Es Geeks

18.4K posts

Es Geeks banner
Es Geeks

Es Geeks

@EsGeeks

🛡️ Ciberseguridad | 🐧 Linux | ⚙️ Herramientas El recurso definitivo para SysAdmins y Pentesters. "sudo follow esgeeks" 👇

انضم Şubat 2017
185 يتبع21K المتابعون
Es Geeks أُعيد تغريده
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Reversing a Vulnerable Driver: Discovering a Kernel Memory Allocation Primitive New Medium post. Today , we identify a kernel memory allocation vulnerability in a classic vulnerable driver, which allows an attacker to allocate memory space in the kernel @s12deff/reversing-a-vulnerable-driver-discovering-a-kernel-memory-allocation-primitive-6fed8383fefc" target="_blank" rel="nofollow noopener">medium.com/@s12deff/rever…
English
0
16
84
4.7K
Es Geeks أُعيد تغريده
Hacking Articles
Hacking Articles@hackinarticles·
Abusing Microsoft Outlook 365 to Capture NTLM 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Attackers can abuse Microsoft Outlook 365 features to capture NTLM hashes, enabling credential theft and potential domain compromise. ⚡ Attack Highlights 📧 Send crafted email/meeting request 🔗 Embed malicious UNC path 📡 Force victim system to authenticate 🎟 Capture Net-NTLMv2 hash 🔄 Relay or crack credentials 🚀 Gain unauthorized access 💡 Outlook can automatically trigger authentication to attacker-controlled servers, leaking NTLM hashes without user interaction in certain scenarios. 📖 Article: hackingarticles.in/abusing-micros… #CyberSecurity #ActiveDirectory #NTLM #RedTeam #Pentesting #PrivilegeEscalation #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
1
8
36
2.1K
Es Geeks
Es Geeks@EsGeeks·
🐦 Katana: el crawler web de nueva generación para pentesting 🔥 Rápido, altamente configurable, con modo estándar y headless, parseo de JavaScript y llenado automático de formularios. Perfecto para descubrir endpoints ocultos. 💥🛠️🔓🛡️ #Pentest #BugBounty #WebSecurity #Seguridad
Es Geeks tweet media
Español
1
21
112
3.3K
Es Geeks
Es Geeks@EsGeeks·
@Yana_Brianna Для безопасного удаленного подключения можно использовать Supremo.
Русский
0
0
0
16
YANA
YANA@Yana_Brianna·
Почемуууу ? 🥲🥲🥲 Есть айтишники в зале ?
YANA tweet media
Русский
162
2
763
162.1K
Es Geeks
Es Geeks@EsGeeks·
@DrevlPixls un modelo local llamado metatron-qwen, que es una versión entrenada de Qwen 3.5 ejecutado con Ollama
Català
0
0
2
144
Es Geeks أُعيد تغريده
Steven Lim
Steven Lim@0x534c·
🚨 M365 Connector for Claude: Who’s Accessing Your Workloads? Using the Defender XDR GraphAPIAuditEvents schema, I built a KQL query to list Entra users accessing Microsoft 365 workloads via the Claude connector and the specific workloads they touch. Once enabled, this connector allows Claude to directly access SharePoint, OneDrive, Outlook, and Teams — a powerful capability that demands governance oversight. For defenders, this query provides actionable visibility into who is using the connector and what information they are accessing, helping SecOps teams monitor adoption pressure, enforce governance policies, and ensure connector risks are managed before they escalate. KQL Code: github.com/SlimKQL/Detect… #Cybersecurity #M365ConnectorClaude #Entra #Governance
Steven Lim tweet media
English
4
36
199
13.4K
Es Geeks أُعيد تغريده
Hacking Articles
Hacking Articles@hackinarticles·
SSH Penetration Testing (Port 22) 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles SSH (Secure Shell) is a cryptographic protocol used for secure remote login and command execution over unsecured networks. During penetration testing, misconfigurations or weak credentials in SSH services can allow attackers to gain unauthorized access. () 📚 Techniques Covered in This Guide 🔎 Enumeration with Nmap 🔐 Password Cracking using Hydra ⚡ Authentication using Metasploit 💻 Running Commands on Remote Machine 🔁 SSH Port Redirection 🧪 Nmap SSH Brute Force Script 🔍 Enumerating SSH Authentication Methods 🔑 Key-Based Authentication 🛠 Key-Based Authentication using Metasploit 📦 Post Exploitation using Metasploit 🌐 Local Port Forwarding (Password Based) 🔐 Local Port Forwarding (Key Based) 📖 Article: hackingarticles.in/ssh-penetratio… #CyberSecurity #EthicalHacking #Pentesting #SSH #RedTeam #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
7
164
1K
45K
Es Geeks أُعيد تغريده
Steven Lim
Steven Lim@0x534c·
🔥🤖 M365 Connector for Claude – Why SecOps Must Care Monitoring the M365 Connector for Claude is critical because when ResultType=0, it means an Entra Global Admin has granted permissions, enabling Claude to directly access SharePoint, OneDrive, Outlook, and Teams—a governance decision with major security implications that SecOps must track closely. Meanwhile, ResultType=90095 shows end users attempting to use the connector without the admin grant, signaling demand, shadow IT risk, and adoption pressure. By watching both signals, defenders gain visibility into where governance decisions meet user behavior, ensuring connector risks are managed before they escalate. KQL Code: github.com/SlimKQL/Detect… #Cybersecurity #M365ConnectorClaude #Entra #Governance
Steven Lim tweet media
English
3
133
682
61.3K
Es Geeks
Es Geeks@EsGeeks·
Grype: tu escáner de vulnerabilidades esencial para contenedores y sistemas de archivos. Soporta Docker, OCI, paquetes de OS y lenguajes (Go, Python...). Prioriza riesgos con EPSS. ¡Ideal para securizar tus despliegues! 💥🛡️ #devsecops #containers #vulnerabilitymanagement #golang
Es Geeks tweet media
Español
1
9
41
1.1K