zǝɹosum0x0 

@zerosum0x0

chaotic neutral script kitty PGP=F19F6101F199AE16 blockchain/MLAI/IoT next-gen expert C++2a/Fortran/Rust zealot

0xffdffc50
Vrijeme pridruživanja: studeni 2014.

Tweetovi

Blokirali ste korisnika/cu @zerosum0x0

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zerosum0x0

  1. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    6. sij

    you can hunt for comsvcs_lsass memdump module via sysmon 10 and trgt image eq "lsass.exe" and calltrace contains "comsvcs.dll"

    Poništi
  3. 7. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    2. stu 2019.

    Awesome time at today! Here are the slides from my talk on "ATT&CKing with EQL".

    Poništi
  5. proslijedio/la je Tweet
    2. stu 2019.
    Poništi
  6. 23. lis 2019.
    Poništi
  7. proslijedio/la je Tweet
    3. lis 2019.

    Fresh module based on research from gets RCE and executes a payload against the Equation Group's DOUBLEPULSAR implant for SMB.

    Poništi
  8. 6. ruj 2019.
    Poništi
  9. proslijedio/la je Tweet

    Earlier this year Symantec revealed that APT3 was using NSA-like exploits in 2016, before The Shadow Brokers' leak. Our researchers took a technical deep dive to the Chinese exploits to explain how that might have happened.

    Poništi
  10. proslijedio/la je Tweet
    Poništi
  11. 31. srp 2019.

    RE: . I performed a full knowledge transfer of my notes/code to the MSF core team. The release timeline is out of my hands and up to Rapid7 discretion. I've been too busy to work on it for over a month anyways; fresh eyes and polish. Thanks for understanding.

    Poništi
  12. proslijedio/la je Tweet
    4. lip 2019.

    NSA is raising their own concern that the Microsoft RDP flaw () is of significant risk to unpatched systems. Patch and protect!

    Poništi
  13. 4. lip 2019.

    Rough draft MSF module. Still too dangerous to release, lame sorry. Maybe after first mega-worm? 🚨 PATCH CVE-2019-0708 🚨 35c2571801b3b6c4297ed362cf901dc4e907ff32a276fb6544a2b9d0f643f207

    Poništi
  14. 2. lip 2019.

    In past days we have a reliable pool spray to create fun+dangerous kernel primitives. The exploit chains we've worked so far are XP specific and admittedly clumsy but confirm RCE threat is real. 2ddd36d9023140eb160b4edab83874c8040ae2503da869b7850ded8768c423ca

    Poništi
  15. 30. svi 2019.
    Poništi
  16. proslijedio/la je Tweet
    24. svi 2019.

    UPDATE: Fully vetted vulnerability scanner is now in . Great work & . As always, probing production networks must be done with caution. Do not go around scanning factory control equipment with brand-new modules.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    24. svi 2019.

    Landed. Thanks to the giant group of community testers and code reviewers, and to and for the excellent contribution.

    Poništi
  18. proslijedio/la je Tweet
    24. svi 2019.

    The CVE-2109-0708 scanner by & has landed in Metasploit's repo. I expect it to evolve and improve over the next weeks. Fantastic work by both of them.

    Prikaži ovu nit
    Poništi
  19. 23. svi 2019.

    Koadic will be at Black Hat Arsenal USA this year. and I will demonstrate some of the new features/modules we've added and talk about some interesting technical challenges we've had to solve over the past two years since release.

    Poništi
  20. proslijedio/la je Tweet
    23. svi 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·