a_protagonist (@097_protagonist) 's Twitter Profile
a_protagonist

@097_protagonist

ID: 1014900448505913344

calendar_today05-07-2018 15:54:57

157 Tweet

37 Takipçi

405 Takip Edilen

Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

Patch your Domain Controllers running DNS (typical config, so most orgs) ASAP. DNS remote code execution vulnerability which runs as LocalSystem on Windows DNS server (usually a DC). portal.msrc.microsoft.com/en-US/security…

Patch your Domain Controllers running DNS (typical config, so most orgs) ASAP.
DNS remote code execution vulnerability which runs as LocalSystem on Windows DNS server (usually a DC).
portal.msrc.microsoft.com/en-US/security…
OccupytheWeb (@three_cube) 's Twitter Profile Photo

Network Forensics, Part 2: Packet-Level Analysis of the NSA's EternalBlue Exploit #networkforensics #cybersecurity #dfir #digitalforensics #eternalblue

Network Forensics, Part 2: Packet-Level Analysis of the NSA's EternalBlue Exploit

#networkforensics #cybersecurity #dfir #digitalforensics

 #eternalblue
Corben Leo (@hacker_) 's Twitter Profile Photo

Apparently there was an internal network share that contained powershell scripts... "One of the powershell scripts contained the username and password for a admin user in Thycotic (PAM) Using this i was able to extract secrets for all services, DA, DUO, Onelogin, AWS, GSuite"

Apparently there was an internal network share that contained powershell scripts...

"One of the powershell scripts contained the username and password for a admin user in Thycotic (PAM) Using this i was able to extract secrets for all services, DA, DUO, Onelogin, AWS, GSuite"
Jason Haddix (@jhaddix) 's Twitter Profile Photo

⚠️ Giveaway time! ⚠️ 👇 📢 Our new course "Attacking AI" will be Feb 27-28! This two-day course equips security professionals with the tools and methodologies to identify vulnerabilities in AI systems. It's gonna be a BANGER. Syllabus: payhip.com/b/2qPZ1 We are giving

sysxplore (@sysxplore) 's Twitter Profile Photo

Quick Linux tip: How often has this happened to you? After entering and running a lengthy command, you realize you forgot to include sudo at the start. You can simply type $ sudo !! and the command line will replace !! with the last command, you attempted to execute.