Twitter | Pretraživanje | |
Michael Kruger
Security analyst at . Random code bits at
28
Tweetovi
170
Pratim
265
Osobe koje vas prate
Tweetovi
Michael Kruger 24. pro
Yay got a blackhat asia talk accepted :D.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger proslijedio/la je tweet
Dominic White 5. pro
I’ve been waiting for this for most of the year. Craig Koorn built a BloodHound for AWS IAM & related elements. Which finally just got a public release. Hugely useful for securing your AWS environments. cc
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger proslijedio/la je tweet
Ion Todd 5. pro
My close personal friend has been working on a tool to more accurately visualise effective access within AWS. We've found awspx to be really useful internally, we hope you do too.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 15. stu
Odgovor korisniku/ci @askpascalandy @leonjza @traefik
It's a single Auth for all your services using it, rather than basic Auth for each time you use a service.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 14. stu
Odgovor korisniku/ci @leonjza @traefik
The very beta thing I did is over here: , Ill probably move to yours tho and archive this one.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 25. srp
Published a little write up on the wpa_sycophant tool I created for relaying PEAP last year.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 23. srp
Odgovor korisniku/ci @_cablethief
Woops, add a "--network host" to that else you try connect to your containers network without a port forward.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 23. srp
Colleague needs to build and run a docker container while using capped internet. I suggested he build and run his docker on a jump box to save bandwidth. XD Dockerless docker.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 19. srp
Pretty cool episode from , I didn't realise that girl scouts had a cyber security badge :D
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 19. lip
Made a docker for doing SSH tunneling rather than setting up a new sshd and config every time. "Tried" to make it secure as well so you don't get pwned back if someone tries to log into you.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger proslijedio/la je tweet
mitt (alive) 22. svi
we are absolutely getting 5g and it is absolutely going to kill people
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 23. svi
Odgovor korisniku/ci @RoganDawes
This is what I used to do :D. But this is so much more convenient.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 23. svi
Odgovor korisniku/ci @_cablethief
For a once off: sudo sysctl net.ipv4.ip_unprivileged_port_start=0 For permanence add to sysctl.d config: sudo vim /etc/sysctl.d/allow_user_lower_ports.conf and add net.ipv4.ip_unprivileged_port_start=0
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 23. svi
Apparently well known, but in case you don't know, Linux provides a way to disable the privileged nature of sub 1024 ports. This allows you to run listeners, services, etc on sub 1024 ports without root/sudo. For a single user system where I spin up random services its perfect.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 21. svi
Odgovor korisniku/ci @_cablethief
Most of the hard work is from :D
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 21. svi
Created a small script to toggle unmanage interfaces (And reloads NetworkManagers config) so that NetworkManager is less annoying when its your turn with the interface.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 20. svi
Updated berate_ap with support for wpa_sycophant to make wireless relaying a bit easier. Some other new things are adding the certificate subj in command by , some WPA attack flags, Mana taxonomy, and coloured Mana output. :D
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger 29. tra
Two simple scripts and an explanation for sharing internet with a interface and creating a quick RADIUS server using hostapd-mana. I am torn on whether this should be a gist or a git /:
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger proslijedio/la je tweet
Dominic White 11. tra
Yeah! I'm really honoured to be offering our brand new Wi-Fi hacking course at The Excaliber in Vegas on 3-6 Aug 2019. If Wi-Fi isn't your thing, check out the badass courses from the other trainers.
Reply Retweet Označi sa "sviđa mi se"
Michael Kruger proslijedio/la je tweet
Dominic White 26. velj
If you want to extract the certificates used in EAP (TLS/PEAP/TTLS etc.) interaction, you can use this Useful for closing them with especially when going after macOS/iOS clients (who will present the cert details & ask the user).
Reply Retweet Označi sa "sviđa mi se"