors is a associate and a good person to follow:

    Poništi
  6. proslijedio/la je Tweet
    19. stu 2019.

    ANNOUNCEMENT: Now open sourcing - coverage guided for . Ported from our which in turn inspired by go-fuzz which is in turn inspired by AFL:)

    Poništi
  7. proslijedio/la je Tweet
    19. stu 2019.

    My hats off to for releasing their SOW, language, MSA language and "get out of jail" letter to help consultants protect themselves from situations like what recently happened to the 2 Coalfire pentesters in Iowa recently: .

    Poništi
  8. proslijedio/la je Tweet
    14. stu 2019.
    Poništi
  9. proslijedio/la je Tweet

    Github announced amazing tool to help find vulns. Makes it free for research and opensource projects. People: waaaah, not using atom in examples, waaaaah disappointed, mumble groan. you can't win, no matter how much good you try and do.

    Poništi
  10. proslijedio/la je Tweet
    17. stu 2019.

    Defenders should deploy this settings: HKLM\SYSTEM\CurrentControlSet\Control\Lsa Dword: RunAsPPL Value: 1 Protects dumping of Lsass with a simple registry value. Encountered that on an engagement recently. 🤯 Mimikatz driver needed to bypass Details

    Poništi
  11. proslijedio/la je Tweet
    18. stu 2019.

    Examples of leaking Kernel Mode information from User Mode on

    Poništi
  12. proslijedio/la je Tweet
    18. stu 2019.

    Either you are an attacker or defender, detecting privilege relationships in AD connected data is easy to do w/ BloodHound! What about notebooks to complement the data analysis and viz 📊 of graph data? cc: 🍻

    Poništi
  13. proslijedio/la je Tweet
    18. stu 2019.

    The BabyKernel Windows exploitation challenge from last week's is up on GitHub:

    Poništi
  14. proslijedio/la je Tweet
    17. stu 2019.

    On to part 2 in my series on AppLocker internals. This time I go into how AppLocker blocks process creation (or does it?), and some of the ways that you can opt-out of AppLocker if you're special enough.

    Poništi
  15. proslijedio/la je Tweet
    16. stu 2019.

    Published part 1 of a short series on AppLocker internals, no bypasses, just how the technology actually works on Windows 10 1909 and maybe some silly tricks along the way.

    Poništi
  16. proslijedio/la je Tweet
    16. stu 2019.

    I wrote up a quick POC, RemoteViewing, to demo RDP credential theft (adapted from post => ) using EasyHook and Donut ☠️🖥️. More details on GitHub =>

    Poništi
  17. proslijedio/la je Tweet
    12. stu 2019.

    I published yet another article about Cache Probing Attack! Today I discovered that the report has been indexed by crawlers, so I reached out to and with his approval, created a short article about my findings :)

    Poništi
  18. proslijedio/la je Tweet
    12. stu 2019.

    Oooh this is cool research by , NTLM reflection is back by waiting for the NTLM challenge cache entry to timeout... awesome post

    Poništi
  19. proslijedio/la je Tweet
    11. stu 2019.

    Bleak, DLL injection framework =>

    Poništi
  20. proslijedio/la je Tweet
    3. ožu 2015.

    Advice for the aspiring Pentester: Put down the books and pick up Windows Internals. There's opportunity on every page.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·