|
0xbc
@
cheneyben
Adelaide, Australia
|
|
How you are is not who you are.
|
|
|
1.417
Tweetovi
|
568
Pratim
|
347
Osobe koje vas prate
|
| Tweetovi |
|
0xbc
@cheneyben
|
24. sij |
|
I seriously want to hear this sermon. I'd even stand through all of Oceans for it. pic.twitter.com/l9fDRcuyIx
|
||
|
|
||
| 0xbc proslijedio/la je tweet | ||
|
Josh Green
@_josh_green
|
21. sij |
|
Really looking forward to attending @BSidesCbr and happy to be presenting this year! twitter.com/BSidesCbr/stat…
|
||
|
|
||
|
0xbc
@cheneyben
|
15. sij |
|
Thanks kindly for the welcome - it's been great getting to know the team, looking forward to getting stuck in!
|
||
|
|
||
|
0xbc
@cheneyben
|
13. sij |
|
Tired: running a Citrix honeypot.
Wired: catching attackers with firewall 0days AND running a Citrix honeypot.
|
||
|
|
||
|
0xbc
@cheneyben
|
6. sij |
|
"Click Enter To Ping The IP"
|
||
|
|
||
|
0xbc
@cheneyben
|
4. sij |
|
Office definitely has its own set of related issues such as macros, but also many signed binaries and scripts that are bundled with the OS can be used to run arbitrary code - check out lolbas-project.github.io for several examples.
|
||
|
|
||
|
0xbc
@cheneyben
|
4. sij |
|
one very common technique is to use applications that are trusted by the whitelisting policy to run arbitrary code (sometimes known as "lolbins"). I also often encounter policies which whitelist paths that can be written to.
|
||
|
|
||
| 0xbc proslijedio/la je tweet | ||
|
Chancellery of the Prime Minister of Poland
@PremierRP_en
|
29. pro |
|
Statement by the Prime Minister of Poland Mateusz Morawiecki. pic.twitter.com/l0Y2ApEhd9
|
||
|
|
||
|
0xbc
@cheneyben
|
28. pro |
|
I'll get you next time, scotchie! *shakes fist*
|
||
|
|
||
|
0xbc
@cheneyben
|
28. pro |
|
which one's mine?
|
||
|
|
||
|
0xbc
@cheneyben
|
28. pro |
|
the chat is pretty active on @TheColonial's streams, but there are a lot of lurkers too (e.g. me). I'm also usually doing housework or something at the same time 😬
|
||
|
|
||
| 0xbc proslijedio/la je tweet | ||
|
Faith
@farazsth98
|
13. pro |
|
As I've recently gotten into browser exploitation, I thought I'd solve and do a writeup for a CTF challenge from earlier this year that really doesn't have any detailed writeups.
Hope someone finds my writeup for *CTF 2019 oob-v8 useful! DMs are open.
syedfarazabrar.com/2019-12-13-sta…
|
||
|
|
||
|
0xbc
@cheneyben
|
14. pro |
|
Have a contact who has had their business hosed by Roger ransomware - is anyone aware of this variant, whether there are any viable options for data recovery, what other families it might be related to, etc?
|
||
|
|
||
|
0xbc
@cheneyben
|
26. stu |
|
Also, the video is perfect. Thank you! #TheComing
|
||
|
|
||
|
0xbc
@cheneyben
|
26. stu |
|
That poem gets better every time I read it. 🤔 #TheComing
|
||
|
|
||
|
0xbc
@cheneyben
|
9. stu |
|
Most 🔥 thing at the @ADLPageant - the guy on the cricket float miming underarm bowling actions. #toosoon
|
||
|
|
||
|
0xbc
@cheneyben
|
4. stu |
|
School Days?
|
||
|
|
||
| 0xbc proslijedio/la je tweet | ||
|
Ori Damari
@0xrepnz
|
26. lis |
|
While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization.
I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:
repnz.github.io/posts/reversin… pic.twitter.com/RufA3fHDa4
|
||
|
|
||
| 0xbc proslijedio/la je tweet | ||
|
Adel
@0x4D31
|
18. lis |
|
Here are some resources re my talk at @kawaiiconNZ✨:
- RDP Fingerprinting: medium.com/@0x4d31/rdp-cl…
- FATT; my py script for extracting fingerprints from pcap or live traffic: github.com/0x4D31/fatt
- Tweet coverage of the talk: twitter.com/jpdanner/statu… #Kawaiicon #KawaiiconNZ pic.twitter.com/Iej5u89PUW
|
||
|
|
||
| 0xbc proslijedio/la je tweet | ||
|
David French
@DavidAFrench
|
8. lis |
|
This is marvelous. twitter.com/TheEllenShow/s…
|
||
|
|
||