|
decidedlygray
@
decidedlygray
Minneapolis, MN
|
|
between the blackhat and whitehat there is the gray. hacker, flow state addict, IoT/things pentester | views=my own. изучаю
|
|
|
1.833
Tweetovi
|
1.318
Pratim
|
629
Osobe koje vas prate
|
| Tweetovi |
| decidedlygray proslijedio/la je tweet | ||
|
Crypt0s
@Crypt0s
|
28. sij |
|
PInjectra’s Stack Bombing Process Injection example was only the beginning. I wrote a practical implementation of it that performs process migration using shared Memory, self-loading/linking DLLs, and an RWX ROP chain.
github.com/Crypt0s/Ampulex
Also included: a detection for it
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Zero Day Initiative
@thezdi
|
23. sij |
|
Coming up at 2pm, @ScepticCtf, @brymko, and @bl4ckic3 will be targeting a remote code execution with continuation against the Triangle Microworks SCADA Data Gateway in the DNP3 category. This could be the most exciting demo of the contest. #P2OMiami #S4x20
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Steven
@0xthirteen
|
22. sij |
|
Revisiting RDP lateral movement posts.specterops.io/revisiting-rem…
and releasing a project that will be part of a bigger tool coming next week
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
SpecterOps
@SpecterOps
|
22. sij |
|
Here is the link to the SpecterOps Adversary Tactics: PowerShell course material:
github.com/specterops/at-…
Enjoy!
For information about our current training offerings, information can be found here: specterops.io/how-we-help/tr…
(4/4)
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
SpecterOps
@SpecterOps
|
22. sij |
|
Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)
|
||
|
|
||
|
decidedlygray
@decidedlygray
|
15. sij |
|
I am probably totally wrong, but I thought AMSI just triggered on stuff like Assembly.Load? So not sure if just embedding EICAR in the binary would trigger it..
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
ϻг_ϻε
@steventseeley
|
14. sij |
|
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM.
Busting Cisco's Beans :: Hardcoding Your Way to Hell srcincite.io/blog/2020/01/1…
PoC exploit code:
srcincite.io/pocs/cve-2019-…
srcincite.io/pocs/cve-2019-…
srcincite.io/pocs/cve-2019-…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
hashcat
@hashcat
|
14. sij |
|
Support added to crack Citrix NetScaler (SHA512) hashes with hashcat 6.0.0: github.com/hashcat/hashca… pic.twitter.com/Qr9nc2Avy4
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Rich Warren
@buffaloverflow
|
14. sij |
|
Ok AES-256 encrypted LDAP passwords in ns.conf in ADC/NetScaler have been broken. You need to change those too. twitter.com/dozernz/status…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
PortSwigger Research
@PortSwiggerRes
|
14. sij |
|
Voting is now open for the top 10 new web hacking techniques of 2019: portswigger.net/polls/top-10-w…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Responder
@PythonResponder
|
9. sij |
|
Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)
github.com/lgandx/Respond…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
SpecterOps
@SpecterOps
|
13. sij |
|
In this post, @matterpreter dissects Mimikat'z kernel mode driver, Mimidrv, and walks through some of the capabilities available to us in ring 0.
Check it out: posts.specterops.io/mimidrv-in-dep…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Mattias Geniar
@mattiasgeniar
|
13. sij |
|
This is clever: find an unlocked Windows computer, pop in a USB and it shows a fake login/lock screen ("hmm, did I lock my PC when I went for a coffee?")
User enters credentials into *your* app & you just stole the username/password. 🤯
github.com/Pickfordmatt/S…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
KevTheHermit
@KevTheHermit
|
12. sij |
|
Citrix Netscaler AMIs on @awscloud default vulnerable out of the box. The root password is set to the instance ID; that can be read from the metadata URL. CVE-2019-19781 from nobody to ssh as root in seconds. pic.twitter.com/an2jZ7qtcM
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Rio
@0x09AL
|
10. sij |
|
Just published a new blogpost with more details about the Citrix ADC Remote Command Execution. twitter.com/MDSecLabs/stat…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
n00py
@n00py1
|
10. sij |
|
Recently I was on a pentest and needed to manage Active Directory groups from Linux to achieve privilege escalation. If you find yourself in a similar scenario, this is what you can do:
n00py.io/2020/01/managi…
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
MicrosVuln
@microsvuln
|
10. sij |
|
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics) github.com/guyinatuxedo/n…
#reverse #exploitation
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
D Ξ Ξ P Λ K ⚙️
@1m4xx0
|
9. lis |
|
One liner to import whole list of subdomains into Burp suite for automated scanning!
cat <file-name> | parallel -j 200 curl -L -o /dev/null {} -x 127.0.0.1:8080 -k -s
#bugbountytips #bugbounty #bugbountytip
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
10. sij |
|
Ghidra Plugin: JNIAnalyzer
#MobileSecurity #AndroidSecurity
Github repo: github.com/Ayrx/JNIAnalyz…
writeup: ayrx.me/ghidra-jnianal… pic.twitter.com/Byn6pgJLR5
|
||
|
|
||
| decidedlygray proslijedio/la je tweet | ||
|
Sean Harris
@InfoSecHotSpot
|
10. sij |
|
Shadow-Box v2: The Practical and Omnipotent Sandbox for ARM twib.in/l/5j5GGny97eMB via @InfoSecHotSpot
|
||
|
|
||