John wood

320 posts

John wood

John wood

@haxisac

Se unió Şubat 2017
162 Siguiendo11 Seguidores
John wood retuiteado
elhacker.NET
elhacker.NET@elhackernet·
Actores maliciosos Rusos 🇷🇺 infectan usuarios mediante documentos compartidos en DropBox y Google Drive ❌Mucho cuidado con abrir ficheros ISO de dudosa procedencia unit42.paloaltonetworks.com/cloaked-ursa-o…
elhacker.NET tweet mediaelhacker.NET tweet media
Español
1
39
65
0
John wood retuiteado
mgeeky | Mariusz Banach
mgeeky | Mariusz Banach@mariuszbit·
- "... and then he said to sign my malware.exe with faked Microsoft cert to evade AVs/EDRs. Would you believe?" ( ̄y▽ ̄)╭ Ohohoho..... Sign-Artifact.ps1 - based on @mattifestation research & implementation shamelessly borrowed here: github.com/mgeeky/Penetra…
mgeeky | Mariusz Banach tweet media
English
2
95
325
0
John wood retuiteado
Arda Büyükkaya
Arda Büyükkaya@WhichbufferArda·
Reverse Port Forward through a SOCKS Proxy in Cobalt Strike, how cool is that :=) smbmap (by ShawnDEvans) and CrackMapExec (by @byt3bl33d3r) tools used for SMB share enumeration and Lateral Movement 🔥
Arda Büyükkaya tweet mediaArda Büyükkaya tweet mediaArda Büyükkaya tweet media
English
0
11
12
0
John wood retuiteado
inf0sec
inf0sec@inf0sec1·
Hello ! FuckThatPacker is now integrated to CobaltStrike. You can now generate obufscated powershell payloads directly within CobaltStrike :D github.com/Unknow101/Fuck… retweet appreciated
inf0sec tweet media
English
3
125
341
0
John wood retuiteado
mr.d0x
mr.d0x@mrd0x·
I published a blog article detailing a phishing technique I called Browser in the Browser (BITB) Attack. It's very simple but can be very effective. I also published templates on my Github feel free to test them out. mrd0x.com/browser-in-the…
mr.d0x tweet media
English
109
1.2K
3.5K
0
John wood retuiteado
mpgn
mpgn@mpgn_x64·
If you compromise a member of the Backup Operators group there is a direct path the become Domain Admin without a RDP/WinRM access to the DC ! Dump and export the SAM remotely on a remote share ! 🔥🎉 Thanks to @filip_dragovic for the initial POC ! github.com/mpgn/BackupOpe…
mpgn tweet media
English
5
274
711
0
John wood retuiteado
inf0sec
inf0sec@inf0sec1·
Hello all ! Après une longue pause je vous propose un article de #RedTeam traitant de l'Initial Access et plus particulièrement de l'HTML Smuggling. Technique utilisée par des APTs dont j'ai pu constater l'efficacité lors d'un test interne. Bonne lecture. inf0sec.fr/article-21.php
Français
5
51
167
0
John wood retuiteado
Adam Chester 🏴‍☠️
Had a play around with getting a POC for SOCKS proxying a browser using Kerberos Relaying today, seems to work well. Next to run it on a pentest to see if it works outside the lab, and then I'll shove the code up. youtu.be/7q8r39gF1rU
YouTube video
YouTube
English
2
26
112
0
John wood retuiteado
☣ KitPloit - Hacker Tools
GC2 - A Command And Control Application That Allows An Attacker To Execute Commands On The Target Machine Using Google Sheet And Exfiltrate Data Using Google Drive ift.tt/3GxjV2O
☣ KitPloit - Hacker Tools tweet media
English
0
33
65
0