Twitter | Pretraživanje | |
0xbc
How you are is not who you are.
1.417
Tweetovi
568
Pratim
347
Osobe koje vas prate
Tweetovi
0xbc 24. sij
Odgovor korisniku/ci @TheBabylonBee
I seriously want to hear this sermon. I'd even stand through all of Oceans for it.
Reply Retweet Označi sa "sviđa mi se"
0xbc proslijedio/la je tweet
Josh Green 21. sij
Really looking forward to attending and happy to be presenting this year!
Reply Retweet Označi sa "sviđa mi se"
0xbc 15. sij
Odgovor korisniku/ci @TSSCyber
Thanks kindly for the welcome - it's been great getting to know the team, looking forward to getting stuck in!
Reply Retweet Označi sa "sviđa mi se"
0xbc 13. sij
Odgovor korisniku/ci @fouroctets
Tired: running a Citrix honeypot. Wired: catching attackers with firewall 0days AND running a Citrix honeypot.
Reply Retweet Označi sa "sviđa mi se"
0xbc 6. sij
Odgovor korisniku/ci @pmelson
"Click Enter To Ping The IP"
Reply Retweet Označi sa "sviđa mi se"
0xbc 4. sij
Odgovor korisniku/ci @AdamFowler_IT
Office definitely has its own set of related issues such as macros, but also many signed binaries and scripts that are bundled with the OS can be used to run arbitrary code - check out for several examples.
Reply Retweet Označi sa "sviđa mi se"
0xbc 4. sij
Odgovor korisniku/ci @AdamFowler_IT @arekfurt @danonit
one very common technique is to use applications that are trusted by the whitelisting policy to run arbitrary code (sometimes known as "lolbins"). I also often encounter policies which whitelist paths that can be written to.
Reply Retweet Označi sa "sviđa mi se"
0xbc proslijedio/la je tweet
Chancellery of the Prime Minister of Poland 29. pro
Statement by the Prime Minister of Poland Mateusz Morawiecki.
Reply Retweet Označi sa "sviđa mi se"
0xbc 28. pro
Odgovor korisniku/ci @vortexau
I'll get you next time, scotchie! *shakes fist*
Reply Retweet Označi sa "sviđa mi se"
0xbc 28. pro
Odgovor korisniku/ci @vortexau
which one's mine?
Reply Retweet Označi sa "sviđa mi se"
0xbc 28. pro
Odgovor korisniku/ci @snyff @TheColonial
the chat is pretty active on 's streams, but there are a lot of lurkers too (e.g. me). I'm also usually doing housework or something at the same time 😬
Reply Retweet Označi sa "sviđa mi se"
0xbc proslijedio/la je tweet
Faith 13. pro
As I've recently gotten into browser exploitation, I thought I'd solve and do a writeup for a CTF challenge from earlier this year that really doesn't have any detailed writeups. Hope someone finds my writeup for *CTF 2019 oob-v8 useful! DMs are open.
Reply Retweet Označi sa "sviđa mi se"
0xbc 14. pro
Have a contact who has had their business hosed by Roger ransomware - is anyone aware of this variant, whether there are any viable options for data recovery, what other families it might be related to, etc?
Reply Retweet Označi sa "sviđa mi se"
0xbc 26. stu
Odgovor korisniku/ci @SpeakLifeUK
Also, the video is perfect. Thank you!
Reply Retweet Označi sa "sviđa mi se"
0xbc 26. stu
Odgovor korisniku/ci @SpeakLifeUK
That poem gets better every time I read it. 🤔
Reply Retweet Označi sa "sviđa mi se"
0xbc 9. stu
Most 🔥 thing at the - the guy on the cricket float miming underarm bowling actions.
Reply Retweet Označi sa "sviđa mi se"
0xbc 4. stu
Odgovor korisniku/ci @caseyjohnellis
School Days?
Reply Retweet Označi sa "sviđa mi se"
0xbc proslijedio/la je tweet
Ori Damari 26. lis
While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization. I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:
Reply Retweet Označi sa "sviđa mi se"
0xbc proslijedio/la je tweet
Adel 18. lis
Here are some resources re my talk at ✨: - RDP Fingerprinting: - FATT; my py script for extracting fingerprints from pcap or live traffic: - Tweet coverage of the talk:
Reply Retweet Označi sa "sviđa mi se"
0xbc proslijedio/la je tweet
David French 8. lis
This is marvelous.
Reply Retweet Označi sa "sviđa mi se"