Tweetovi

Blokirali ste korisnika/cu @yaniv_see

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @yaniv_see

  1. proslijedio/la je Tweet

    operation uses mshta dl/exec HTA w/ VBScript from C2 mail[.]googleupload[.]info, persistence w/ Xbox.lnk in startup w/ mshta to ac-2501[.]amazonaws1[.]info. Backdoor dropped in %TEMP%/uvanqvw.vbs w/ C2 103.205.179.4. Analysis/IOCs:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 8 sati

    This is OUTSTANDING work, Riccardo! Having this information in the BloodHound database is extremely powerful.

    Poništi
  3. proslijedio/la je Tweet

    The most exploited vulnerabilities by consists of "two vulnerabilities in Adobe Flash Player, four vulnerabilities affecting Microsoft’s IE browser, three MS Office flaws and one WinRAR" via

    Poništi
  4. proslijedio/la je Tweet

    Absolutely fantastic post by . As a defender, highly detailed breakdowns of the precise operation of malware with annotated decompilations is greatly appreciated.

    Poništi
  5. proslijedio/la je Tweet
    prije 15 sati

    Secret's out! announces the release of the TrustedSec Community Guide. Discover the vision for making the guide and how you can contribute to making the best for all things sysmon!

    Poništi
  6. prije 9 sati

    A Red Teamer’s Guide to GPOs and OUs

    Poništi
  7. prije 9 sati

    Windows Red Team Cheat Sheet:

    Poništi
  8. prije 9 sati
    Poništi
  9. proslijedio/la je Tweet
    4. velj

    Shoutout to 's for his awesome blog on and how can help. If you read one thing today... make it this:

    Poništi
  10. proslijedio/la je Tweet
    prije 14 sati
    Poništi
  11. proslijedio/la je Tweet
    prije 13 sati

    We are hosting a webinar on Tuesday, February 11th to release 3.0 and discuss some of the new attack primitives being introduced. and will be talking through the update. Sign up here:

    Poništi
  12. proslijedio/la je Tweet
    prije 13 sati

    Capability Abstraction - cool post by ⁦⁩ on detection engineering. Really like the abstraction map concept.

    Poništi
  13. proslijedio/la je Tweet
    prije 21 sat

    Some binaries which have known UAC bypass techniques. wusa WSReset winsat tzsync TpmInit taskhost SystemPropertiesAdvanced sysprep svchost slui setupsqm sdclt schtasks rstrui recdisc pkgmgr osk oobe msconfig mmc migwiz mcx2prov iscsicli inetmgr GWXUXWorker fodhelper EventVwr

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    6. velj

    v1.4.0 has been released with few updates to the function, including dark mode. We will be showing a demo at - the Japan Pavillion #2245 in South Expo. ^YU Tool download: RSA Conference:

    Poništi
  15. proslijedio/la je Tweet
    30. lis 2019.

    Summarized some of the events I've posted before (some are less known) Slides can be found here -> 😀

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    5. velj

    Here’s a complete port of ’s Seatbelt from the GhostPack toolkit to Boolang ( cause why not ). This has been in SilentTrinity for a while but it might be useful standalone.

    Poništi
  17. proslijedio/la je Tweet
    5. velj

    Automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.

    Poništi
  18. proslijedio/la je Tweet
    5. velj

    some exploits tend to load directly ntoskrnl.exe (indows Kernel) to do some offsets calcs for some critical kernel structs or global vars ... in normal condition this should be rare so won't harm to add it to your sysmon/EDR config.

    Poništi
  19. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  20. proslijedio/la je Tweet
    4. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·